skip to main content
10.1145/2767386.2767453acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
invited-talk

The "Mobile Adversary" Paradigm in Distributed Computation and Systems

Published:21 July 2015Publication History

ABSTRACT

The notion of `mobile adversary,' where the opponent can capture parties in a multi-party protocol dynamically, as long as at any given point in time its capturing capability is limited by a bound on number of parties (processors) it can control, has been suggested as an extensions of the traditionally static adversary. The motivation for this adversary was a result of a few issues: First, it was originated in systems corruption phenomena like virus injection into a computer network (such as the Internet), where viruses are spread but also detected and eliminated at network computers. Secondly, it is natural to assume that for managed networks, there will be efforts to recover failed processors, so the adversary control may cease to exist in a node locally while its control of other nodes continues. Thirdly, the notion of self-stabilization implies that a system tries to get rid of failures and the notion represents a strong fault-tolerance aspect, and should be extended (i.e., augmented by assuming bound on faults and extending initial benign fault to adversarial perpetual ones). As a result, the mobile adversary notion and a methodology for coping with it (proactive fault-tolerance, or proactive security in security oriented protocols) and its perpetual self-healing character, have been suggested. This work will review the development and influence of this notion on fault-tolerant secure distributed computing.

References

  1. Rafail Ostrovsky, Moti Yung. How to withstand mobile virus attacks. PODC 1991: 51--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Juan A. Garay. Reaching (and Maintaining) Agreement in the Presence of Mobile Faults (Extended Abstract). WDAG 1994: 253--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Miguel Castro, Barbara Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4): 398--461 (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lidong Zhou, Fred B. Schneider, Robbert van Renesse. APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3):259--286 (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky. How to withstand mobile virus attacks, revisited. PODC 2014: 293--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ran Canetti, Amir Herzberg. Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425--438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339--352. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung. Optimal Resilience Proactive Public--Key Cryptosystems. FOCS 1997: 384--393. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Matthew K. Franklin, Zvi Galil, Moti Yung. Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems. FOCS 1993: 670--679. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Paul G. Spirakis, Basil Tampakas, Hera Antonopoulou. Distributed Protocols Against Mobile Eavesdroppers. WDAG 1995: 160--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Tom Roeder, Fred B. Schneider. Proactive obfuscation. ACM Trans. Comput. Syst. 28(2) (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The "Mobile Adversary" Paradigm in Distributed Computation and Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          PODC '15: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
          July 2015
          508 pages
          ISBN:9781450336178
          DOI:10.1145/2767386

          Copyright © 2015 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 July 2015

          Check for updates

          Qualifiers

          • invited-talk

          Acceptance Rates

          PODC '15 Paper Acceptance Rate45of191submissions,24%Overall Acceptance Rate740of2,477submissions,30%

          Upcoming Conference

          PODC '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader