2012
DOI: 10.1007/978-3-642-30436-1_23
|View full text |Cite
|
Sign up to set email alerts
|

Layered Analysis of Security Ceremonies

Abstract: A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(39 citation statements)
references
References 15 publications
0
39
0
Order By: Relevance
“…This work continues in a paper by Martimiano et al [53], and then gets expanded through Carlos's Ph.D. thesis [23], for example with the notion of human-to-human or human-to-machine channels. Each such channel can be interpreted over the ceremony concertina model of Bella and Coles-Kemp [13] by compressing specific layers of the concertina, as we shall see ( §3.3); for example, a human-to-human one compresses the technical layers, and other channels may demand only certain other layers of the concertina. Also each channel used by an attacker (for example, the visual, auditive or environmental ones) can be layered through a concertina.…”
Section: The Socio-technical Perspectivementioning
confidence: 99%
See 3 more Smart Citations
“…This work continues in a paper by Martimiano et al [53], and then gets expanded through Carlos's Ph.D. thesis [23], for example with the notion of human-to-human or human-to-machine channels. Each such channel can be interpreted over the ceremony concertina model of Bella and Coles-Kemp [13] by compressing specific layers of the concertina, as we shall see ( §3.3); for example, a human-to-human one compresses the technical layers, and other channels may demand only certain other layers of the concertina. Also each channel used by an attacker (for example, the visual, auditive or environmental ones) can be layered through a concertina.…”
Section: The Socio-technical Perspectivementioning
confidence: 99%
“…Our research leverages upon the recent model of security ceremonies of Bella and Coles-Kemp [13], in Figure 1. The model identifies several layers, which go beyond the original ceremonies between users and systems as described by Ellison [33].…”
Section: Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…This implies to look at the technical and the human protocols and to consider them together as complex layered ceremonies [7][8] [9]. There is no such study for Hotspot and Hotspot 2.0, neither comparatively nor separately.…”
Section: Introductionmentioning
confidence: 99%