About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
The 6th International Workshop on Trusted Collaboration

Research Article

Security Protocols as Environments: a Lesson from Non-collaboration

Download794 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247156,
        author={Michele Peroli and Luca Vigan\'{o} and Maria-Camilla Fiazza},
        title={Security Protocols as Environments: a Lesson from Non-collaboration},
        proceedings={The 6th International Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={4},
        keywords={collaboration and non-collaboration defense environment multiple non-collaborating attackers security guardian security protocol analysis},
        doi={10.4108/icst.collaboratecom.2011.247156}
    }
    
  • Michele Peroli
    Luca Viganò
    Maria-Camilla Fiazza
    Year: 2012
    Security Protocols as Environments: a Lesson from Non-collaboration
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2011.247156
Michele Peroli1,*, Luca Viganò1, Maria-Camilla Fiazza1
  • 1: University of Verona
*Contact email: michele.peroli@univr.it

Abstract

Although computer security typically revolves around threats, attacks and defenses, the sub-field of security protocol analysis (SPA) has so far focused almost exclusively on attacks. In this paper, we show that such focus on attacks depends on few critical assumptions that have been characteristic of the field and have governed its mindset, approach and developed tools. We motivate that indeed there is room in SPA for a fruitful notion of defense and that the conceptual bridge lies in multiple non-collaborating attackers. Defending security protocols through interference between attackers is possible; however, in order to understand network behavior completely, it is necessary to start treating protocols as environments, not simply as sequences of message exchanges.

Keywords
collaboration and non-collaboration defense environment multiple non-collaborating attackers security guardian security protocol analysis
Published
2012-04-06
Publisher
IEEE
http://dx.doi.org/10.4108/icst.collaboratecom.2011.247156
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL