Abstract
Various modern protocols tailored to emerging wire-less networks, such as body area networks, rely on the proximity and honesty of devices within the network to achieve their security goals. However, there does not exist a security framework that supports the formal analysis of such protocols, leaving the door open to unexpected flaws. In this article we introduce such a security framework, show how it can be implemented in the protocol verification tool Tamarin, and use it to find previously unknown vulnerabilities on two recent key exchange protocols.
Original language | English |
---|---|
Title of host publication | 2022 IEEE 35th Computer Security Foundations Symposium (CSF) |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 17-32 |
Number of pages | 16 |
ISBN (Electronic) | 9781665484176 |
ISBN (Print) | 9781665484183 |
DOIs | |
Publication status | Published - 31 Oct 2022 |
Event | 35th IEEE Computer Security Foundations Symposium, CSF 2022 - Haifa, Israel Duration: 7 Aug 2022 → 10 Aug 2022 |
Publication series
Name | IEEE Computer Security Foundations Symposium |
---|---|
Volume | 2022-August |
ISSN (Print) | 1940-1434 |
Conference
Conference | 35th IEEE Computer Security Foundations Symposium, CSF 2022 |
---|---|
Country/Territory | Israel |
City | Haifa |
Period | 7/08/22 → 10/08/22 |
Funding
This work was supported by the Luxembourg National Research Fund, Luxembourg, under the grant AFR-PhD-14565947.
Keywords
- distance bounding
- distant attacker
- formal verification
- key exchange
- security protocols