论文标题

曝光通知系统的自动安全分析

Automated Security Analysis of Exposure Notification Systems

论文作者

Morio, Kevin, Esiyok, Ilkan, Jackson, Dennis, Künnemann, Robert

论文摘要

我们介绍了两个最广泛部署的曝光通知系统的安全性和比较,Robert和Google和Apple曝光通知(GAEN)框架。罗伯特(Robert)是曝光通知的集中式方法中最受欢迎的部分,其中中央服务器计算了风险分数。相比之下,Gaen遵循分散的方法,用户的手机计算风险。事实证明,集中式和分散系统的相对优点是一个有争议的问题。以前的大多数分析都集中在这些系统的隐私含义上,我们的是第一个评估已部署系统安全性的正式分析 - 没有错误的风险警报。我们对罗伯特(Robert)的法国部署和德国的Corona-Warn-app部署最广泛的Gaen版本进行建模。我们隔离了这些系统阻止虚假警报的确切条件。我们准确地确定了对手如何通过网络和蓝牙嗅探,数据库泄漏或电话,后端系统和卫生当局的妥协来颠覆系统。我们还研究了DP3T协议的原始规范的安全性,以确定拟议方案及其最终部署之间的差距。我们总共发现了27种攻击模式,其中包括许多将集中式与分散方法区分开的,以及对所有三个协议的授权程序的攻击。我们的结果表明,罗伯特的集中设计更容易受到机会主义和资源丰富的攻击者,试图进行大规模宣传攻击。

We present the first formal analysis and comparison of the security of the two most widely deployed exposure notification systems, ROBERT and the Google and Apple Exposure Notification (GAEN) framework. ROBERT is the most popular instalment of the centralised approach to exposure notification, in which the risk score is computed by a central server. GAEN, in contrast, follows the decentralised approach, where the user's phone calculates the risk. The relative merits of centralised and decentralised systems have proven to be a controversial question. The majority of the previous analyses have focused on the privacy implications of these systems, ours is the first formal analysis to evaluate the security of the deployed systems -- the absence of false risk alerts. We model the French deployment of ROBERT and the most widely deployed GAEN variant, Germany's Corona-Warn-App. We isolate the precise conditions under which these systems prevent false alerts. We determine exactly how an adversary can subvert the system via network and Bluetooth sniffing, database leakage or the compromise of phones, back-end systems and health authorities. We also investigate the security of the original specification of the DP3T protocol, in order to identify gaps between the proposed scheme and its ultimate deployment. We find a total of 27 attack patterns, including many that distinguish the centralised from the decentralised approach, as well as attacks on the authorisation procedure that differentiate all three protocols. Our results suggest that ROBERT's centralised design is more vulnerable against both opportunistic and highly resourced attackers trying to perform mass-notification attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源