SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment
نویسندگان
چکیده
Today’s Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about enduser centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols—without such security sensitive traps for operators, implementors and users.
منابع مشابه
A New Group Data Envelopment Analysis Method for Ranking Design Requirements in Quality Function Deployment
Data envelopment analysis (DEA) is an objective method for priority determination of decision making units (DMUs) with the same multiple inputs and outputs. DEA is an efficiency estimation technique, but it can be used for solving many problems of management such as rankig of DMUs. Many researchers have found similarity between DEA and MCDM techniques. One of the earliest techniques in MCDM is...
متن کاملThe Effect of Implementation of a Pain Monitoring Protocol on the Pain Intensity in the Intensive Care Unit Semiconscious Patients
Background: Neglecting the pain assessment in intensive care unit (ICU) patients with decreased level of consciousness (LOC) can lead to inappropriate pain management. Implementation of a pain management protocol may contribute to avoiding such negligence. Aim: This study aimed to determine the effect of using a pain monitoring protocol on the pain intensity of ICU patients with decreased LOC. ...
متن کاملWorking Title: Chain Replication In Theory and in Practice Chain Replication In Theory and in Practice
When implementing a distributed storage system, using an algorithm with a formal definition and proof is a wise idea. However, translating any algorithm into running code can be difficult. Staff at Google have documented the difficulties in implementing the Paxos algorithm: making the implementation correct andreaching performance goals. In the spirit of justaposing the purity of theory and pro...
متن کاملImplementation of quadratic dose protocol for 18F-FDG whole-body PET imaging using a BGO-based PET/CT scanner, GE Discovery ST
Introduction: The ability of quadratic dose protocol to maintain a good quality image for an overweight and obese patient is well reported. However, a practical approach to the implementation of this protocol in whole-body imaging in Malaysia is currently lacking. Hence, the aim of this study is to derive the quadratic dose formula that suits our PET system. Metho...
متن کاملA Structural Model for Evaluation of the Structural Complexity Dimensions of Health and Treatment Network of Firuzabad, Fars Province, Iran, using Design Structure Matrix and Quality Function Deployment Techniques
Summery: One of the latest methods for analysis of structural complexity is, Design Structure Matrix which has been used and has been given, lots of attention in academic and scientific centers in recent years. This project was undertaken in order to reveal the structural complexity of Frirooz Abad (Fars Province) Healthcare network. This analytical research has descriptive and realistic dime...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1610.05531 شماره
صفحات -
تاریخ انتشار 2016