Security

FlipIt: The Game of "Stealthy Takeover"

Free registration required

Executive Summary

Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very secrecy of "Secret" keys that cryptographers assume in designing secure protocols. In this paper, the authors introduce a game-theoretic framework for modeling various computer security scenarios prevalent today, including targeted attacks. They are particularly interested in situations in which an attacker periodically compromises a system or critical resource completely, learns all its secret information and is not immediately detected by the system owner or defender.

  • Format: PDF
  • Size: 641.99 KB