Design requirements to counter parallel session attacks in security protocols

Anca D. Jurcut, Tom Coffey, Reiner Dojen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This work is concerned with the possible exploitation of weaknesses in security protocols by attackers using parallel session attacks and discovering ways of eliminating these weaknesses. A new analysis is presented on the reasons why security protocols, with certain weaknesses in their design, are vulnerable to parallel session attacks. Building on this analysis a new set of design requirements is proposed, whose aim is to eliminate these vulnerabilities. The proposed set of design requirements is evaluated by applying them to a range of security protocols with known weaknesses as well as protocols known to be free of these weaknesses. The results of the evaluation indicate that the set of design requirements are effective as: protocols with known weaknesses violate some of the rules, while protocols without weaknesses do not violate any of the rules.

Original languageEnglish
Title of host publication2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
EditorsAli Miri, Audun Josang, Joaquin Garcia-Alfaro, Urs Hengartner, Nen-Fu Huang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages298-305
Number of pages8
ISBN (Electronic)9781479935031
DOIs
Publication statusPublished - 2014
Event2014 12th Annual Conference on Privacy, Security and Trust, PST 2014 - Toronto, Canada
Duration: 23 Jul 201424 Jul 2014

Publication series

Name2014 12th Annual Conference on Privacy, Security and Trust, PST 2014

Conference

Conference2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
Country/TerritoryCanada
CityToronto
Period23/07/1424/07/14

Keywords

  • design requirements
  • parallel session attacks
  • security protocols

Fingerprint

Dive into the research topics of 'Design requirements to counter parallel session attacks in security protocols'. Together they form a unique fingerprint.

Cite this