liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Boeira, Felipe
Publications (6 of 6) Show all publications
Khan, S., Singh Gaba, G., Boeira, F. & Gurtov, A. (2024). Formal Verification and Security Assessment of the Drone Remote Identification Protocol. In: : . Paper presented at 2nd International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 12-14 February. 2024.. Muscat, Oman: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Formal Verification and Security Assessment of the Drone Remote Identification Protocol
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The worldwide implementation of Remote Identification (RID) regulations mandates unmanned aircraft systems (UAS), or drones, to openly transmit their identity and real-time location as plain text on the wireless channel. This mandate serves the purpose of accounting for and monitoring drone operations effectively. However, the current RID standard's plain-text transmission exposes it to cyberattacks, including eavesdropping, injection, and impersonation. The Drone Remote Identification Protocol (DRIP) has been proposed to enhance the security of RID. The DRIP ensures information secrecy and confidentiality by using unique session keys while guaranteeing the authenticity of messages and entities through digital signatures. These security features of DRIP make it a preferable alternative to the existing RID standard. However, the lack of verification regarding its security claims raises concerns about its performance in hostile conditions. This paper comprehensively analyzes the DRIP protocol's security features using Tamarin Prover, a formal security verification tool. With its automated reasoning capabilities, Tamarin Prover accurately identifies potential security vulnerabilities within the DRIP protocol while thoroughly verifying its conformance to security properties. Our investigation demonstrates that the DRIP protocol is susceptible to replay attacks. We strongly recommend the inclusion of message freshness components, reducing the lifespan of DET broadcasts, and incorporating a not-after timestamp that is set only a few minutes ahead of the current time. These measures enhance the protocol's defence against replay attacks and ensure message authenticity and Integrity.

Place, publisher, year, edition, pages
Muscat, Oman: Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Cybersecurity, DRIP, Formal verification, Tamarin, UAS.
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:liu:diva-201795 (URN)10.1109/UVS59630.2024.10467159 (DOI)001192218700014 ()9798350372557 (ISBN)9798350372564 (ISBN)
Conference
2nd International Conference on Unmanned Vehicle Systems-Oman (UVS), Muscat, Oman, 12-14 February. 2024.
Note

Funding Agencies|Automation Program II, Trafikverket

Available from: 2024-03-22 Created: 2024-03-22 Last updated: 2024-08-01Bibliographically approved
Wilson, J., Asplund, M., Johansson, N. & Boeira, F. (2024). Provably Secure Communication Protocols for Remote Attestation. In: Proceedings of the 19th International Conference on Availability, Reliability and Security: . Paper presented at The International Conference on Availability, Reliability and Security. New York, NY, USA
Open this publication in new window or tab >>Provably Secure Communication Protocols for Remote Attestation
2024 (English)In: Proceedings of the 19th International Conference on Availability, Reliability and Security, New York, NY, USA, 2024Conference paper, Published paper (Refereed)
Abstract [en]

Remote Attestation is emerging as a promising technique to ensure that some remote device is in a trustworthy state. This can for example be an IoT device that is attested by a cloud service before allowing the device to connect. However, flaws in the communication protocols associated with the remote attestation mechanism can introduce vulnerabilities into the system design and potentially nullify the added security. Formal verification of protocol security can help to prevent such flaws. In this work we provide a detailed analysis of the necessary security properties for remote attestation focusing on the authenticity of the involved agents. We extend beyond existing work by considering the possibility of an attestation server (making the attestation process involve three parties) as well as requiring verifier authentication. We demonstrate that some security properties are not met by a state-of-the-art commercial protocol for remote attestation for our strong adversary model. Moreover, we design two new communication protocols for remote attestation that we formally prove fulfil all of the considered authentication properties.

Place, publisher, year, edition, pages
New York, NY, USA: , 2024
Keywords
Remote Attestation, Formal Protocol Verification, Tamarin Prover, Authentication, Security Models, Protocol Attack
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-207831 (URN)10.1145/3664476.3664485 (DOI)9798400717185 (ISBN)
Conference
The International Conference on Availability, Reliability and Security
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-09-26 Created: 2024-09-26 Last updated: 2025-01-28
Boeira, F. (2023). Authentic Communication and Trustworthy Location in Mobile Networks. (Doctoral dissertation). Linköping: Linköping University Electronic Press
Open this publication in new window or tab >>Authentic Communication and Trustworthy Location in Mobile Networks
2023 (English)Doctoral thesis, monograph (Other academic)
Abstract [en]

Widespread mobile network connectivity has changed society and, consequently, increased our dependency on its proper functioning for transportation, safety, finance, and more. This thesis is concerned with improving the security of mobile networks and focuses on two such instances: vehicular and cellular networks. We aim at mitigating certain security risks even in the presence of strong attackers, which could be manifested in the form of internal malicious agents in cellular network providers or connected vehicles compromised with malicious software, to mention a couple of examples. Within this scope, we target two main challenges: proving that a selected set of security protocols in vehicular and cellular networks guarantee the expected security properties and improving the trustworthiness of location information shared by neighbouring vehicles. 

Our contributions to security protocols involve employing formal methods to verify security properties in the vehicular communication protocol Ensemble and in the fifth generation of cellular networks (5G). The Ensemble protocol aims to enable multi-brand truck platooning and is currently in a prestandardisation effort in Europe. We report a potential weakness that was resolved in the latest versions and verify that strong security properties are fulfilled. To make verification tractable, we propose a strategy based on the hierarchy of cryptographic keys which may also be employed in protocols that have similar keying structures. In 5G, we identify a weakness that could be exploited to frame people into suspicion of serious crimes when lawful interception operations are conducted. We then design the changes required to guarantee non-frameability in 5G and formally verify the expected security properties. 

In the context of location trustworthiness, we design and evaluate a proof-of-location scheme tailored for vehicular networks called Vouch+. Vouch+ can operate in centralised or decentralised modes and combines location information shared by neighbouring vehicles (or the infrastructure) with a plausibility model to ensure the validity of the position claimed by other vehicles. Furthermore, we propose and evaluate reaction strategies that mitigate the studied position falsification attacks on vehicular platooning. 

Through our results, we demonstrate how mobile networks may benefit from employing rigorous methods to obtain higher assurance about their expected security properties. Furthermore, we show how considering increasing adversarial capabilities supports the assessment of these networks’ resilience and the design of new security mechanisms.  

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2023. p. 185
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 2329
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-196460 (URN)10.3384/9789180752572 (DOI)9789180752565 (ISBN)9789180752572 (ISBN)
Public defence
2023-09-11, Ada Lovelace, B-huset, Campus Valla, Linköping, 13:15 (English)
Opponent
Supervisors
Available from: 2023-08-07 Created: 2023-08-07 Last updated: 2023-08-10Bibliographically approved
Usman, A., Cole, N., Asplund, M., Boeira, F. & Vestlund, C. (2023). Remote Attestation Assurance Arguments for Trusted Execution Environments. In: PROCEEDINGS OF THE 2023 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, SAT-CPS 2023: . Paper presented at 3rd ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS), Charlotte, NC, apr 26, 2023 (pp. 33-42). ASSOC COMPUTING MACHINERY
Open this publication in new window or tab >>Remote Attestation Assurance Arguments for Trusted Execution Environments
Show others...
2023 (English)In: PROCEEDINGS OF THE 2023 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, SAT-CPS 2023, ASSOC COMPUTING MACHINERY , 2023, p. 33-42Conference paper, Published paper (Refereed)
Abstract [en]

Remote attestation (RA) is emerging as an important security mechanism for cyber-physical systems with strict security requirements. Trusted computing at large and Trusted Execution Environments (TEEs) in particular have been identified as key technologies to enable RA since they ideally allow retaining some element of control over remote devices despite them being compromised at the OS level. Unfortunately, sometimes it is claimed that TEEs provide RA support without really substantiating how this support is provided. In this paper we build the assurance arguments for RA to carefully map how secure RA depends on underlying security properties and how these in turn can be provided by TEE capabilities. We base our security analysis of RA on existing literature on security requirements for RA and use Goal Structuring Notation (GSN) as the method to build the security arguments. Our analysis identifies the set of TEE properties (as described in the GlobalPlatform standard) that are needed to support RA, and which goals that cannot be mapped to TEE implementations, and therefore, require other forms of evidence for RA to be trusted at the top level.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2023
Keywords
Remote Attestation; Trusted Execution Environments; Goal Structuring Notation; Assurance; GlobalPlatform; CPS
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-201069 (URN)10.1145/3579988.3585056 (DOI)001146882700005 ()9798400701009 (ISBN)
Conference
3rd ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS), Charlotte, NC, apr 26, 2023
Note

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2024-02-23 Created: 2024-02-23 Last updated: 2025-09-15
Boeira, F. & Asplund, M. (2022). Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol. In: 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022): . Paper presented at IEEE 35th Computer Security Foundations Symposium (CSF), Haifa, ISRAEL, aug 07-10, 2022 (pp. 305-318). IEEE Computer Society
Open this publication in new window or tab >>Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
2022 (English)In: 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), IEEE Computer Society, 2022, p. 305-318Conference paper, Published paper (Refereed)
Abstract [en]

Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves authenticity properties along with secrecy of all keys used throughout the protocol.

Place, publisher, year, edition, pages
IEEE Computer Society, 2022
Series
Proceedings IEEE Computer Security Foundations Symposium, ISSN 1940-1434
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:liu:diva-197079 (URN)10.1109/CSF54842.2022.9919664 (DOI)001078008100020 ()9781665484176 (ISBN)9781665484183 (ISBN)
Conference
IEEE 35th Computer Security Foundations Symposium (CSF), Haifa, ISRAEL, aug 07-10, 2022
Available from: 2023-08-22 Created: 2023-08-22 Last updated: 2024-12-09
Grimsdal, G., Lundgren, P., Vestlund, C., Boeira, F. & Asplund, M. (2019). Can Microkernels Mitigate Microarchitectural Attacks?. In: Aslan Askarov, René Rydhof Hansen, Willard Rafnsson (Ed.), Secure IT Systems: Nordsec 2019 (pp. 238-253). Cham: Springer
Open this publication in new window or tab >>Can Microkernels Mitigate Microarchitectural Attacks?
Show others...
2019 (English)In: Secure IT Systems: Nordsec 2019 / [ed] Aslan Askarov, René Rydhof Hansen, Willard Rafnsson, Cham: Springer, 2019, p. 238-253Chapter in book (Refereed)
Abstract [en]

Microarchitectural attacks such as Meltdown and Spectre have attracted much attention recently. In this paper we study how effective these attacks are on the Genode microkernel framework using three different kernels, Okl4, Nova, and Linux. We try to answer the question whether the strict process separation provided by Genode combined with security-oriented kernels such as Okl4 and Nova can mitigate microarchitectural attacks. We evaluate the attack effectiveness by measuring the throughput of data transfer that violates the security properties of the system. Our results show that the underlying side-channel attack Flush+Reload used in both Meltdown and Spectre, is effective on all investigated platforms. We were also able to achieve high throughput using the Spectre attack, but we were not able to show any effective Meltdown attack on Okl4 or Nova.

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11875
Series
Security and Cryptology ; 11875
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-162665 (URN)10.1007/978-3-030-35055-0_15 (DOI)000611477300015 ()9783030350543 (ISBN)9783030350550 (ISBN)
Available from: 2019-12-13 Created: 2019-12-13 Last updated: 2024-11-18Bibliographically approved
Organisations

Search in DiVA

Show all publications