首页> 外文期刊>Journal of Cryptology >FlipIt: The Game of “Stealthy Takeover”
【24h】

FlipIt: The Game of “Stealthy Takeover”

机译:FlipIt:“秘密接管”游戏

获取原文
       

摘要

Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very secrecy of “secret” keys that cryptographers assume in designing secure protocols. In this article, we introduce a game-theoretic framework for modeling various computer security scenarios prevalent today, including targeted attacks. We are particularly interested in situations in which an attacker periodically compromises a system or critical resource completely, learns all its secret information and is not immediately detected by the system owner or defender. We propose a two-player game between an attacker and defender called FlipIt or The Game of “Stealthy Takeover.” In FlipIt, players compete to control a shared resource. Unlike most existing games, FlipIt allows players to move at any given time, taking control of the resource. The identity of the player controlling the resource, however, is not revealed until a player actually moves. To move, a player pays a certain move cost. The objective of each player is to control the resource a large fraction of time, while minimizing his total move cost. FlipIt provides a simple and elegant framework in which we can formally reason about the interaction between attackers and defenders in practical scenarios. In this article, we restrict ourselves to games in which one of the players (the defender) plays with a renewal strategy, one in which the intervals between consecutive moves are chosen independently and uniformly at random from a fixed probability distribution. We consider attacker strategies ranging in increasing sophistication from simple periodic strategies (with moves spaced at equal time intervals) to more complex adaptive strategies, in which moves are determined based on feedback received during the game. For different classes of strategies employed by the attacker, we determine strongly dominant strategies for both players (when they exist), strategies that achieve higher benefit than all other strategies in a particular class. When strongly dominant strategies do not exist, our goal is to characterize the residual game consisting of strategies that are not strongly dominated by other strategies. We also prove equivalence or strict inclusion of certain classes of strategies under different conditions. Our analysis of different FlipIt variants teaches cryptographers, system designers, and the community at large some valuable lessons: 1. Systems should be designed under the assumption of repeated total compromise, including theft of cryptographic keys. FlipIt provides guidance on how to implement a cost-effective defensive strategy.
机译:最近的针对性攻击在复杂性方面已大大增加,破坏了大多数密码原语用于安全性的基本假设。例如,发起高级持久威胁(APT)的攻击者可以窃取完整的加密密钥,这违反了密码学家在设计安全协议时假定的“秘密”密钥的高度机密性。在本文中,我们介绍了一种用于模拟当今流行的各种计算机安全方案(包括针对性攻击)的游戏理论框架。对于攻击者定期完全破坏系统或关键资源,了解其所有机密信息并且系统所有者或防御者未立即检测到的情况,我们特别感兴趣。我们建议在攻击者和防御者之间进行两人游戏,称为FlipIt或“隐形收购”。在FlipIt中,玩家竞争以控制共享资源。与大多数现有游戏不同,FlipIt允许玩家在任何给定时间移动,从而控制资源。但是,直到玩家实际移动时,才显示控制资源的玩家的身份。要移动,玩家需要支付一定的移动费用。每个玩家的目标是在很短的时间内控制资源,同时最大程度地降低其总移动成本。 FlipIt提供了一个简单而优雅的框架,在此框架中,我们可以正式推断实际情况下攻击者和防御者之间的互动。在本文中,我们将自己限制在其中一名球员(防守者)采用更新策略进行比赛的游戏中,其中从固定的概率分布中独立且均匀地随机选择连续动作之间的间隔。我们考虑的攻击者策略范围从简单的周期性策略(动作间隔相等的时间间隔)到越来越复杂的自适应策略,在这些策略中,动作是根据游戏期间收到的反馈来确定的。对于攻击者采用的不同策略类别,我们为这两个参与者(如果存在)确定了强势主导的策略,这些策略比特定类别中的所有其他策略获得更高的收益。当不存在强势主导的策略时,我们的目标是表征不由其他策略强烈主导的策略组成的剩余博弈。我们还证明了在不同条件下等同或严格包含某些类别的策略。我们对不同FlipIt变体的分析向密码学家,系统设计人员和整个社区讲授了一些宝贵的经验教训:1.系统应该在反复完全妥协的前提下进行设计,包括盗窃密码密钥。 FlipIt提供有关如何实施具有成本效益的防御策略的指南。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号