Advertisement

Strange Bedfellows: How and When to Work with Your Enemy

  • Aaron D. Jaggard
  • Rebecca N. WrightEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)

Abstract

There are many examples of parties that are seemingly in opposition working together. In this position paper, we explore this in the context of security protocols with an emphasis on how these examples might produce long-term benefits for the “good guys” and how a formal model might be used to help prescribe approaches to collaboration with the “bad guys.”

References

  1. 1.
    Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)Google Scholar
  2. 2.
    Frederick, S., Loewenstein, G., O’Donoghue, T.: Time discounting and time preference: a critical review. J. Econ. Lit. 40(2), 351–401 (2002)CrossRefGoogle Scholar
  3. 3.
    Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1–18. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  4. 4.
    Kannan, K., Telang, R.: An economic analysis of markets for software vulnerabilities. In: Proceedings of the Third Workshop of Economics and Information Security (2004)Google Scholar
  5. 5.
    Ozment, A.: Bug auctions: vulnerability markets reconsidered. In: Proceedings of the Third Workshop of Economics and Information Security (2004)Google Scholar
  6. 6.
    Samuelson, P.A.: A note on measurement of utility. Rev. Econ. Stud. 4(2), 155–161 (1937)CrossRefGoogle Scholar
  7. 7.
    Schecter, S.: Quantitatively differentiating system security. In: Proceedings of the First Workshop of Economics and Information Security (2002)Google Scholar
  8. 8.
    Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machiavelli. In: First Workshop on Issues in the Theory of Security WITS’00, pp. 87–92 (2000)Google Scholar
  9. 9.
    Zetter, K.: TJX hacker gets 20 years in prison. Wired Magazine (2010). www.wired.com/threatlevel/2010/03/tjx-sentencing

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.U.S. Naval Research LaboratoryWashington, DCUSA
  2. 2.DIMACS and Department of Computer ScienceRutgers UniversityPiscatawayUSA

Personalised recommendations