Derailing Attacks

Saša Radomirovíc (Lead / Corresponding author), Mohammad Torabi Dashti

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


We introduce derailing attacks, a class of blocking attacks on security protocols. As opposed to blunt, low-level attacks such as persistent jamming, derailing only requires a minimal, application-level intervention from the attacker. We give a simple definition of derailing attacks in an abstract formal model, and demonstrate that derailing attacks are viable in practice through examples from two application domains, namely radio-frequency identification and fair exchange protocols.

Original languageEnglish
Title of host publicationSecurity Protocols XXIII
Subtitle of host publication23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers
EditorsBruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson
Place of PublicationSwitzerland
PublisherSpringer International Publishing
Number of pages6
ISBN (Electronic)9783319260969
ISBN (Print)9783319260952
Publication statusPublished - 2015
Event23rd International Workshop on Security Protocols: “Information Security in Fiction and in Fact” - Sidney Sussex College, Cambridge, United Kingdom
Duration: 31 Mar 20152 Apr 2015 (Link to Workshop details)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer International Publishing
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Workshop23rd International Workshop on Security Protocols
Country/TerritoryUnited Kingdom
Internet address


  • Availability
  • Fair exchange
  • Formal models
  • RFID

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Derailing Attacks'. Together they form a unique fingerprint.

Cite this