Deutsch
 
Hilfe Datenschutzhinweis Impressum
  DetailsucheBrowse

Datensatz

 
 
DownloadE-Mail
  SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

Fiebig, T., Lichtblau, F., Streibelt, F., Krueger, T., Lexis, P., Bush, R., et al. (2016). SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment. Retrieved from http://arxiv.org/abs/1610.05531.

Item is

Basisdaten

einblenden: ausblenden:
Genre: Forschungspapier
Latex : {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

Dateien

einblenden: Dateien
ausblenden: Dateien
:
arXiv:1610.05531.pdf (Preprint), 391KB
Name:
arXiv:1610.05531.pdf
Beschreibung:
File downloaded from arXiv at 2017-11-27 08:47
OA-Status:
Sichtbarkeit:
Öffentlich
MIME-Typ / Prüfsumme:
application/pdf / [MD5]
Technische Metadaten:
Copyright Datum:
-
Copyright Info:
-

Externe Referenzen

einblenden:

Urheber

einblenden:
ausblenden:
 Urheber:
Fiebig, Tobias1, Autor
Lichtblau, Franziska1, Autor           
Streibelt, Florian1, Autor           
Krueger, Thorben1, Autor
Lexis, Pieter1, Autor
Bush, Randy1, Autor
Feldmann, Anja1, Autor                 
Affiliations:
1External Organizations, ou_persistent22              

Inhalt

einblenden:
ausblenden:
Schlagwörter: Computer Science, Cryptography and Security, cs.CR
 Zusammenfassung: Today's Internet utilizes a multitude of different protocols. While some of
these protocols were first implemented and used and later documented, other
were first specified and then implemented. Regardless of how protocols came to
be, their definitions can contain traps that lead to insecure implementations
or deployments. A classical example is insufficiently strict authentication
requirements in a protocol specification. The resulting Misconfigurations,
i.e., not enabling strong authentication, are common root causes for Internet
security incidents. Indeed, Internet protocols have been commonly designed
without security in mind which leads to a multitude of misconfiguration traps.
While this is slowly changing, to strict security considerations can have a
similarly bad effect. Due to complex implementations and insufficient
documentation, security features may remain unused, leaving deployments
vulnerable.
In this paper we provide a systematization of the security traps found in
common Internet protocols. By separating protocols in four classes we identify
major factors that lead to common security traps. These insights together with
observations about end-user centric usability and security by default are then
used to derive recommendations for improving existing and designing new
protocols---without such security sensitive traps for operators, implementors
and users.

Details

einblenden:
ausblenden:
Sprache(n): eng - English
 Datum: 2016-10-182016
 Publikationsstatus: Online veröffentlicht
 Seiten: 26 p.
 Ort, Verlag, Ausgabe: -
 Inhaltsverzeichnis: -
 Art der Begutachtung: -
 Identifikatoren: arXiv: 1610.05531
URI: http://arxiv.org/abs/1610.05531
BibTex Citekey: Fiebig2016
 Art des Abschluß: -

Veranstaltung

einblenden:

Entscheidung

einblenden:

Projektinformation

einblenden:

Quelle

einblenden: