2019
DOI: 10.1007/978-3-030-17138-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic Verification of Distance Bounding Protocols

Abstract: With the proliferation of contactless applications, obtaining reliable information about distance is becoming an important security goal, and specific protocols have been designed for that purpose. These protocols typically measure the round trip time of messages and use this information to infer a distance. Formal methods have proved their usefulness when analysing standard security protocols such as confidentiality or authentication protocols. However, due to their abstract communication model, existing resu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…There exist various symbolic models that showcase the EMV contactless protocols [16], [17], [24]- [26]. All of these focus on verifying proximity between the card and the terminal.…”
Section: Related Workmentioning
confidence: 99%
“…There exist various symbolic models that showcase the EMV contactless protocols [16], [17], [24]- [26]. All of these focus on verifying proximity between the card and the terminal.…”
Section: Related Workmentioning
confidence: 99%
“…Assumptions are made and a comparison is made on the relative strength of various DB protocols. A new symbolic model is proposed by Debant, Delaune & Wiedling (2020) in the domain of NFC. The concept of automated verification is given by the use of ProVerif tool.…”
Section: Distance Bounding Protocols In Literaturementioning
confidence: 99%
“…To overcome this limitation, getting some inspiration from earlier works (e.g. [25,4,28]), some recent works have proposed to incorporate new features in existing symbolic models [23,14,11,13], making the analysis of distance bounding protocols possible relying on existing verification tools (e.g. ProVerif, Tamarin).…”
Section: Introductionmentioning
confidence: 99%
“…Due to this, such a security property can not be analysed using techniques deployed in e.g. [23,14,13]. Our main contribution is to provide reduction results to reduce the number of topologies we have to consider during our analysis, and more importantly to reduce the possible behaviours of our terrorist prover.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation