Abstract
According to standard fiction, a user is able to securely keep long term keys on his device. However, in fact his device may become infected with malware, and an adversary may obtain a copy of his key. We propose an attacker model in which devices are “periodically trustworthy” — they may become infected by malware, and then later become trustworthy again after software patches and malware scans have been applied, in an ongoing cycle. This paper proposes a solution to make the usage of private keys by attackers detectable by using public transparently-maintained logs to monitor the usage of long-term secret keys.
| Original language | English |
|---|---|
| Title of host publication | Security Protocols XXIII - 23rd International Workshop, Revised Selected Papers |
| Editors | Frank Stajano, Jonathan Anderson, Bruce Christianson, James Malcolm, Petr Švenda, Vashek Matyáš |
| Publisher | Springer Verlag |
| Pages | 158-167 |
| Number of pages | 10 |
| ISBN (Print) | 9783319260952 |
| DOIs | |
| Publication status | Published - 2015 |
| Event | 23rd International Workshop on Security Protocols, 2015 - Cambridge, United Kingdom Duration: 31 Mar 2015 → 2 Apr 2015 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 9379 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 23rd International Workshop on Security Protocols, 2015 |
|---|---|
| Country/Territory | United Kingdom |
| City | Cambridge |
| Period | 31/03/15 → 2/04/15 |
Bibliographical note
Publisher Copyright:© Springer International Publishing Switzerland 2015.
Keywords
- Attacker model
- Key compromise detection
- Key usage Monitoring
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science