Derailing attacks

Saša Radomirovíc*, Mohammad Torabi Dashti

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We introduce derailing attacks, a class of blocking attacks on security protocols. As opposed to blunt, low-level attacks such as persistent jamming, derailing only requires a minimal, application-level intervention from the attacker. We give a simple definition of derailing attacks in an abstract formal model, and demonstrate that derailing attacks are viable in practice through examples from two application domains, namely radio-frequency identification and fair exchange protocols.

Original languageEnglish
Title of host publicationSecurity Protocols XXIII
EditorsFrank Stajano, Jonathan Anderson, Bruce Christianson, James Malcolm, Petr Švenda, Vashek Matyáš
PublisherSpringer
Pages41-46
Number of pages6
ISBN (Electronic)9783319260969
ISBN (Print)9783319260952
DOIs
Publication statusPublished - 2015
Event23rd International Workshop on Security Protocols 2015 - Cambridge, United Kingdom
Duration: 31 Mar 20152 Apr 2015

Publication series

NameLecture Notes in Computer Science
Volume9379
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Workshop on Security Protocols 2015
Country/TerritoryUnited Kingdom
CityCambridge
Period31/03/152/04/15

Keywords

  • Availability
  • Fair exchange
  • Formal models
  • RFID

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Derailing attacks'. Together they form a unique fingerprint.

Cite this