DocumentCode :
1649810
Title :
A procedure for verifying security against type confusion attacks
Author :
Meadows, Catherine
Author_Institution :
Naval Res. Lab., Washington, DC, USA
fYear :
2003
Firstpage :
62
Lastpage :
72
Abstract :
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather (et al., 2000) that there are simple formatting conventions that will guarantee that protocols are free from simple type confusions in which fields of one type are substituted for fields of another, it is not clear how well they defend against more complex attacks, or against attacks arising from interaction with protocols that are formatted according to different conventions. In this paper we show how type confusion attacks can arise in realistic situations even when the types are explicitly defined in at least some of the messages, using examples from our recent analysis of the Group Domain of Interpretation Protocol. We then develop a formal model of types that can capture potential ambiguity of type notation, and outline a procedure for determining whether or not the types of two messages can be confused. This work extends our earlier work on the subject in that it includes an explicit model of attacker and defender and extends the informal model of the type confusion attacks in terms of a game between an intruder and a set of honest principals in or earlier work to a more formal model in which actions of intruder and honest principals are described explicitly. This gives us a simpler, more intuitive approach that allows us to calculate probabilities in a more systematic manner, and to compare different intruder strategies and different assumptions about the way in which the protocol is implemented in terms of their effects on type confusion.
Keywords :
access protocols; cryptography; data privacy; formal verification; message authentication; GDOI; Group Domain of Interpretation Protocol; attacker model; confusion determination; defender model; informal model; intruder strategy; protocol interaction; security verification; type confusion attack; type confusion game; type field; type notation; Authentication; Data security; Internet; Laboratories; Multicast protocols; Probability; Public key; Tagging;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE
ISSN :
1063-6900
Print_ISBN :
0-7695-1927-X
Type :
conf
DOI :
10.1109/CSFW.2003.1212705
Filename :
1212705
Link To Document :
بازگشت