Device attacker models: Fact and fiction

  • Jiangshan Yu
  • , Mark D. Ryan*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

According to standard fiction, a user is able to securely keep long term keys on his device. However, in fact his device may become infected with malware, and an adversary may obtain a copy of his key. We propose an attacker model in which devices are “periodically trustworthy” — they may become infected by malware, and then later become trustworthy again after software patches and malware scans have been applied, in an ongoing cycle. This paper proposes a solution to make the usage of private keys by attackers detectable by using public transparently-maintained logs to monitor the usage of long-term secret keys.

Original languageEnglish
Title of host publicationSecurity Protocols XXIII - 23rd International Workshop, Revised Selected Papers
EditorsFrank Stajano, Jonathan Anderson, Bruce Christianson, James Malcolm, Petr Švenda, Vashek Matyáš
PublisherSpringer Verlag
Pages158-167
Number of pages10
ISBN (Print)9783319260952
DOIs
Publication statusPublished - 2015
Event23rd International Workshop on Security Protocols, 2015 - Cambridge, United Kingdom
Duration: 31 Mar 20152 Apr 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9379
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Workshop on Security Protocols, 2015
Country/TerritoryUnited Kingdom
CityCambridge
Period31/03/152/04/15

Bibliographical note

Publisher Copyright:
© Springer International Publishing Switzerland 2015.

Keywords

  • Attacker model
  • Key compromise detection
  • Key usage Monitoring

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Device attacker models: Fact and fiction'. Together they form a unique fingerprint.

Cite this