Security Research for the Public Good: A Principled Approach

Recent history is littered with examples of software vendors betraying user trust, exposing the public to exploitable code, data leaks, and invasive privacy practices. Undirected security research may be insufficient for preventing such foreseeable and preventable failures, as these problems are oft...

Full description

Bibliographic Details
Main Author: Specter, Michael A.
Other Authors: Sussman, Gerald Jay
Format: Thesis
Published: Massachusetts Institute of Technology 2022
Online Access:https://hdl.handle.net/1721.1/140067
_version_ 1826197843203850240
author Specter, Michael A.
author2 Sussman, Gerald Jay
author_facet Sussman, Gerald Jay
Specter, Michael A.
author_sort Specter, Michael A.
collection MIT
description Recent history is littered with examples of software vendors betraying user trust, exposing the public to exploitable code, data leaks, and invasive privacy practices. Undirected security research may be insufficient for preventing such foreseeable and preventable failures, as these problems are often the result of misaligned vendor incentives rather than the technical specifics of the systems themselves. This dissertation illustrates the utility of security research that is motivated explicitly by the goal of realigning incentives of market actors toward providing better security. We find that a research approach guided by a deep understanding of the economic, regulatory, and technical attributes of the actors involved is crucial for solving important societally-relevant problems in computer security. We present three case studies in applying this vision: Our first case study considers vulnerability discovery as applied to Internet voting. We perform a security analysis of the dominant Internet voting systems used in U.S. federal elections, including those used in the 2020 U.S. presidential race. We find that, despite decades of research in cryptography and voting, all deployed systems are of simplistic design and suffer basic security and privacy problems, supporting the conclusion that the market is in failure. Our second case study involves designing cryptography to disincentivize (rather than prevent) bad behavior through the example of deniability in messaging. We find that the evolution of the email ecosystem has inadvertently resulted in most messages being nonrepudiable, incentivizing email theft and public exposure of private data. We present cryptographic constructions that solve this problem while fitting in with email’s already complicated ecosystem. Our final case study involves government requests to mandate law enforcement access to encrypted data, colloquially known as ‘backdooring’ encryption. We perform a security analysis of technical proposals to provide such government exceptional access, and find that they would cause untenable security and privacy risks. Finally, we conclude with a discussion of security research as a public good, and provide direction for future work.
first_indexed 2024-09-23T10:54:09Z
format Thesis
id mit-1721.1/140067
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T10:54:09Z
publishDate 2022
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1400672022-02-08T03:47:37Z Security Research for the Public Good: A Principled Approach Specter, Michael A. Sussman, Gerald Jay Weitzner, Daniel J. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Recent history is littered with examples of software vendors betraying user trust, exposing the public to exploitable code, data leaks, and invasive privacy practices. Undirected security research may be insufficient for preventing such foreseeable and preventable failures, as these problems are often the result of misaligned vendor incentives rather than the technical specifics of the systems themselves. This dissertation illustrates the utility of security research that is motivated explicitly by the goal of realigning incentives of market actors toward providing better security. We find that a research approach guided by a deep understanding of the economic, regulatory, and technical attributes of the actors involved is crucial for solving important societally-relevant problems in computer security. We present three case studies in applying this vision: Our first case study considers vulnerability discovery as applied to Internet voting. We perform a security analysis of the dominant Internet voting systems used in U.S. federal elections, including those used in the 2020 U.S. presidential race. We find that, despite decades of research in cryptography and voting, all deployed systems are of simplistic design and suffer basic security and privacy problems, supporting the conclusion that the market is in failure. Our second case study involves designing cryptography to disincentivize (rather than prevent) bad behavior through the example of deniability in messaging. We find that the evolution of the email ecosystem has inadvertently resulted in most messages being nonrepudiable, incentivizing email theft and public exposure of private data. We present cryptographic constructions that solve this problem while fitting in with email’s already complicated ecosystem. Our final case study involves government requests to mandate law enforcement access to encrypted data, colloquially known as ‘backdooring’ encryption. We perform a security analysis of technical proposals to provide such government exceptional access, and find that they would cause untenable security and privacy risks. Finally, we conclude with a discussion of security research as a public good, and provide direction for future work. Ph.D. 2022-02-07T15:22:09Z 2022-02-07T15:22:09Z 2021-09 2021-09-21T19:29:59.267Z Thesis https://hdl.handle.net/1721.1/140067 0000-0003-1487-4406 In Copyright - Educational Use Permitted Copyright retained by author(s) https://rightsstatements.org/page/InC-EDU/1.0/ application/pdf Massachusetts Institute of Technology
spellingShingle Specter, Michael A.
Security Research for the Public Good: A Principled Approach
title Security Research for the Public Good: A Principled Approach
title_full Security Research for the Public Good: A Principled Approach
title_fullStr Security Research for the Public Good: A Principled Approach
title_full_unstemmed Security Research for the Public Good: A Principled Approach
title_short Security Research for the Public Good: A Principled Approach
title_sort security research for the public good a principled approach
url https://hdl.handle.net/1721.1/140067
work_keys_str_mv AT spectermichaela securityresearchforthepublicgoodaprincipledapproach