Show simple item record

dc.contributor.authorBowers, Kevin D.
dc.contributor.authorJuels, Ari
dc.contributor.authorRivest, Ronald L.
dc.contributor.authorShen, Emily H.
dc.date.accessioned2015-02-06T13:32:34Z
dc.date.available2015-02-06T13:32:34Z
dc.date.issued2013-04
dc.identifier.isbn978-1-4673-5946-7
dc.identifier.isbn978-1-4673-5944-3
dc.identifier.isbn978-1-4673-5945-0
dc.identifier.issn0743-166X
dc.identifier.urihttp://hdl.handle.net/1721.1/93880
dc.description.abstractWe introduce Drifting Keys (DKs), a simple new approach to detecting device impersonation. DKs enable detection of complete compromise by an attacker of the device and its secret state, e.g., cryptographic keys. A DK evolves within a device randomly over time. Thus an attacker will create DKs that randomly diverge from those in the original, valid device over time, alerting a trusted verifier to the attack. DKs may be transmitted unidirectionally from a device, eliminating interaction between the device and verifier. Device emissions of DK values can be quite compact - even just a single bit - and DK evolution and emission require minimal computation. Thus DKs are well suited for highly constrained devices, such as sensors and hardware authentication tokens. We offer a formal adversarial model for DKs, and present a simple scheme that we prove essentially optimal (undominated) for a natural class of attack timelines. We explore application of this scheme to one-time passcode authentication tokens. Using the logs of a large enterprise, we experimentally study the effectiveness of DKs in detecting the compromise of such tokens.en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/INFCOM.2013.6566892en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceProf. Rivest via Chris Sherratten_US
dc.titleDrifting Keys: Impersonation detection for constrained devicesen_US
dc.typeArticleen_US
dc.identifier.citationBowers, Kevin D., Ari Juels, Ronald L. Rivest, and Emily Shen. “Drifting Keys: Impersonation Detection for Constrained Devices.” 2013 Proceedings IEEE INFOCOM (April 2013).en_US
dc.contributor.departmentLincoln Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverRivest, Ronald L.en_US
dc.contributor.mitauthorRivest, Ronald L.en_US
dc.contributor.mitauthorShen, Emily H.en_US
dc.relation.journalProceedings of the 2013 IEEE INFOCOMen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsBowers, Kevin D.; Juels, Ari; Rivest, Ronald L.; Shen, Emilyen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-7105-3690
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record