Booby Trapping Software

被引:26
作者
Crane, Stephen [1 ]
Larsen, Per [1 ]
Brunthaler, Stefan [1 ]
Franz, Michael [1 ]
机构
[1] Univ Calif Irvine, Donald Bren Sch Informat & Comp Sci, Irvine, CA 92697 USA
来源
PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13) | 2013年
关键词
D O I
10.1145/2535813.2535824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber warfare is asymmetric in the current paradigm, with attackers having the high ground over defenders. This asymmetry stems from the situation that attackers have the initiative, while defenders concentrate on passive fortifications. Defenders are constantly patching the newest hole in their defenses and creating taller and thicker walls, without placing guards on those walls to watch for the enemy and react to attacks. Current passive cyber security defenses such as intrusion detection, anti-virus, and hardened software are not sufficient to repel attackers. In fact, in conventional warfare this passivity would be entirely nonsensical, given the available active strategies, such as counterattacks and deception. Based on this observation, we have identified the technique of booby trapping software. This extends the arsenal of weaponry available to defenders with an active technique for directly reacting to attacks. Ultimately, we believe this approach will restore some of the much sought after equilibrium between attackers and defenders in the digital domain.
引用
收藏
页码:95 / 105
页数:11
相关论文
共 47 条
[1]  
Abadi M., 2009, ACM T INFORM SYSTEM, V13, P4
[2]  
[Anonymous], 2001, P 17 ANN COMP SEC AP
[3]  
[Anonymous], 2009, Proceedings of the 18th USENIX Security Symposium
[4]  
[Anonymous], HDB INFORM SECURITY
[5]  
[Anonymous], 2009, HOM PAX TEAM
[6]  
Ansel J, 2011, PLDI 11: PROCEEDINGS OF THE 2011 ACM CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, P355
[7]  
Anuar N. B., 2010, P 10 ANN INF SEC S A
[8]  
Balepin I, 2003, LECT NOTES COMPUT SC, V2820, P136
[9]  
Barrantes E. G., 2005, ACM Transactions on Information and Systems Security, V8, P3, DOI 10.1145/1053283.1053286
[10]  
Bletsch T., 2011, P 6 ACM S INF COMP C, P30