{"title":"A procedure for verifying security against type confusion attacks","authors":"C. Meadows","doi":"10.1109/CSFW.2003.1212705","DOIUrl":null,"url":null,"abstract":"A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather (et al., 2000) that there are simple formatting conventions that will guarantee that protocols are free from simple type confusions in which fields of one type are substituted for fields of another, it is not clear how well they defend against more complex attacks, or against attacks arising from interaction with protocols that are formatted according to different conventions. In this paper we show how type confusion attacks can arise in realistic situations even when the types are explicitly defined in at least some of the messages, using examples from our recent analysis of the Group Domain of Interpretation Protocol. We then develop a formal model of types that can capture potential ambiguity of type notation, and outline a procedure for determining whether or not the types of two messages can be confused. This work extends our earlier work on the subject in that it includes an explicit model of attacker and defender and extends the informal model of the type confusion attacks in terms of a game between an intruder and a set of honest principals in or earlier work to a more formal model in which actions of intruder and honest principals are described explicitly. This gives us a simpler, more intuitive approach that allows us to calculate probabilities in a more systematic manner, and to compare different intruder strategies and different assumptions about the way in which the protocol is implemented in terms of their effects on type confusion.","PeriodicalId":283743,"journal":{"name":"16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.2003.1212705","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather (et al., 2000) that there are simple formatting conventions that will guarantee that protocols are free from simple type confusions in which fields of one type are substituted for fields of another, it is not clear how well they defend against more complex attacks, or against attacks arising from interaction with protocols that are formatted according to different conventions. In this paper we show how type confusion attacks can arise in realistic situations even when the types are explicitly defined in at least some of the messages, using examples from our recent analysis of the Group Domain of Interpretation Protocol. We then develop a formal model of types that can capture potential ambiguity of type notation, and outline a procedure for determining whether or not the types of two messages can be confused. This work extends our earlier work on the subject in that it includes an explicit model of attacker and defender and extends the informal model of the type confusion attacks in terms of a game between an intruder and a set of honest principals in or earlier work to a more formal model in which actions of intruder and honest principals are described explicitly. This gives us a simpler, more intuitive approach that allows us to calculate probabilities in a more systematic manner, and to compare different intruder strategies and different assumptions about the way in which the protocol is implemented in terms of their effects on type confusion.
类型混淆攻击是指主体接受一种类型的数据作为另一种类型的数据。尽管Heather (et al., 2000)已经证明,有一些简单的格式约定可以保证协议不会出现简单的类型混淆,即一种类型的字段被另一种类型的字段所取代,但目前还不清楚它们如何抵御更复杂的攻击,或者如何抵御由与按照不同约定格式化的协议交互而产生的攻击。在本文中,我们展示了即使在至少一些消息中显式定义了类型,在现实情况下如何出现类型混淆攻击,并使用了我们最近对Group Domain of Interpretation Protocol的分析中的示例。然后,我们开发了一个正式的类型模型,该模型可以捕获类型符号的潜在歧义,并概述了一个确定两个消息的类型是否可以混淆的过程。这项工作扩展了我们早期在这个问题上的工作,因为它包括了一个明确的攻击者和防御者的模型,并将类型混淆攻击的非正式模型(入侵者和一组诚实的主体之间的博弈)扩展到一个更正式的模型,在这个模型中,入侵者和诚实的主体的行为被明确描述。这为我们提供了一种更简单、更直观的方法,使我们能够以更系统的方式计算概率,并根据对类型混淆的影响比较不同的入侵者策略和关于协议实现方式的不同假设。