components and associated protocols. Our models allow for
an unbounded number of users engaging in an unbounded
number of sessions and allow the adversary to control user
location and travel patterns, COVID-19 diagnostics and net-
work communication. We further consider an attacker who
can compromise any entity in the system, including users’
phones, health authorities and national back ends. For each
of the models, we ask the following questions:
a)
Under what circumstances can an attacker pollute the
ENS with forged information which will impact the risk
computation?
b)
Under what circumstances can an attacker mislead a user
into believing they are at risk of infection?
By finding answers to these questions, we develop an ontol-
ogy of possible attacks which systematises the result of much
previous work claiming various attacks or proposing improve-
ments without evidence (discussed in Section 2). The gener-
ality of our threat model allows us to compare the discussed
systems with the required level of detail.
We discover attack patterns that are common across all
systems, but also attacks that distinguish centralised and de-
centralised systems. This is fairly obvious in scenarios with
back end compromise, but we also discover an important dif-
ference in the scalability of an attack when a phone of an
infected user is under the adversary’s control. While isolated
false alarms can severely impact individuals, a large-scale
attack can render the whole system unusable, severely impact-
ing epidemic control efforts.
Independent of the architecture, the authentication schemes
used in the three proposals give vastly different guarantees,
which is largely because interactive schemes are hard to de-
ploy at the necessary scale. We also find that federation in-
creases the vulnerability to attacks on other countries’ health
authorities, with a stronger impact on centralised than decen-
tralised systems. In total, we find 27 attack patterns across
ROBERT, DP3T and the CWA, providing a detailed answer
of the two previously posed questions.
Contributions
This paper makes the following contribu-
tions: (a) The first formal security analysis of the most widely
deployed ENS. (b) A systematic evaluation of the trade-offs
between these systems w.r.t. a powerful shared threat model.
(c) Novel techniques for modelling spatial and temporal as-
pects of these protocols. They are amenable for automated
analysis and can be reused to model proposed refinements,
extensions and designs.
Outline
In Section 2, we discuss related work on the se-
curity of ENS. We then introduce ROBERT, DP3T and the
CWA in Section 3. The modelling of the systems is discussed
in Section 4and their security properties in Section 5. The
results of our analysis are presented in Section 6, limitations
in Section 7. Finally, we conclude in Section 8.
2 Related Work
A substantial amount of previous work has proposed alter-
native ENS [11,28,29] and presented informal assessments
of their properties [30,18,2,33,9,5,6]. However, only
three [15,22,10] undertook a formal analysis of the security
properties of ENS. In this section, we review these in detail,
postponing a discussion of previously published attacks until
we discuss our taxonomy in Section 6.
Danz et al. [15] investigate the security and privacy of the
Temporary Contact Numbers Protocol and the early DP3T
proposals, as well as the currently deployed GAEN frame-
work. Their analysis is focused on the ‘cryptographic core’ of
each proposal, specifically the Bluetooth proximity protocol.
Unlike our work, they do not consider the security of the au-
thorisation procedure for uploads and do not model the back
end infrastructure or the spatial distribution of users. How-
ever, as they carry out their analysis by hand in the computa-
tional model, they are able to define and prove various privacy
properties for the respective Bluetooth proximity protocols.
Kobeissi, Nicolas, and Tiwari [22] build a model of DP3T
in order to demonstrate the flexibility and friendliness of their
new protocol analysis tool. As the model was developed as an
example, it only captures some parts of the protocol, limited
to only three participants interacting in a prescribed pattern
without an authorisation procedure.
Canetti et al. [10] propose two novel ENS and investigate
their security and privacy. They formalise their security no-
tions partly in the UC (universal composability) model and
partly via game based definitions. Although their UC model
provides a computational proof that the modelled systems
meet their specified ideal functionality, the concrete implica-
tions of this ideal functionality are not explored and extracting
the resulting security properties is a considerable challenge.
Similar to Danz et al. [15], they model their proposed Blue-
tooth proximity protocols in detail, but leave the rest of their
system, e.g. back end infrastructure and upload authorisation,
abstract.
3 Exposure Notification Systems
In this section, we describe the design of ROBERT, GAEN,
DP3T and the CWA.
We first introduce ROBERT, the centralised ENS de-
signed by INRIA PRIVATICS and Fraunhofer AISEC [12].
ROBERT was proposed in April 2020 and deployed in the offi-
cial French contact tracing application ‘StopCovid’ on 2 June
2020 (later rebranded to ‘TousAntiCovid’). With over 12.3
million downloads, it is the most popular centralised ENS.
We then describe the GAEN framework which underlies
many deployed decentralised systems. It is a library inte-
grated with Google’s Android OS and Apple’s iOS to provide
a Bluetooth proximity protocol. Next, we detail DP3T which
predates the GAEN specification and is substantially similar