| ||||
| ||||
![]() Title:Is Eve Nearby? Analysing Protocols Under the Distant-Attacker Assumption Conference:CSF22 Tags:distance bounding, distant attacker, formal verification, key exchange and security protocols Abstract: Various modern protocols tailored to emerging wireless networks, such as body area networks, rely on the proximity and honesty of devices within the network to achieve their security goals. However, there does not exist a security framework that supports the formal analysis of such protocols, leaving the door open to unexpected flaws. In this article we introduce such a security framework, show how it can be implemented in the protocol verification tool Tamarin, and use it to find previously unknown vulnerabilities on two recent key exchange protocols. Is Eve Nearby? Analysing Protocols Under the Distant-Attacker Assumption ![]() Is Eve Nearby? Analysing Protocols Under the Distant-Attacker Assumption | ||||
Copyright © 2002 – 2025 EasyChair |