2019
DOI: 10.1007/978-3-030-29959-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic Analysis of Terrorist Fraud Resistance

Abstract: Distance-bounding protocols aim at preventing several kinds of attacks, amongst which terrorist fraud, where a far away malicious prover colludes with an attacker to authenticate once, without giving him any advantage for future authentication. In this paper, we consider a symbolic setting and propose a formal definition of terrorist fraud, as well as two reduction results. When looking for an attack, we can first restrict ourselves to consider a particular (and quite simple) topology. Moreover, under some mil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 27 publications
(47 reference statements)
0
10
0
Order By: Relevance
“…We now apply coalition-cast vCGS to the modelling of secure systems and their threats. We start by recalling the setting of Terrorist-Fraud Attacks [19] and the distance-bounding protocol by Hancke and Kuhn [31], then give an A-cast vCGS model for this protocol and an ATL formula expressing the existence of an attack against the protocol, and finally we argue why the results from Section 4 are relevant for this case study.…”
Section: Coalition-cast Vcgs In Modelling Security Problemsmentioning
confidence: 99%
See 4 more Smart Citations
“…We now apply coalition-cast vCGS to the modelling of secure systems and their threats. We start by recalling the setting of Terrorist-Fraud Attacks [19] and the distance-bounding protocol by Hancke and Kuhn [31], then give an A-cast vCGS model for this protocol and an ATL formula expressing the existence of an attack against the protocol, and finally we argue why the results from Section 4 are relevant for this case study.…”
Section: Coalition-cast Vcgs In Modelling Security Problemsmentioning
confidence: 99%
“…terrorist fraud (see description below), it can be easily proven that if there is an attack on the version of protocol presented in Figure 1, then there is an attack in the original protocol in [31] and vice-versa. Formal symbolic verification methodologies [16] such as the recent [18,40,19] are only able to capture the HK version presented in Figure 1 (i.e., modelling 1-bitstring challenge and not m 1-bit challenges); and this is true w.r.t. checking for all attacks/properties, not just terrorist frauds.…”
Section: Coalition-cast Vcgs In Modelling Security Problemsmentioning
confidence: 99%
See 3 more Smart Citations