Back to Search Start Over

Duck Attack on Accountable Distributed Systems

Authors :
Pascal Lafourcade
Cédric Lauradoux
Amrit Kumar
National University of Singapore (NUS)
Privacy Models, Architectures and Tools for the Information Society (PRIVATICS)
Inria Grenoble - Rhône-Alpes
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-CITI Centre of Innovation in Telecommunications and Integration of services (CITI)
Institut National des Sciences Appliquées de Lyon (INSA Lyon)
Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon)
Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon
Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS)
Ecole Nationale Supérieure des Mines de St Etienne-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne [2017-2020] (UCA [2017-2020])
Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon)
Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Inria Lyon
Institut National de Recherche en Informatique et en Automatique (Inria)
Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE)-Université Clermont Auvergne [2017-2020] (UCA [2017-2020])-Centre National de la Recherche Scientifique (CNRS)
Lauradoux, Cédric
Source :
14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, 14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, Nov 2017, Melbourne, Australia. pp.1-8, MobiQuitous, HAL
Publication Year :
2017
Publisher :
HAL CCSD, 2017.

Abstract

International audience; Accountability plays a key role in dependable distributed systems.It allows to detect, isolate and churn malicious/selfish nodes thatdeviate from a prescribed protocol. To achieve these properties, sev-eral accountable systems use at their core cryptographic primitivesthat produce non-repudiable evidence of inconsistent or incorrectbehavior.In this paper, we show how selfish and colluding nodes canexploit the use of cryptographic digests in accountability protocolsto mount what we call a duck attack. In a duck attack, selfish andcolluding nodes exploit the use of cryptographic digests to alter thetransmission of messages while masquerading as honest entities.The end result is that their selfish behavior remains undetected. Thisundermines the security guarantees of the accountability protocols.We first discover the duck attack while analyzing PAG — a cus-tom cryptographic protocol to build accountable systems presentedat ICDCS 2016. We later discover that accountable distributed sys-tems based on a secure log (essentially a hash-based data structure)are also vulnerable to the duck attack and apply it on AcTinG — aprotocol presented at SRDS 2014. To defeat our attack, we modifythe underlying secure log to have high-order dependency on themessages stored in it.

Details

Language :
English
Database :
OpenAIRE
Journal :
14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, 14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, Nov 2017, Melbourne, Australia. pp.1-8, MobiQuitous, HAL
Accession number :
edsair.doi.dedup.....91bd8a129c00584f8abd6816d16289ff