Sciweavers

IEEEARES
2006
IEEE

Feasibility of Multi-Protocol Attacks

14 years 6 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the existence of multi-protocol attacks on protocols described in literature. Given two or more protocols, that share key structures and are executed in the same environment, are new attacks possible? Out of 30 protocols from literature, we find that 23 are vulnerable to multi-protocol attacks. We identify two likely attack patterns and sketch a tagging scheme to prevent multi-protocol attacks.
Cas J. F. Cremers
Added 11 Jun 2010
Updated 11 Jun 2010
Type Conference
Year 2006
Where IEEEARES
Authors Cas J. F. Cremers
Comments (0)