Show simple item record

dc.contributor.authorBowers, Kevin D.
dc.contributor.authorvan Dijk, Marten
dc.contributor.authorGriffin, Robert
dc.contributor.authorJuels, Ari
dc.contributor.authorOprea, Alina
dc.contributor.authorRivest, Ronald L.
dc.contributor.authorTriandopoulos, Nikos
dc.date.accessioned2014-10-07T17:58:55Z
dc.date.available2014-10-07T17:58:55Z
dc.date.issued2012
dc.identifier.isbn978-3-642-34265-3
dc.identifier.isbn978-3-642-34266-0
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/90591
dc.description.abstractMost cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. “Advanced Persistent Threats” (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys and other secrets. Such compromise is often silent, with defenders failing to detect the loss of private keys critical to protection of their systems. The growing virulence of today’s threats clearly calls for new models of defenders’ goals and abilities. In this paper, we explore applications of FlipIt, a novel game-theoretic model of system defense introduced in [14]. In FlipIt, an attacker periodically gains complete control of a system, with the unique feature that system compromises are stealthy, i.e., not immediately detected by the system owner, called the defender. We distill out several lessons from our study of FlipIt and demonstrate their application to several real-world problems, including password reset policies, key rotation, VM refresh and cloud auditing.en_US
dc.language.isoen_US
dc.publisherSpringer Science+Business Mediaen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-34266-0_15en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleDefending against the Unknown Enemy: Applying FlipIt to System Securityen_US
dc.typeArticleen_US
dc.identifier.citationBowers, Kevin D., Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos. “Defending Against the Unknown Enemy: Applying FlipIt to System Security.” Lecture Notes in Computer Science (2012): 248–263.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorRivest, Ronald L.en_US
dc.relation.journalDecision and Game Theory for Securityen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsBowers, Kevin D.; van Dijk, Marten; Griffin, Robert; Juels, Ari; Oprea, Alina; Rivest, Ronald L.; Triandopoulos, Nikosen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-7105-3690
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record