Layered Analysis of Security Ceremonies - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Layered Analysis of Security Ceremonies

Résumé

A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding.Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which features a socio-technical protocol between a user persona and a computer interface. Future work will be to traverse all layers by formal analysis.
Fichier principal
Vignette du fichier
978-3-642-30436-1_23_Chapter.pdf (193.59 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01518259 , version 1 (04-05-2017)

Licence

Paternité

Identifiants

Citer

Giampaolo Bella, Lizzie Coles-Kemp. Layered Analysis of Security Ceremonies. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.273-286, ⟨10.1007/978-3-642-30436-1_23⟩. ⟨hal-01518259⟩
87 Consultations
128 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More