Skip to main content

Ethical Proactive Threat Research

  • Conference paper
Financial Cryptography and Data Security (FC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6054))

Included in the following conference series:

Abstract

Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Higgins, K.J.: Study: Antivirus software catches about half of malware, misses 15 percent altogether. Dark Reading (March 2, 2009)

    Google Scholar 

  2. Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: 17th USENIX Security Symposium, pp. 91–106 (2008)

    Google Scholar 

  3. Nachenberg, C., Ramzan, Z., Seshadri, V.: Reputation: A new chapter in malware protection. In: 19th Virus Bulletin International Conference, pp. 185–191 (2009)

    Google Scholar 

  4. Yan, W., Arrott, A., McArdle, R., Roesler, M.: Volume of threat: The AV update deployment bottleneck. In: 19th Virus Bulletin International Conference, pp. 232–234 (2009)

    Google Scholar 

  5. Cohen, F.: Computer viruses: Theory and experiments. Computers & Security 6(1), 22–35 (1987)

    Article  Google Scholar 

  6. Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: 14th ACM Conference on Computer and Communications Security, pp. 375–388 (2007)

    Google Scholar 

  7. Aycock, J.: Computer Viruses and Malware. Springer, Heidelberg (2006)

    Google Scholar 

  8. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, Reading (2005)

    Google Scholar 

  9. Edgar, S.L.: Morality and Machines. Jones and Bartlett, USA (2003)

    Google Scholar 

  10. Himma, K.E.: Internet Security. Jones and Bartlett, USA (2007)

    Google Scholar 

  11. Neumann, P.G.: Computer security and human values. In: Computer Ethics and Professional Responsibility. Blackwell, Malden (2004)

    Google Scholar 

  12. Spafford, E.H.: Are computer hacker break-ins ethical? In: Computer Ethics and Professional Responsibility. Blackwell, Malden (2004)

    Google Scholar 

  13. Spinello, R.: Cyberethics. Jones and Bartlett, USA (2006)

    Google Scholar 

  14. Aycock, J., Maurushat, A.: Future threats. In: 17th Virus Bulletin International Conference, pp. 275–281 (2007)

    Google Scholar 

  15. Sullins, J.P.: Artificial moral agency in technoethics. In: Luppicini, R., Adell, R. (eds.) Handbook of Research on Technoethics, pp. 205–221. Idea Group, USA (2008)

    Google Scholar 

  16. Association for Computing Machinery: ACM code of ethics and professional conduct (1992), http://www.acm.org/about/code-of-ethics

  17. Floridi, L.: Understanding information ethics. The American Philosophical Association Newsletter on Computers and Society 7(1) (2007)

    Google Scholar 

  18. Staniford, S., Moore, D., Paxson, V., Weaver, N.: The top speed of flash worms. In: Proceedings of the 2004 ACM Workshop on Rapid Malcode, pp. 33–42 (2004)

    Google Scholar 

  19. Vogt, R.A.: The threat of biologically-inspired self-stopping worms. Master’s thesis, University of Calgary (2008)

    Google Scholar 

  20. Szabo, J., Aycock, J., Acton, R., Denzinger, J.: The tale of the weather worm. In: ACM Symposium on Applied Computing, pp. 2097–2102 (2008)

    Google Scholar 

  21. Aycock, J., Gutiérrez Cárdenas, J.M., de Castro, D.M.N.: Code obfuscation using pseudo-random number generators. In: 1st International Workshop on Software Security Process., pp. 418–423 (2009)

    Google Scholar 

  22. Swimmer, M., Leiba, B., Whalley, I., Borenstein, N.: Breaking anti-spam systems with parasitic spam. In: Third Conference on Email and Anti-Spam (2006)

    Google Scholar 

  23. Borello, J.M., Filiol, É., Mé, L.: Are current antivirus programs able to detect complex metamorphic malware? An empirical evaluation. In: 18th Annual EICAR Conference, pp. 45–63 (2009)

    Google Scholar 

  24. Aycock, J., Barker, K.: Creating a secure computer virus laboratory. In: 13th Annual EICAR Conference, 13 pp. (2004)

    Google Scholar 

  25. Davis, J.: Secret geek A-team hacks back, defends worldwide web. Wired 16.12 (November 24, 2008)

    Google Scholar 

  26. Sullins, J.P.: Ethics and artificial life: From modeling to moral agents. Ethics and Information Technology 7, 139–148 (2005)

    Article  Google Scholar 

  27. Sullins, J.P.: When is a robot a moral agent? International Review of Information Ethics 6 (December 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aycock, J., Sullins, J. (2010). Ethical Proactive Threat Research. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14992-4_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14991-7

  • Online ISBN: 978-3-642-14992-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics