Unusable Security for Attackers

被引:0
作者
Zurko, Mary Ellen
机构
关键词
D O I
10.1109/MSEC.2023.3308648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the things that makes security research different from other research is the presence of attackers, potentially or in actuality. The early research I was exposed to barely touched on the attacker. The Trusted Computer System Evaluation Criteria from the 1980s had hardly a whisper of functionality specifically for countering attacks, beyond auditing security relevant events. When we were researching and composing secure systems, most of us thought that antivirus, when it emerged, was a fool's game. Who could possibly catch all the different ways an attacker might go about breaching a system? The first question put to a presentation on intrusion detection system (IDS) research was predictably "How did you know that the system was free of attacks when you baselined it?"
引用
收藏
页码:4 / 7
页数:4
相关论文
共 50 条
[41]   On locating Byzantine attackers [J].
Siavoshani, Mahdi Jafari ;
Fragouli, Christina ;
Diggavi, Suhas .
2008 FOURTH WORKSHOP ON NETWORK CODING, THEORY, AND APPLICATIONS: NETCOD 2008, PROCEEDINGS, 2008, :62-67
[42]   Getting ahead of the attackers [J].
Garcia D. .
Computer Fraud and Security, 2023, 2023 (03)
[43]   Honeypots and the Attackers Bias [J].
Hassan, Sharif ;
Guha, Ratan .
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, :533-542
[44]   Opacity with powerful attackers [J].
Helouet, Loic ;
Marchand, Herve ;
Ricker, Laurie .
IFAC PAPERSONLINE, 2018, 51 (07) :464-471
[45]   Catalysis of the biodegradation of unusable medicines by alkanotrophic rhodococci [J].
Ivshina, I. B. ;
Rychkova, M. I. ;
Vikhareva, E. V. ;
Chekryshkina, L. A. ;
Mishenina, I. I. .
APPLIED BIOCHEMISTRY AND MICROBIOLOGY, 2006, 42 (04) :392-395
[46]   NEW CERVICAL CYTOLOGY REQUEST FORM IS UNUSABLE [J].
CLARK, JV ;
SHARP, AJ .
BRITISH MEDICAL JOURNAL, 1989, 298 (6670) :371-372
[47]   SPACE PROCESSED HORMONE FOUND CONTAMINATED, UNUSABLE [J].
COVAULT, C .
AVIATION WEEK & SPACE TECHNOLOGY, 1984, 121 (20) :19-21
[48]   NEW LIFE FOR UNUSABLE ELECTROPOLISHED TEM FOILS [J].
SMITHWACKERLE, VL ;
TRYBUS, CL .
ULTRAMICROSCOPY, 1992, 40 (02) :187-190
[49]   Half of drug donations to Bosnia unusable [J].
不详 .
AMERICAN JOURNAL OF HEALTH-SYSTEM PHARMACY, 1998, 55 (03) :212-212
[50]   Blockwise-adaptive attackers - Revisiting the (In)security of some provably secure encryption modes: CBC, GEM, IACBC [J].
Joux, A ;
Martineti, G ;
Valette, F .
ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 :17-30