Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3264888.3264895acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols

Published: 15 January 2018 Publication History

Abstract

Distance-bounding (DB) protocols protect against relay attacks on proximity-based access control systems. In a DB protocol, the verifier computes an upper bound on the distance to the prover by measuring the time-of-flight of exchanged messages. DB protocols are, however, vulnerable to distance fraud, in which a dishonest prover is able to manipulate the distance bound computed by an honest verifier. Despite their conceptual simplicity, devising a formal characterization of DB protocols and distance fraud attacks that is amenable to automated formal analysis is non-trivial, primarily because of their real-time and probabilistic nature. In this work, we introduce a generic, computational model, based on Rewriting Logic, for formally analyzing various forms of distance fraud, including recently identified timing attacks, on the Hancke-Kuhn family of DB protocols through statistical model checking. While providing an insightful formal characterization on its own, the model enables a practical formal analysis method that can help system designers bridge the gap between conceptual descriptions and low-level designs. In addition to accurately confirming known results, we use the model to define new attack strategies and quantitatively evaluate their effectiveness under realistic assumptions that would otherwise be difficult to reason about manually.

References

[1]
Gul Agha. 1986. Actors: a model of concurrent computation in distributed systems .MIT Press, Cambridge, MA, USA.
[2]
Gul Agha, Carl A. Gunter, Michael Greenwald, Sanjeev Khanna, José Meseguer, Koushik Sen, and Prasanna Thati. 2005. Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories. In International Workshop on Foundations of Computer Security (FCS'05). IEEE, Chicago, IL.
[3]
Gul Agha, José Meseguer, and Koushik Sen. 2006. PMaude: Rewrite-based Specification Language for Probabilistic Object Systems. Electronic Notes in Theoretical Computer Science, Vol. 153, 2 (2006), 213--239.
[4]
Musab A. Alturki and José Meseguer. 2011. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool. In Algebra and Coalgebra in Computer Science, Lecture Notes in Computer Science, Vol. 6859. Springer Berlin / Heidelberg, 386--392.
[5]
Musab A. Alturki, José Meseguer, and Carl A. Gunter. 2009. Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. Electron. Notes Theor. Comput. Sci., Vol. 234 (2009), 3--18.
[6]
Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardacs, Cédric Lauradoux, and Benjamin Martin. 2011. A Framework for Analyzing RFID Distance Bounding Protocols. J. Comput. Secur., Vol. 19, 2 (April 2011), 289--317. http://dl.acm.org/citation.cfm?id=1971859.1971864
[7]
Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, and Jean-Marc Robert. 2017. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17). ACM, New York, NY, USA, 800--814.
[8]
David Basin, Srdjan Capkun, Patrick Schaller, and Benedikt Schmidt. 2009. Let's Get Physical: Models and Methods for Real-World Security Protocols. In Theorem Proving in Higher Order Logics: 22nd International Conference, TPHOLs 2009, Munich, Germany, August 17--20, 2009. Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, 1--22.
[9]
D. Basin, S. Capkun, P. Schaller, and B. Schmidt. 2011. Formal Reasoning about Physical Properties of Security Protocols. ACM Transactions on Information and System Security, Vol. 14, 2 (2011).
[10]
Ioana Boureanu, Aikaterini Mitrokotsa, and Serge Vaudenay. 2013. Secure and Lightweight Distance-Bounding. In Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, Berlin, Heidelberg, 97--113.
[11]
Stefan Brands and David Chaum. 1994. Distance-Bounding Protocols. In Advances in Cryptology -- EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23--27, 1993 Proceedings, Tor Helleseth (Ed.). Springer, Berlin, Heidelberg, 344--359.
[12]
Roberto Bruni and José Meseguer. 2006. Semantic foundations for generalized rewrite theories. Theor. Comput. Sci., Vol. 360, 1--3 (2006), 386--414.
[13]
Manuel Clavel, Francisco Durán, Steven Eker, Patrick Lincoln, Narciso Mart'i-Oliet, José Meseguer, and Carolyn Talcott. 2007. All About Maude - A High-Performance Logical Framework. Lecture Notes in Computer Science, Vol. 4350. Springer-Verlag, Secaucus, NJ, USA.
[14]
C. Cremers, K. B. Rasmussen, B. Schmidt, and S. Capkun. 2012. Distance Hijacking Attacks on Distance Bounding Protocols. In 2012 IEEE Symposium on Security and Privacy. 113--127.
[15]
Y. G. Dantas, V. Nigam, and I. E. Fonseca. 2014. A Selective Defense for Application Layer DDoS Attacks. In 2014 IEEE Joint Intelligence and Security Informatics Conference. 75--82.
[16]
EasyCrypt. (last accessed: 2018-08--15). https://www.easycrypt.info/trac/.
[17]
G. P. Hancke and M. G. Kuhn. 2005. An RFID Distance Bounding Protocol. In First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) . 67--73.
[18]
Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, and Carolyn Talcott. 2016. Can we mitigate the attacks on Distance-Bounding Protocols by using challenge-response rounds repeatedly?. In Workshop on Foundations of Computer Security .
[19]
Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, and Carolyn Talcott. 2017. Time, computational complexity, and probability in the analysis of distance-bounding protocols. Journal of Computer Security, Vol. 25, 6 (2017), 585--630.
[20]
Michael Katelman, José Meseguer, and Jennifer Hou. 2008. Redesign of the LMST Wireless Sensor Protocol through Formal Modeling and Statistical Model Checking. In Proc. of FMOODS '08 (Lecture Notes in Computer Science), Vol. 5051. Springer, Berlin, Heidelberg, 150--169.
[21]
Chong Hee Kim and Gildas Avoine. 2009. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12--14, 2009. Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, 119--133.
[22]
Nirman Kumar, Koushik Sen, José Meseguer, and Gul Agha. 2003. A Rewriting Based Model for Probabilistic Distributed Object Systems. In Proc. of FMOODS '03 (Lecture Notes in Computer Science), Vol. 2884. Springer, 32--46.
[23]
Si Liu, Peter Csaba Ölveczky, Jatin Ganhotra, Indranil Gupta, and José Meseguer. 2017. Exploring Design Alternatives for RAMP Transactions Through Statistical Model Checking. In Formal Methods and Software Engineering: 19th International Conference on Formal Engineering Methods, ICFEM 2017, Xi'an, China, November 13--17, 2017, Proceedings, Springer International Publishing, Cham, 298--314.
[24]
José Meseguer. 1992. Conditional rewriting logic as a unified model of concurrency. Theor. Comput. Sci., Vol. 96, 1 (1992), 73--155.
[25]
José Meseguer. 1998. Membership algebra as a logical framework for equational specification. In Proc. WADT'97 (Lecture Notes in Computer Science), F. Parisi-Presicce (Ed.), Vol. 1376. Springer, 18--61.
[26]
Jorge Munilla and Alberto Peinado. 2008. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing, Vol. 8, 9 (2008), 1227--1232.
[27]
Dusko Pavlovic and Catherine Meadows. 2010. Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. Electronic Notes in Theoretical Computer Science, Vol. 265, Supplement C (2010), 97 -- 122. Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics (MFPS 2010).
[28]
Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin O'Flynn. 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. In 2017 IEEE Symposium on Security and Privacy (SP). 195--212.
[29]
P. Schaller, B. Schmidt, D. Basin, and S. Capkun. 2009. Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. In 2009 22nd IEEE Computer Security Foundations Symposium . 109--123.
[30]
Koushik Sen, Nirman Kumar, Jose Meseguer, and Gul Agha. 2003. Probabilistic Rewrite Theories: Unifying Models, Logics and Tools . Technical Report UIUCDCS-R-2003--2347. University of Illinois at Urbana Champaign.

Cited By

View all
  • (2023)QMaude: Quantitative Specification and Verification in Rewriting LogicFormal Methods10.1007/978-3-031-27481-7_15(240-259)Online publication date: 3-Mar-2023
  • (2022)On the Security and Complexity of Periodic SystemsSN Computer Science10.1007/s42979-022-01223-93:5Online publication date: 2-Jul-2022
  • (2021)Resource and timing aspects of security protocolsJournal of Computer Security10.3233/JCS-20001229:3(299-340)Online publication date: 1-Jan-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CPS-SPC '18: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy
October 2018
114 pages
ISBN:9781450359924
DOI:10.1145/3264888
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 January 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distance fraud
  2. distance-bounding protocols
  3. maude
  4. probabilistic rewriting
  5. statistical model checking

Qualifiers

  • Research-article

Funding Sources

  • King Fahd University of Petroleum and Minerals
  • Croatian Science Foundation
  • Office of Naval Research
  • Naval Research Laboratory
  • National Research University Higher School of Economics

Conference

CCS '18
Sponsor:

Acceptance Rates

CPS-SPC '18 Paper Acceptance Rate 22 of 10 submissions, 220%;
Overall Acceptance Rate 53 of 66 submissions, 80%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)59
  • Downloads (Last 6 weeks)12
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)QMaude: Quantitative Specification and Verification in Rewriting LogicFormal Methods10.1007/978-3-031-27481-7_15(240-259)Online publication date: 3-Mar-2023
  • (2022)On the Security and Complexity of Periodic SystemsSN Computer Science10.1007/s42979-022-01223-93:5Online publication date: 2-Jul-2022
  • (2021)Resource and timing aspects of security protocolsJournal of Computer Security10.3233/JCS-20001229:3(299-340)Online publication date: 1-Jan-2021
  • (2020)Assumption-Based Analysis of Distance-Bounding Protocols with cpsaLogic, Language, and Security10.1007/978-3-030-62077-6_11(146-166)Online publication date: 28-Oct-2020
  • (2019)Security Implications of Implementing Multistate Distance-Bounding ProtocolsProceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy10.1145/3338499.3357359(99-108)Online publication date: 11-Nov-2019
  • (2019)Resource-Bounded Intruders in Denial of Service Attacks2019 IEEE 32nd Computer Security Foundations Symposium (CSF)10.1109/CSF.2019.00033(382-38214)Online publication date: Jun-2019
  • (2019)A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security ProtocolsFoundations of Security, Protocols, and Equational Reasoning10.1007/978-3-030-19052-1_13(192-213)Online publication date: 28-Apr-2019

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media