Derailing Attacks

Saša Radomirovíc (Lead / Corresponding author), Mohammad Torabi Dashti

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We introduce derailing attacks, a class of blocking attacks on security protocols. As opposed to blunt, low-level attacks such as persistent jamming, derailing only requires a minimal, application-level intervention from the attacker. We give a simple definition of derailing attacks in an abstract formal model, and demonstrate that derailing attacks are viable in practice through examples from two application domains, namely radio-frequency identification and fair exchange protocols.

Original languageEnglish
Title of host publicationSecurity Protocols XXIII
Subtitle of host publication23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers
EditorsBruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson
Place of PublicationSwitzerland
PublisherSpringer International Publishing
Pages41-46
Number of pages6
ISBN (Electronic)9783319260969
ISBN (Print)9783319260952
DOIs
Publication statusPublished - 2015
Event23rd International Workshop on Security Protocols: “Information Security in Fiction and in Fact” - Sidney Sussex College, Cambridge, United Kingdom
Duration: 31 Mar 20152 Apr 2015
http://homepages.herts.ac.uk/~spw/ (Link to Workshop details)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer International Publishing
Volume9379
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop23rd International Workshop on Security Protocols
CountryUnited Kingdom
CityCambridge
Period31/03/152/04/15
Internet address

Keywords

  • Availability
  • Fair exchange
  • Formal models
  • RFID

Fingerprint Dive into the research topics of 'Derailing Attacks'. Together they form a unique fingerprint.

  • Cite this

    Radomirovíc, S., & Dashti, M. T. (2015). Derailing Attacks. In B. Christianson, P. Švenda, V. Matyáš, J. Malcolm, F. Stajano, & J. Anderson (Eds.), Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers (pp. 41-46). (Lecture Notes in Computer Science ; Vol. 9379). Springer International Publishing. https://doi.org/10.1007/978-3-319-26096-9_5