TY - GEN
T1 - Protocol Dialects as Formal Patterns
AU - Galán, D.
AU - García, V.
AU - Escobar, S.
AU - Meadows, C.
AU - Meseguer, J.
N1 - S. Escobar and V. Garćıa have been partially supported by the grant PID2021-122830OB-C42 funded by MCIN/AEI/10.13039/501100011033 and ERDF A way of making Europe, by the grant CIPROM/2022/6 funded by Generalitat Valenciana, and by the grant PCI2020-120708-2 funded by MICIN/AEI/10.13039/501100011033 and by the European Union NextGenerationEU/PRTR. D. Galán, V. Garćıa, C. Meadows, and J. Meseguer have been partially supported by ONR Code 311. We also thank Eben Blaisdell and Carolyn Talcott for their comments.
PY - 2024
Y1 - 2024
N2 - A protocol dialect is a lightweight method to obfuscate the communication exchanges between legitimate protocol users to make it hard for malicious users to interact with legitimate ones. So far, dialects have been based on a single obfuscation transformation, which we call a lingo. In this work dialects are generalized to become protocol and lingo generic. In this way they can be composed with other dialects for greater security. We present a formal semantics of dialects as formal patterns, i.e., as protocol transformations formalized in rewriting logic. We also present several attacker models and explain how our generalized notion of dialect can be used to harden dialects against such attackers.
AB - A protocol dialect is a lightweight method to obfuscate the communication exchanges between legitimate protocol users to make it hard for malicious users to interact with legitimate ones. So far, dialects have been based on a single obfuscation transformation, which we call a lingo. In this work dialects are generalized to become protocol and lingo generic. In this way they can be composed with other dialects for greater security. We present a formal semantics of dialects as formal patterns, i.e., as protocol transformations formalized in rewriting logic. We also present several attacker models and explain how our generalized notion of dialect can be used to harden dialects against such attackers.
UR - http://www.scopus.com/inward/record.url?scp=85182597037&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85182597037&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-51476-0_3
DO - 10.1007/978-3-031-51476-0_3
M3 - Conference contribution
AN - SCOPUS:85182597037
SN - 9783031514753
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 42
EP - 61
BT - Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings
A2 - Tsudik, Gene
A2 - Conti, Mauro
A2 - Liang, Kaitai
A2 - Smaragdakis, Georgios
PB - Springer
T2 - 28th European Symposium on Research in Computer Security, ESORICS 2023
Y2 - 25 September 2023 through 29 September 2023
ER -