A Formal Methods Analysis of the Session Binding Proxy Protocol
| dc.contributor.advisor | Sherman, Alan T Zieglar, Edward | |
| dc.contributor.author | Abou Elsaad, Kirellos | |
| dc.contributor.department | Computer Science and Electrical Engineering | |
| dc.contributor.program | Computer Science | |
| dc.date.accessioned | 2023-07-07T16:02:09Z | |
| dc.date.available | 2023-07-07T16:02:09Z | |
| dc.date.issued | 2022-01-01 | |
| dc.description.abstract | Proposed by Burgers, Verdult, and Eekelen in 2013, the Session Binding Proxy (SBP) protocol intends to prevent session hijacking by binding the application session to the underlying network session (i.e., binding the session token to the SSL/TLS shared key). We present a formal methods analysis of SBP using the Cryptographic Protocol Shapes Analyzer (CPSA). Our analysis reveals that SBP relies critically on the successful establishment of a secure SSL/TLS channel, which can be undermined using well-known attacks. Also, we find that SBP allows for the partial hijacking of a session using a tailgating attack. In this attack, the adversary uses the server to inject and execute malicious code inside the client’s browser to extract the session token and forge a valid state-changing request to the server. SBP does not neutralize this attack because the request contains a valid session token and that is sent over the client’s existing SSL/TLS channel. The informal security analysis conducted by the originator of SBP failed to consider these attacks. To our knowledge, our work is the first formal methods analysis of SBP. | |
| dc.format | application:pdf | |
| dc.genre | thesis | |
| dc.identifier | doi:10.13016/m266s6-mjye | |
| dc.identifier.other | 12540 | |
| dc.identifier.uri | http://hdl.handle.net/11603/28461 | |
| dc.language | en | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Collection | |
| dc.relation.ispartof | UMBC Theses and Dissertations Collection | |
| dc.relation.ispartof | UMBC Graduate School Collection | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.rights | This item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu | |
| dc.source | Original File Name: AbouElsaad_umbc_0434M_12540.pdf | |
| dc.subject | cross site scripting | |
| dc.subject | Cryptographic Protocol Shapes Analyzer (CPSA) | |
| dc.subject | formal methods | |
| dc.subject | protocol analysis | |
| dc.subject | Session Binding Proxy (SBP) | |
| dc.subject | session hijacking | |
| dc.title | A Formal Methods Analysis of the Session Binding Proxy Protocol | |
| dc.type | Text | |
| dcterms.accessRights | Distribution Rights granted to UMBC by the author. | |
| dcterms.accessRights | Access limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission. |
