Publication | Open Access
Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice
17
Citations
5
References
2020
Year
Unknown Venue
Mobile SecurityEngineeringUsable SecurityClone DetectionInformation SecurityVerificationInformation ForensicsFormal VerificationIdentity KeysClone AttackSecure ComputingSecure ProtocolAuthentication ProtocolNetwork SecurityUnderlying ProtocolsIdentity-based SecurityData PrivacyComputer ScienceMobile ComputingData SecurityCryptographySoftware SecuritySecurity
We investigate whether modern messaging apps achieve the strong post-compromise security guarantees offered by their underlying protocols. In particular, we perform a black-box experiment in which a user becomes the victim of a clone attack; in this attack, the user's full state (including identity keys) is compromised by an attacker who clones their device and then later attempts to impersonate them, using the app through its user interface.
| Year | Citations | |
|---|---|---|
Page 1
Page 1