A Formal Methods Analysis of the Session Binding Proxy Protocol

dc.contributor.advisorSherman, Alan T Zieglar, Edward
dc.contributor.authorAbou Elsaad, Kirellos
dc.contributor.departmentComputer Science and Electrical Engineering
dc.contributor.programComputer Science
dc.date.accessioned2023-07-07T16:02:09Z
dc.date.available2023-07-07T16:02:09Z
dc.date.issued2022-01-01
dc.description.abstractProposed by Burgers, Verdult, and Eekelen in 2013, the Session Binding Proxy (SBP) protocol intends to prevent session hijacking by binding the application session to the underlying network session (i.e., binding the session token to the SSL/TLS shared key). We present a formal methods analysis of SBP using the Cryptographic Protocol Shapes Analyzer (CPSA). Our analysis reveals that SBP relies critically on the successful establishment of a secure SSL/TLS channel, which can be undermined using well-known attacks. Also, we find that SBP allows for the partial hijacking of a session using a tailgating attack. In this attack, the adversary uses the server to inject and execute malicious code inside the client’s browser to extract the session token and forge a valid state-changing request to the server. SBP does not neutralize this attack because the request contains a valid session token and that is sent over the client’s existing SSL/TLS channel. The informal security analysis conducted by the originator of SBP failed to consider these attacks. To our knowledge, our work is the first formal methods analysis of SBP.
dc.formatapplication:pdf
dc.genrethesis
dc.identifierdoi:10.13016/m266s6-mjye
dc.identifier.other12540
dc.identifier.urihttp://hdl.handle.net/11603/28461
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu
dc.sourceOriginal File Name: AbouElsaad_umbc_0434M_12540.pdf
dc.subjectcross site scripting
dc.subjectCryptographic Protocol Shapes Analyzer (CPSA)
dc.subjectformal methods
dc.subjectprotocol analysis
dc.subjectSession Binding Proxy (SBP)
dc.subjectsession hijacking
dc.titleA Formal Methods Analysis of the Session Binding Proxy Protocol
dc.typeText
dcterms.accessRightsDistribution Rights granted to UMBC by the author.
dcterms.accessRightsAccess limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission.

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AbouElsaad_umbc_0434M_12540.pdf
Size:
1.05 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Abou_Elsaad-Kirellos_Open.pdf
Size:
550.46 KB
Format:
Adobe Portable Document Format
Description: