Ceremony Analysis: Strengths and Weaknesses - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Ceremony Analysis: Strengths and Weaknesses

Résumé

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better understand the issues involved.We analyse three ceremonies, HTTPS, EMV and Opera Mini, and use the information gained from the experience to establish a list of typical flaws in ceremonies. Finally, we use that list to analyse a protocol proven secure for human use. This leads to a realisation of the strengths and weaknesses of ceremony analysis.
Fichier principal
Vignette du fichier
978-3-642-21424-0_9_Chapter.pdf (525.33 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01567584 , version 1 (24-07-2017)

Licence

Paternité

Identifiants

Citer

Kenneth Radke, Colin Boyd, Juan Gonzalez Nieto, Margot Brereton. Ceremony Analysis: Strengths and Weaknesses. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.104-115, ⟨10.1007/978-3-642-21424-0_9⟩. ⟨hal-01567584⟩
87 Consultations
118 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More