Abstract
There are many examples of parties that are seemingly in opposition working together. In this position paper, we explore this in the context of security protocols with an emphasis on how these examples might produce long-term benefits for the “good guys” and how a formal model might be used to help prescribe approaches to collaboration with the “bad guys.”
Work supported by ONR and DARPA.
Work partially carried out with support from the National Science Foundation under grants CNS-1018557 and CCF-1101690.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)
Frederick, S., Loewenstein, G., O’Donoghue, T.: Time discounting and time preference: a critical review. J. Econ. Lit. 40(2), 351–401 (2002)
Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1–18. Springer, Heidelberg (2009)
Kannan, K., Telang, R.: An economic analysis of markets for software vulnerabilities. In: Proceedings of the Third Workshop of Economics and Information Security (2004)
Ozment, A.: Bug auctions: vulnerability markets reconsidered. In: Proceedings of the Third Workshop of Economics and Information Security (2004)
Samuelson, P.A.: A note on measurement of utility. Rev. Econ. Stud. 4(2), 155–161 (1937)
Schecter, S.: Quantitatively differentiating system security. In: Proceedings of the First Workshop of Economics and Information Security (2002)
Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machiavelli. In: First Workshop on Issues in the Theory of Security WITS’00, pp. 87–92 (2000)
Zetter, K.: TJX hacker gets 20 years in prison. Wired Magazine (2010). www.wired.com/threatlevel/2010/03/tjx-sentencing
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Jaggard, A.D., Wright, R.N. (2014). Strange Bedfellows: How and When to Work with Your Enemy. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)