Retaliation: Can We Live with Flaws?
نویسندگان
چکیده
Security protocols intend to give their parties reasonable assurance that certain security properties will protect their communication session. However, the literature confirms that the protocols may suffer subtle and hidden attacks. Flawed protocols are customarily sent back to the design process, but the costs of reengineering a deployed protocol may be prohibitive. This paper outlines the concept of retaliation: who would steal a sum of money today, should this pose significant risks of having twice as much stolen back tomorrow? Attacks are always balanced decisions: if an attack can be retaliated, the economics of security may convince us to live with a flawed protocol. This new perspective requires a new threat model where any party may decide to subvert the protocol for his own sake, depending on the risks of retaliation. This threat model, which for example is also suitable to studying non-repudiation protocols, seems more appropriate than the Dolev-Yao model to the present technological/social setting.
منابع مشابه
Retaliation Against Protocol Attacks
Security protocols intend to give their parties reasonable assurance that certain security properties will protect their communication session. However, the literature confirms that the protocols may suffer subtle and hidden attacks. Flawed protocols are customarily sent back to the design process, but the costs of reengineering a deployed protocol may be prohibitive. This paper outlines the co...
متن کاملرابطه عدالت سازمانی ادراک شده با رفتارهای تلافی جویانه با توجه به نقش باورهای جبران عدالت
This research was conducted with the aim of investigating the moderator role of justice compensation in relationship between perceived organizational justices and employees’ retaliatory behaviors. Research statistical population was the male's personnel of an industrial – productive complex in Isfahan City. 275 persons of them were selected from personnel’s' names list using systematic random s...
متن کاملModeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game
D the smuggling of nuclear weapons in container freight is critical. Previous work has suggested that such deterrence could be achieved by retaliation threats and partial inspection. However, pre-event declared retaliation threats may not be credible, causing the desired deterrence not to be achieved. In this paper, we extend and complement the work of Haphuriwat et al. (2011) to model credible...
متن کاملPreliminary evidence that acute stress moderates basal testosterone's association with retaliatory behavior.
A contribution to a special issue on Hormones and Human Competition. Testosterone is theorized to increase retaliation after social provocation. However, empirical evidence in support of these theories is mixed. The present research investigated whether acute stress causally suppresses testosterone's association with retaliation. We also explored sex differences in behavioral responses to acute...
متن کاملWhistleblowing in Organizations: An Examination of Correlates of Whistleblowing Intentions, Actions, and Retaliation
Whistleblowing on organizational wrongdoing is becoming increasingly prevalent. What aspects of the person, the context, and the transgression relate to whistleblowing intentions and to actual whistleblowing on corporate wrongdoing? Which aspects relate to retaliation against whistleblowers? Can we draw conclusions about the whistleblowing process by assessing whistleblowing intentions? Meta-an...
متن کامل