Formally modeling deceptive patches using a game-based approach

被引:4
作者
Avery, Jeffrey [1 ,2 ]
Wallrabenstein, John Ross [3 ]
机构
[1] Northrop Grumman Corp, Mclean, VA 22102 USA
[2] Purdue Univ, Dept Comp Sci, CERIAS, W Lafayette, IN 47907 USA
[3] Analog Devices Inc, W Lafayette, IN USA
基金
美国国家科学基金会;
关键词
Security; Software patching; Deceptive impact; Game-based modeling; Implementing deceptive patches;
D O I
10.1016/j.cose.2018.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paradigm that deceptive data, tools and behavior are difficult to distinguish from their legitimate counterparts is intuitively understood, but a formal representation of why deception works and its impact on the security provided by patches is lacking. As an emerging research area, it is important to develop this strong foundation from which to reason about the security impact of proposed techniques. Thus, we present a number of deceptive models that represent a variety of deceptive patches to move toward a formal model of deception. These models identify theoretically secure techniques as well as those that fall short of theoretical security. For techniques that fall short, additional analysis shows they could still be effective in practice. In this research, we first introduce formal game-based security definitions that capture the technique's claimed security impact and present a general game-based model using these definitions. We then apply this general model to faux, obfuscated, and active response patches to formally analyze their security impact. Finally, we discuss whether these ideal properties of deceptive systems can be achieved in reality. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:182 / 190
页数:9
相关论文
共 26 条
[1]  
Almeshekah M.H., 2014, Proceedings of the 2014 workshop on New Security Paradigms Workshop-NSPW'14, P127, DOI [10.1145/2683467.2683482, DOI 10.1145/2683467.2683482]
[2]  
Almeshekah M.H., 2016, Cyber Deception, P25
[3]  
[Anonymous], 12 WORK C REV ENG
[4]  
[Anonymous], 2015, THESIS
[5]  
[Anonymous], 2011, LEADING ISSUES INFOR
[6]  
Araujo F, 2015, WORKSH CYB SEC EXP T
[7]   From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation [J].
Araujo, Frederico ;
Hamlen, Kevin W. ;
Biedermann, Sebastian ;
Katzenbeisser, Stefan .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :942-953
[8]  
Avery J, 2017, INT C ICT SYST SEC P
[9]  
Avery JK, 2017, THESIS
[10]  
Avgerinos Thanassis., 2011, Proceedings of the 18th Symposium on Network and Distributed System Security (NDSS), P59