TY - GEN
T1 - Below the salt the dangers of unfulfilled physical media assumptions
AU - Blaze, Matt
AU - McDaniel, Patrick
N1 - Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2013
Y1 - 2013
N2 - Introduction: The physical access media communication traverses is increasing in diversity. Users now access data and services from wired computers, wireless laptops, PDAs, cell phones, and any number of embedded devices. All of these devices now share the same network - the Internet. Of course the Internet itself consists of many media including traditional long haul, ISP, home, and telecommunication networks. Uncertainty introduced by the media diversity has historically led to insecurity simply because the threat models upon which a protocol or security technique may depend, make false or unfulfilled assumptions about the attacker. This has direct consequences on security protocol requirements.
AB - Introduction: The physical access media communication traverses is increasing in diversity. Users now access data and services from wired computers, wireless laptops, PDAs, cell phones, and any number of embedded devices. All of these devices now share the same network - the Internet. Of course the Internet itself consists of many media including traditional long haul, ISP, home, and telecommunication networks. Uncertainty introduced by the media diversity has historically led to insecurity simply because the threat models upon which a protocol or security technique may depend, make false or unfulfilled assumptions about the attacker. This has direct consequences on security protocol requirements.
UR - http://www.scopus.com/inward/record.url?scp=84872460325&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84872460325&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-36213-2_4
DO - 10.1007/978-3-642-36213-2_4
M3 - Conference contribution
AN - SCOPUS:84872460325
SN - 9783642362125
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 24
EP - 27
BT - Security Protocols XVII - 17th International Workshop, Revised Selected Papers
PB - Springer Verlag
T2 - 17th International Security Protocols Workshop
Y2 - 1 April 2009 through 3 April 2009
ER -