Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage

نویسندگان

  • Adam L. Young
  • Moti Yung
چکیده

Trojans, viruses and other malware can be categorized as either active or passive in nature. Active viruses (for example) are viruses that perform some outwardly noticeable function. They are typically ooensive in nature and cause denial of service attacks or other disturbances. In the electronic warfare context they can translate into \direct military attacks". Passive viruses are, on the other hand, inconspicuous and may for example , simply steal CPU time for a particular computation. They may also secretly leak information and are capable of leaking \intelligence informa-tion" to the author (i.e., espionage). Recently, Cryptovirology has been introduced as a means of mounting active viral attacks using public key cryptography. It has been shown to be a tool for extortion attacks and \electronic warfare", where attacks are mounted against information resources. The natural question to ask is whether Cryptovirology is also useful (i.e., provides enhanced functionality) in the area of spying via malware. In this paper we demonstrate that, indeed, Cryptovirology helps in \electronic espi-onage" and allows the spy to conceal his or her identity (as well as past collected information). Speciically, we present an attack that can be mounted by a cryptotrojan that allows the attacker to gather information (passwords) from a system in such a way that the attacker cannot be proven guilty beyond reasonable doubt. That is, even if the attacker is under surveillance on the local machine from when he rst attacks the target machine, to when he obtains the passwords, and even if the leaked information is made available to the attacker exclusively, he still cannot be caught. The threat is made possible by the combination of public key cryptography, probabilistic encryption, and the use of public information (I/O or communication) channels which together form a \secure receiver-anonymous channel". The machine can be a standalone one (where channels are I/O ones), or a networked one (where channels are communication ones). What we learn from the attack is extracted as general tools and basic principles for \espionage attacks". The generic existence of such evasive attacks implies that auditing and logging tools are not suucient in apprehending electronic spies and identifying their operators, and may not be suucient to collect evidence. The concrete attack we present clearly sharpens the known inherent weakness of expository authentication mechanisms (like passwords).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deniable Storage Encryption for Mobile Devices

Deniable Storage Encryption for Mobile Devices Adam Skillen Smartphones, and other mobile computing devices, are being widely adopted globally as the de-facto personal computing platform. Given the amount of sensitive information accumulated by these devices, there are serious privacy and security implications for both personal use and enterprise deployment. Confidentiality of data-at-rest can ...

متن کامل

Efficient and Non-Malleable Proofs of Plaintext

We describe efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El Gamal encryption schemes. We also highlight some important applications of these protocols: – Chosen-ciphertext-secure, interactive encryption. In settings where both parties are on-line, an interactive encryption protocol may be used. We construct chosen-ciphertext...

متن کامل

Chameleon-Based Deniable Authenticated Key Agreement Protocol

As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...

متن کامل

An Efficient Receiver Deniable Encryption Scheme and Its Applications

Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary comes to play with high potential. Deniable encryption plays a key role in the internet/electronic voting, electronic bidding, electronic auctions and secure multiparty computation. In this study a practical efficient receiver deniable encryption scheme based on BCP c...

متن کامل

Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications

We describe very efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El-Gamal encryption schemes whose security can be proven in the standard model. We also highlight some important applications of these protocols, where we take care to ensure that our protocols remain secure when run in an asynchronous, concurrent environment: • C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997