SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

نویسندگان

  • Tobias Fiebig
  • Franziska Lichtblau
  • Florian Streibelt
  • Thorben Krueger
  • Pieter Lexis
  • Randy Bush
  • Anja Feldmann
چکیده

Today’s Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about enduser centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols—without such security sensitive traps for operators, implementors and users.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Group Data Envelopment Analysis Method for Ranking Design Requirements in Quality Function ‎Deployment

‎Data envelopment analysis (DEA) is an objective method for priority determination of decision making units (DMUs) with the same multiple inputs and outputs. DEA is an efficiency estimation technique, but it can be used for solving many problems of management such as rankig of DMUs. Many researchers have found similarity between DEA and MCDM techniques. One of the earliest techniques in MCDM is...

متن کامل

The Effect of Implementation of a Pain Monitoring Protocol on the Pain Intensity in the Intensive Care Unit Semiconscious Patients

Background: Neglecting the pain assessment in intensive care unit (ICU) patients with decreased level of consciousness (LOC) can lead to inappropriate pain management. Implementation of a pain management protocol may contribute to avoiding such negligence. Aim: This study aimed to determine the effect of using a pain monitoring protocol on the pain intensity of ICU patients with decreased LOC. ...

متن کامل

Working Title: Chain Replication In Theory and in Practice Chain Replication In Theory and in Practice

When implementing a distributed storage system, using an algorithm with a formal definition and proof is a wise idea. However, translating any algorithm into running code can be difficult. Staff at Google have documented the difficulties in implementing the Paxos algorithm: making the implementation correct andreaching performance goals. In the spirit of justaposing the purity of theory and pro...

متن کامل

Implementation of quadratic dose protocol for 18F-FDG whole-body PET imaging using a BGO-based PET/CT scanner, GE Discovery ST

Introduction: The ability of quadratic dose protocol to maintain a good quality image for an overweight and obese patient is well reported. However, a practical approach to the implementation of this protocol in whole-body imaging in Malaysia is currently lacking. Hence, the aim of this study is to derive the quadratic dose formula that suits our PET system. Metho...

متن کامل

A Structural Model for Evaluation of the Structural Complexity Dimensions of Health and Treatment Network of Firuzabad, Fars Province, Iran, using Design Structure Matrix and Quality Function Deployment Techniques

Summery: One of the latest methods for analysis of structural complexity is, Design Structure Matrix which has been used and has been given, lots of attention in academic and scientific centers in recent years. This project was undertaken in order to reveal the structural complexity of Frirooz Abad (Fars Province) Healthcare network. This analytical research has descriptive and realistic dime...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1610.05531  شماره 

صفحات  -

تاریخ انتشار 2016