The 6th International Workshop on Trusted Collaboration

Research Article

Security Protocols as Environments: a Lesson from Non-collaboration

Download537 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247156,
        author={Michele Peroli and Luca Vigan\'{o} and Maria-Camilla Fiazza},
        title={Security Protocols as Environments: a Lesson from Non-collaboration},
        proceedings={The 6th International Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={4},
        keywords={collaboration and non-collaboration defense environment multiple non-collaborating attackers security guardian security protocol analysis},
        doi={10.4108/icst.collaboratecom.2011.247156}
    }
    
  • Michele Peroli
    Luca Viganò
    Maria-Camilla Fiazza
    Year: 2012
    Security Protocols as Environments: a Lesson from Non-collaboration
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2011.247156
Michele Peroli1,*, Luca Viganò1, Maria-Camilla Fiazza1
  • 1: University of Verona
*Contact email: michele.peroli@univr.it

Abstract

Although computer security typically revolves around threats, attacks and defenses, the sub-field of security protocol analysis (SPA) has so far focused almost exclusively on attacks. In this paper, we show that such focus on attacks depends on few critical assumptions that have been characteristic of the field and have governed its mindset, approach and developed tools. We motivate that indeed there is room in SPA for a fruitful notion of defense and that the conceptual bridge lies in multiple non-collaborating attackers. Defending security protocols through interference between attackers is possible; however, in order to understand network behavior completely, it is necessary to start treating protocols as environments, not simply as sequences of message exchanges.