Research Article
Security Protocols as Environments: a Lesson from Non-collaboration
@INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247156, author={Michele Peroli and Luca Vigan\'{o} and Maria-Camilla Fiazza}, title={Security Protocols as Environments: a Lesson from Non-collaboration}, proceedings={The 6th International Workshop on Trusted Collaboration}, publisher={IEEE}, proceedings_a={TRUSTCOL}, year={2012}, month={4}, keywords={collaboration and non-collaboration defense environment multiple non-collaborating attackers security guardian security protocol analysis}, doi={10.4108/icst.collaboratecom.2011.247156} }
- Michele Peroli
Luca Viganò
Maria-Camilla Fiazza
Year: 2012
Security Protocols as Environments: a Lesson from Non-collaboration
TRUSTCOL
ICST
DOI: 10.4108/icst.collaboratecom.2011.247156
Abstract
Although computer security typically revolves around threats, attacks and defenses, the sub-field of security protocol analysis (SPA) has so far focused almost exclusively on attacks. In this paper, we show that such focus on attacks depends on few critical assumptions that have been characteristic of the field and have governed its mindset, approach and developed tools. We motivate that indeed there is room in SPA for a fruitful notion of defense and that the conceptual bridge lies in multiple non-collaborating attackers. Defending security protocols through interference between attackers is possible; however, in order to understand network behavior completely, it is necessary to start treating protocols as environments, not simply as sequences of message exchanges.