ABSTRACT
The notion of `mobile adversary,' where the opponent can capture parties in a multi-party protocol dynamically, as long as at any given point in time its capturing capability is limited by a bound on number of parties (processors) it can control, has been suggested as an extensions of the traditionally static adversary. The motivation for this adversary was a result of a few issues: First, it was originated in systems corruption phenomena like virus injection into a computer network (such as the Internet), where viruses are spread but also detected and eliminated at network computers. Secondly, it is natural to assume that for managed networks, there will be efforts to recover failed processors, so the adversary control may cease to exist in a node locally while its control of other nodes continues. Thirdly, the notion of self-stabilization implies that a system tries to get rid of failures and the notion represents a strong fault-tolerance aspect, and should be extended (i.e., augmented by assuming bound on faults and extending initial benign fault to adversarial perpetual ones). As a result, the mobile adversary notion and a methodology for coping with it (proactive fault-tolerance, or proactive security in security oriented protocols) and its perpetual self-healing character, have been suggested. This work will review the development and influence of this notion on fault-tolerant secure distributed computing.
- Rafail Ostrovsky, Moti Yung. How to withstand mobile virus attacks. PODC 1991: 51--59. Google ScholarDigital Library
- Juan A. Garay. Reaching (and Maintaining) Agreement in the Presence of Mobile Faults (Extended Abstract). WDAG 1994: 253--264. Google ScholarDigital Library
- Miguel Castro, Barbara Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4): 398--461 (2002). Google ScholarDigital Library
- Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88--97. Google ScholarDigital Library
- Lidong Zhou, Fred B. Schneider, Robbert van Renesse. APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3):259--286 (2005). Google ScholarDigital Library
- Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky. How to withstand mobile virus attacks, revisited. PODC 2014: 293--302. Google ScholarDigital Library
- Ran Canetti, Amir Herzberg. Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425--438. Google ScholarDigital Library
- Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339--352. Google ScholarDigital Library
- Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung. Optimal Resilience Proactive Public--Key Cryptosystems. FOCS 1997: 384--393. Google ScholarDigital Library
- Matthew K. Franklin, Zvi Galil, Moti Yung. Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems. FOCS 1993: 670--679. Google ScholarDigital Library
- Paul G. Spirakis, Basil Tampakas, Hera Antonopoulou. Distributed Protocols Against Mobile Eavesdroppers. WDAG 1995: 160--167. Google ScholarDigital Library
- Tom Roeder, Fred B. Schneider. Proactive obfuscation. ACM Trans. Comput. Syst. 28(2) (2010). Google ScholarDigital Library
Index Terms
- The "Mobile Adversary" Paradigm in Distributed Computation and Systems
Recommendations
How to withstand mobile virus attacks, revisited
PODC '14: Proceedings of the 2014 ACM symposium on Principles of distributed computingIn PODC 1991 Ostrovsky and Yung [35] introduced the proactive security model, where corruptions spread throughout the network, analogous to the spread of a virus or a worm. PODC 2006 distinguished lecture by Danny Dolev, that also appears in the PODC06 ...
Perfectly reliable and secure message transmission tolerating mobile adversary
We study the problem of perfectly reliable message transmission (PRMT) and perfectly secure message transmission (PSMT) in an undirected synchronous network tolerating an all powerful threshold mobile Byzantine adversary. Specifically, we show that the ...
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
ACISP '08: Proceedings of the 13th Australasian conference on Information Security and PrivacyIn this paper, we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of which is under the influence of an all ...
Comments