<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Wed, 06 May 2026 13:35:34 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?tag=cyberseccurity">
  <NewsItem contentIssues="true" id="135790" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/135790">
  <Title>talk: Analysis of Session Binding Proxy Protocol, 12-1 9/29</Title>
  <Tagline>Advantages and Dangers of Oblivious Protocol Participants</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2023/09/Prevent_Session_Hijacking_by_Binding_the_Session_to_the_Cryptographic_Network_Credentials-NORDSEC_2013-2.jpg" style="max-width: 100%; height: auto;"></div><div><span><small><br></small></span></div><div><span><small>SBP protocol prevents session hijacking by binding application session to underlying network session</small></span></div><div><strong><br></strong></div><div><strong>The UMBC Cyber Defense Lab presents</strong></div><div><br></div><div><strong>Formal-Methods Analysis of the Session Binding Proxy Protocol:</strong></div><div><strong>Advantages and Dangers of Oblivious Protocol Participants</strong></div><div><strong><br></strong></div><div><strong> 12-1:00 pm, Friday, 29 September 2023, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></div><div><br></div><div><strong>Enis Golaszewski, <span>PhD Student, CSEE, UMBC</span></strong></div><div><br></div><div>Joint work with Alan T. Sherman, Edward Zieglar, and Kirellos Abou Elsaad</div><div><br></div><div>We present a formal-methods analysis of the <strong>Session Binding Proxy (SBP) protocol</strong>, in which we highlight the advantages and dangers of an oblivious protocol participant: an unaware web server residing behind an SBP reverse-proxy. We carry out our analysis using the <a href="https://hackage.haskell.org/package/cpsa" rel="nofollow external" class="bo">Cryptographic Protocol Shapes Analyzer</a> (CPSA) on three deployment variations of SBP: a server that embeds a proxy, a stand-alone proxy on a private network, and a stand-alone proxy on a public network. Our analysis reveals fundamental issues affecting oblivious protocol participants in a Dolev-Yao (DY) network: to mitigate adversarial protocol interactions, deployments of SBP must ensure that the server authenticate and communicate exclusively with a legitimate proxy by establishing a private communication channel, deploying mutual authentication such as mutual Transport Layer Security (mTLS), or embedding the proxy with the server.</div><div><br></div><div>Our work identifies benefits and risks of wrapper protocols such as SBP, which wrap existing legacy or third-party systems to mitigate known vulnerabilities. Additionally, we identify minimal requirements for cryptographic binding, a vital tool for resisting protocol interactions, implement a "tailgating" attack on SBP, and discuss the pitfalls of ad-hoc, overly constrained adversarial models.</div><div><br></div><div>About the Speaker. Enis Golaszewski (<a href="mailto:golaszewski@umbc.edu">golaszewski@umbc.edu</a>) is a computer science PhD student at UMBC working with Prof. Alan T. Sherman, where he studies, researches, and teaches cryptographic protocol analysis.</div><div><br></div><div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.</div><div><br></div></div>
]]>
  </Body>
  <Summary>SBP protocol prevents session hijacking by binding application session to underlying network session     The UMBC Cyber Defense Lab presents     Formal-Methods Analysis of the Session Binding...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/135790/guest@my.umbc.edu/f43d9419df494363831473d9c64dea63/api/pixel</TrackingUrl>
  <Tag>cyberseccurity</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>UMBC Cyber Defense Lab</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 26 Sep 2023 20:39:44 -0400</PostedAt>
</NewsItem>
</News>
