skip to main content
10.1145/1600176.1600191acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Computing under occupation

Published:15 July 2008Publication History

ABSTRACT

Recent investigations have found a massively increasing professionalisation and organization of attacks executed on consumer computing systems. Simultaneously, the systems we are trying to defend are getting more and more complex and networked, while promising security technologies---such as trusted boot and strong process isolation---appear to have troubles finding their way into mainstream devices.

This leads us to the conclusion that we may be forced to accept that the security war is lost for now, and that a considerable portion of all consumer PCs is under control of some organized malicious entity. In this work, we investigate the options left to the defenders in this scenario: Assuming that PC World is under control of a hostile force, how can we (a) survive (i.e., work) in a meaningful way, and (b) destroy the economic value for the attacker without severely damaging our own resources.

References

  1. The CAPTCHA project. http://www.captcha.net.Google ScholarGoogle Scholar
  2. Hemavathy Alanandam, Pravin Mittal, Avichal Singh, and Chris Fleizach. Cybercriminal activity. http://www.cs.ucsd.edu/~cfleizac/WhiteTeam-CyberCrime.pdf, 2006.Google ScholarGoogle Scholar
  3. B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, Salil Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology---CRYPTO'01, volume 2139 of Lecture Notes in Computer Science, pages 1--18. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bob Blakley. The emperor's old armor. In Proceedings of the 1996 Workshop on New Security Paradigms (NSPW'96), pages 2--16, New York, NY, USA, 1996. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Bond and G. Danezis. A pact with the Devil. In Proceedings of the 2006 Workshop on New Security Paradigms (NSPW'06). ACM Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. William Cheswick. Johnny can obfuscate: Beyond mother's maiden name. In First USENIX Workshop on Hot Topics in Security, pages 31--36, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the Twentieth ACM Symposium on Operating Systems Principles (SOSP'05), pages 133--147. ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Richard Ford and Sarah Gordon. Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. In Proceedings of the 2006 Workshop on New Security Paradigms (NSPW'06), pages 3--10, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Peter Gutmann. The commercial malware industry. http://www.cs.auckland.ac.nz/~pgut001/pubs/malware_biz.pdf.Google ScholarGoogle Scholar
  10. R. Hu and A. Mok. Detecting unknown massive mailing viruses using proactive methods. In Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, volume 3224 of Lecture Notes in Computer Science, pages 82--101. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  11. Collin Jackson, Dan Boneh, and Jon Mitchel. Transaction generators: Root kits for web. In Second USENIX Workshop on Hot Topics in Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Don Jackson. Gozi trojan. http://www.secureworks.com/research/threats/gozi/, 2007.Google ScholarGoogle Scholar
  13. Carl Landwehr. Secure grid computing: An empirical view. http://www.laas.fr/IFIPWG/Workshops&Meetings/48/WS1/10-Landwehr.pdf, 2005.Google ScholarGoogle Scholar
  14. M. Locasto, S. Sidiroglou, and A. D. Keromytis:. Software self-healing using collaborative application communities. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2006), 2006.Google ScholarGoogle Scholar
  15. M. Locasto, A. Stavrou, and A. Keromytis. Dark application communities. In Proceedings of the 2006 Workshop on New Security Paradigms (NSPW'06). ACM Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. McAfee. Virtual criminology report. http://www.mcafee.com/us/local_content/white_papers/threat_center/wp virtual_criminology_report_2007.pdf, 2006.Google ScholarGoogle Scholar
  17. Bill McCarty. Automated identity theft. IEEE Security and Privacy, 01(5):89--92, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Nelson. Unhelpfulness as a security policy or it's about time. In Proceedings of the 1995 Workshop on New Security Paradigms (NSPW'95), pages 29--32. IEEE Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Raiciu, M. Handley, and D. Rosenblum. Exploit hijacking: Side effects of smart defenses. In Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense (LSAD '06), pages 123--130, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stefan Savage. Unwanted traffic: Roots of the problem. http://www.iab.org/about/workshops/unwantedtraffic/Session2_Stefan.pdf, 2006.Google ScholarGoogle Scholar
  21. Symantec Internet security threat report, trends for July-December 2006. http://www.symantec.com.Google ScholarGoogle Scholar
  22. J. Tucek, S. Lu, C. Huang, S. Xanthos, Y. Zhou, J. Newsome, D. Brumley, and D. Song. Sweeper: A lightweight end-to-end system for defending against fast worms. In Proceedings of the 2007 European Conference on Computer Systems (EuroSys'07), pages 115--128. ACM Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In 18th Annual Computer Security Applications Conference (ACSAC 2002), pages 61--68. IEEE Computer Society, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Computing under occupation

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        NSPW '07: Proceedings of the 2007 Workshop on New Security Paradigms
        July 2008
        109 pages
        ISBN:9781605580807
        DOI:10.1145/1600176

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 July 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate62of170submissions,36%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader