日本語
 
Help Privacy Policy ポリシー/免責事項
  詳細検索ブラウズ

アイテム詳細

登録内容を編集ファイル形式で保存
 
 
ダウンロード電子メール
  SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

Fiebig, T., Lichtblau, F., Streibelt, F., Krueger, T., Lexis, P., Bush, R., & Feldmann, A. (2016). SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment. Retrieved from http://arxiv.org/abs/1610.05531.

Item is

基本情報

表示: 非表示:
資料種別: 成果報告書
LaTeX : {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

ファイル

表示: ファイル
非表示: ファイル
:
arXiv:1610.05531.pdf (プレプリント), 391KB
ファイルのパーマリンク:
https://hdl.handle.net/11858/00-001M-0000-002E-569A-9
ファイル名:
arXiv:1610.05531.pdf
説明:
File downloaded from arXiv at 2017-11-27 08:47
OA-Status:
閲覧制限:
公開
MIMEタイプ / チェックサム:
application/pdf / [MD5]
技術的なメタデータ:
著作権日付:
-
著作権情報:
-
CCライセンス:
http://arxiv.org/help/license

関連URL

表示:

作成者

表示:
非表示:
 作成者:
Fiebig, Tobias1, 著者
Lichtblau, Franziska1, 著者
Streibelt, Florian1, 著者
Krueger, Thorben1, 著者
Lexis, Pieter1, 著者
Bush, Randy1, 著者
Feldmann, Anja1, 著者           
所属:
1External Organizations, ou_persistent22              

内容説明

表示:
非表示:
キーワード: Computer Science, Cryptography and Security, cs.CR
 要旨: Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users.

資料詳細

表示:
非表示:
言語: eng - English
 日付: 2016-10-182016
 出版の状態: オンラインで出版済み
 ページ: 26 p.
 出版情報: -
 目次: -
 査読: -
 識別子(DOI, ISBNなど): arXiv: 1610.05531
URI: http://arxiv.org/abs/1610.05531
BibTex参照ID: Fiebig2016
 学位: -

関連イベント

表示:

訴訟

表示:

Project information

表示:

出版物

表示: