Matches in SemOpenAlex for { <https://semopenalex.org/work/W2185961772> ?p ?o ?g. }
Showing items 1 to 59 of
59
with 100 items per page.
- W2185961772 abstract "Invariably, new technologies introduce new vulnerabilities which often enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversary models seem to be perpetually out of date: often they do not capture adversary attacks and sometimes they address attacks rendered impractical by new technologies. In this panel presentation, I provide a brief overview of adversary models beginning with those required by program and data sharing technologies ('60-'70s), continuing with those required by computer communication and networking technologies ('70s-'90s), and ending with those required by and sensor network technologies ('00s ->). I argue that sensor, ad-hoc, and mesh networks require new models, that are able to account for physical node capture by adversaries. Protecting device secrets (e.g., cryptographic keys) via physical security mechanisms will continue to require network security measures, despite advances in physical security measures and devices. I argue that good-enough measures in the face of node capture by adversaries can be obtained by using emergent properties. Intuitively, these are properties that cannot be provided by individual network nodes--no matter how well-endowed nodes might bebut instead result from interaction and collaboration among multiple nodes. Such properties can be used to detect, often probabilistically, the presence of an adversary within a network and to pinpoint with reasonable accuracy the affected network area (e.g., identify a specific captured node, a particular property of captured nodes). However, all such measures require periodic network monitoring in normal mode to detect a somewhat rare event (i.e., node capture, replica insertion) and hence their cost can be high. I illustrate a new simple probabilistic protocol that avoids the effects of node capture by detecting adversaries attempts to access a node's internal state, and discuss various design trade-offs that will characterize much of the future research in this area." @default.
- W2185961772 created "2016-06-24" @default.
- W2185961772 creator A5010171786 @default.
- W2185961772 date "2008-01-01" @default.
- W2185961772 modified "2023-09-27" @default.
- W2185961772 title "On the Evolution of Adversary Models in Computer Systems and Networks" @default.
- W2185961772 hasPublicationYear "2008" @default.
- W2185961772 type Work @default.
- W2185961772 sameAs 2185961772 @default.
- W2185961772 citedByCount "0" @default.
- W2185961772 crossrefType "journal-article" @default.
- W2185961772 hasAuthorship W2185961772A5010171786 @default.
- W2185961772 hasConcept C127413603 @default.
- W2185961772 hasConcept C140547941 @default.
- W2185961772 hasConcept C178489894 @default.
- W2185961772 hasConcept C31258907 @default.
- W2185961772 hasConcept C38652104 @default.
- W2185961772 hasConcept C41008148 @default.
- W2185961772 hasConcept C41065033 @default.
- W2185961772 hasConcept C62611344 @default.
- W2185961772 hasConcept C66938386 @default.
- W2185961772 hasConcept C7606001 @default.
- W2185961772 hasConceptScore W2185961772C127413603 @default.
- W2185961772 hasConceptScore W2185961772C140547941 @default.
- W2185961772 hasConceptScore W2185961772C178489894 @default.
- W2185961772 hasConceptScore W2185961772C31258907 @default.
- W2185961772 hasConceptScore W2185961772C38652104 @default.
- W2185961772 hasConceptScore W2185961772C41008148 @default.
- W2185961772 hasConceptScore W2185961772C41065033 @default.
- W2185961772 hasConceptScore W2185961772C62611344 @default.
- W2185961772 hasConceptScore W2185961772C66938386 @default.
- W2185961772 hasConceptScore W2185961772C7606001 @default.
- W2185961772 hasLocation W21859617721 @default.
- W2185961772 hasOpenAccess W2185961772 @default.
- W2185961772 hasPrimaryLocation W21859617721 @default.
- W2185961772 hasRelatedWork W1892777606 @default.
- W2185961772 hasRelatedWork W1952596944 @default.
- W2185961772 hasRelatedWork W2016320410 @default.
- W2185961772 hasRelatedWork W2034199088 @default.
- W2185961772 hasRelatedWork W2039442723 @default.
- W2185961772 hasRelatedWork W2062729898 @default.
- W2185961772 hasRelatedWork W2139550682 @default.
- W2185961772 hasRelatedWork W2153608684 @default.
- W2185961772 hasRelatedWork W2235588678 @default.
- W2185961772 hasRelatedWork W2404477155 @default.
- W2185961772 hasRelatedWork W2405987584 @default.
- W2185961772 hasRelatedWork W2795990853 @default.
- W2185961772 hasRelatedWork W2891357018 @default.
- W2185961772 hasRelatedWork W2899831539 @default.
- W2185961772 hasRelatedWork W2901933342 @default.
- W2185961772 hasRelatedWork W3006855672 @default.
- W2185961772 hasRelatedWork W3177025875 @default.
- W2185961772 hasRelatedWork W51115498 @default.
- W2185961772 hasRelatedWork W193453162 @default.
- W2185961772 hasRelatedWork W2072080971 @default.
- W2185961772 isParatext "false" @default.
- W2185961772 isRetracted "false" @default.
- W2185961772 magId "2185961772" @default.
- W2185961772 workType "article" @default.