Defending against the Unknown Enemy: Applying FlipIt to System Security
Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. “Advanced Persistent Threats” (APTs), for instance, leverage zero-day exploits and extensive...
Main Authors: | Bowers, Kevin D., van Dijk, Marten, Griffin, Robert, Juels, Ari, Oprea, Alina, Rivest, Ronald L., Triandopoulos, Nikos |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science |
Format: | Article |
Language: | en_US |
Published: |
Springer Science+Business Media
2014
|
Online Access: | http://hdl.handle.net/1721.1/90591 https://orcid.org/0000-0002-7105-3690 |
Similar Items
-
Extending the analysis of the FlipIt game
by: Rossides, Michalis
Published: (2014) -
Hourglass schemes: how to prove that cloud files are encrypted
by: van Dijk, Marten, et al.
Published: (2014) -
How to tell if your cloud files are vulnerable to drive crashes
by: Bowers, Kevin D., et al.
Published: (2012) -
Drifting Keys: Impersonation detection for constrained devices
by: Bowers, Kevin D., et al.
Published: (2015) -
Honeywords: making password-cracking detectable
by: Juels, Ari, et al.
Published: (2014)