Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.

Slides:



Advertisements
Similar presentations
Security Market: Incentives for Disclosure of Vulnerabilities Peter P. Swire Ohio State University Houston/Sante Fe Conference June 4, 2005.
Advertisements

A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
Privacy and the Use of Cost/Benefit Analysis Professor Peter Swire Ohio State University FTC Workshop on Information Flows June 18, 2003.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Data Breach as a Critical Infrastructure & Computer Security Issue Peter P. Swire Professor, The Ohio State University Senior Fellow, Center for American.
What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory Professor Peter P. Swire George Washington.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
Free/Libre & Open Source Software and When Disclosure Helps Security Peter P. Swire Ohio State University Western Ontario: Free/Libre and Open Source Software.
Mental Health Issues & Information Sharing Professor Peter P. Swire The Ohio State University NAAG Task Force on School Safety July 5, 2007.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
A Model for When Disclosure Helps Security Peter P. Swire Ohio State University Stanford Cybersecurity Conference November 22, 2003.
Economic Incentives to Increase Security in the Internet: the Case for Insurance Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) IEEE INFOCOM, Rio 2009.
Chapter 1 Business Driven Technology
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Some Thoughts on Cyber-Resiliency, Time, and Surveillance Peter Swire Huang Professor of Law and Ethics Georgia Institute of Technology NAS/NRC Forum on.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Monopoly It aint just a board game anymore…. Review Monopolies exist because… –A key resource is owned by a single firm, or –The government provides a.
Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
Competitive Cyber-Insurance and Network Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand EECS, UC-BerkeleyTRUST 2009 Presentation.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
A Framework for Ethical Decision Making
1 Security and Software Engineering Steven M. Bellovin AT&T Labs – Research
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Encryption Export Controls in the US Preliminary Research.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
1 An Income Tax, Not A Wage Tax: Comments on “A Fair and Simple Tax System for Our Future” Peter R. Orszag Co-Director, Tax Policy Center January 31, 2005.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Resources to Support Training Programs for CSIRTs.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Encryption Encryption is the process of obscuring information to make it unreadable without special knowledge. information
Resource-Based and Property Rights Perspectives on Value Creation: The Case of Oil Field Unitization Jongwook Kim and Joseph T. Mahoney Managerial and.
Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Lecture 6 Production Decisions. Goals and economic benefits from production What are the goals of production? –Some productive activities may be motivated.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Legitimate Vulnerability Markets By: Jeff Wheeler.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Understanding the Threats of and Defenses Against Cyber Warfare.
Ethical Decision Making , Ethical Theories
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
The Economic Way of Thinking Do you think like an economist?
Distinguish between an experiment and other types of scientific investigations where variables are not controlled,
How to build a good reputation online
Determined Human Adversaries: Mitigations
Determined Human Adversaries: Mitigations
Presentation transcript:

Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007

Dueling Slogans Open Source mantra: No Security Through Obscurity Secrecy does not work (or at least we shouldnt depend on it) Secrecy does not work (or at least we shouldnt depend on it) Disclosure is good (virtuous) Disclosure is good (virtuous) Military motto: Loose Lips Sink Ships Secrecy is essential Secrecy is essential Disclosure is bad (treason) Disclosure is bad (treason) Both cant be true at the same time

Overview Three papers complete, at search Swire 1. A model for when each approach is correct -- assumptions for the Open Source & military approaches Key reasons computer & network security often differ from earlier security problems Key reasons computer & network security often differ from earlier security problems 2. A Theory of Disclosure for Security & Competitive Reasons: Open Source, Proprietary Software, and Government Agencies 3. Privacy & Information Sharing in the War Against Terrorism All concern when disclosure helps security

I. Model for When Disclosure Helps Security Identify chief costs and benefits of disclosure Identify chief costs and benefits of disclosure Effect on attackers Effect on attackers Effect on defenders Effect on defenders Describe scenarios where disclosure of a defense likely to have net benefits or costs Describe scenarios where disclosure of a defense likely to have net benefits or costs (Economics & computer security, not law) (Economics & computer security, not law)

Open Source Perspective & Disclosure Helps Defenders Attackers learn little or nothing from public disclosure Attackers learn little or nothing from public disclosure Disclosures prompts designers to improve the defense -- learn of flaws and fix Disclosures prompts designers to improve the defense -- learn of flaws and fix Disclosure prompts other defenders/users of software to patch and fix Disclosure prompts other defenders/users of software to patch and fix Net: Costs of disclosure low. Bens high. Net: Costs of disclosure low. Bens high. [This is not a discussion of proprietary v. Open Source – focus is on when disclosure improves security] [This is not a discussion of proprietary v. Open Source – focus is on when disclosure improves security]

Military Base & Disclosure Helps Attackers It is hard for attackers to get close enough to learn the physical defenses It is hard for attackers to get close enough to learn the physical defenses Disclosure teaches the designers little about how to improve the defenses Disclosure teaches the designers little about how to improve the defenses Disclosure prompts little improvement by other defenders. Disclosure prompts little improvement by other defenders. Net: Costs from disclosure high but few benefits. Net: Costs from disclosure high but few benefits.

Effects of Disclosure Low Help Attackers High Open Source Military/Intelligence Help Defenders Low High

Effects of Disclosure -- II Military/Intelligence Public Domain Information Sharing (e.g., watch lists) Open Source Low Help Attackers High Help Defenders Low High

Why Computer & Network Attacks More Often Benefit From Disclosure Hiddenness helps for pit or for mine field Hiddenness helps for pit or for mine field Hiddenness & the first-time attack Hiddenness & the first-time attack N = number of attacks N = number of attacks L = learning from attacks L = learning from attacks C = communicate with other attackers C = communicate with other attackers Hiddenness works much less well for Hiddenness works much less well for Mass-market software Mass-market software Firewalls Firewalls Encryption algorithms (Diffies point about keys and cryptosystems) Encryption algorithms (Diffies point about keys and cryptosystems)

What Is Different for Cyber Attacks? Many attacks (high N) Many attacks (high N) Each attack is low cost on firewalls, etc. Each attack is low cost on firewalls, etc. By contrast, more costly to find out location of mines By contrast, more costly to find out location of mines Attackers learn from previous attacks (high L) Attackers learn from previous attacks (high L) This trick got me root access This trick got me root access Attackers communicate about vulnerabilities (C) Attackers communicate about vulnerabilities (C) Because of attackers knowledge, disclosure often helps defenders more than attackers for cyber attacks Because of attackers knowledge, disclosure often helps defenders more than attackers for cyber attacks

III. Incentives to Disclose A Theory of Disclosure for Security & Competitive Reasons: Open Source, Proprietary Software, and Government Agencies A Theory of Disclosure for Security & Competitive Reasons: Open Source, Proprietary Software, and Government Agencies Security reasons to disclose or not Security reasons to disclose or not Competitive reasons to disclose or not Competitive reasons to disclose or not Actual disclosure is a function of both Actual disclosure is a function of both Distinct models needed to analyze security & competitive incentives Distinct models needed to analyze security & competitive incentives

ProducerSecurityCompetition Open Source Ideologically open; Some secret sauce (Case 1) Ideologically open; Apparently high use of trade secrets (Case 2) ProprietarySoftware Monopolist on source code; disclosure based on monopsony and market power (Case 3) Monopolist on source code; disclosure based on how open standards help profits (Case 4) Government Information sharing dilemma (help attackers & defenders); public choice model (Case 5) Turf maximization, e.g., FBI vs. local police for the credit (Case 6)

Incentives to Disclose Themes for private sector: Themes for private sector: A lot of secrecy in Open Source software A lot of secrecy in Open Source software A lot of openness in proprietary software A lot of openness in proprietary software Significant convergence, especially recently Significant convergence, especially recently Incentives for government to disclose are often far less than seems optimal Incentives for government to disclose are often far less than seems optimal So, need FOIA and other mechanisms to compensate So, need FOIA and other mechanisms to compensate

III. Information Sharing & Privacy in the War Against Terrorism Intelligence reform and many calls in DC for more information sharing Intelligence reform and many calls in DC for more information sharing Assumption that more sharing is good Assumption that more sharing is good My view: information sharing is a hard case My view: information sharing is a hard case E.g., tell watch list to all customs agents E.g., tell watch list to all customs agents High benefits if info goes to the good guys High benefits if info goes to the good guys High costs if info goes to the bad guys High costs if info goes to the bad guys Often, limited ability to do one & not the other Often, limited ability to do one & not the other

Info Sharing & War on Terror I propose due diligence list for analysis of new info sharing programs I propose due diligence list for analysis of new info sharing programs 10-point list 10-point list First – will sharing tip off your adversaries? First – will sharing tip off your adversaries? Second – does propose measure further security? Cost-effectively? Second – does propose measure further security? Cost-effectively? Have presented to ODNI, WH Privacy & Civil Liberties Board Have presented to ODNI, WH Privacy & Civil Liberties Board Attempt to give practical way to do due diligence on new info sharing programs Attempt to give practical way to do due diligence on new info sharing programs

Conclusion Economics-based approach to when disclosure good for the ecosystem, and when have incentives to disclose Economics-based approach to when disclosure good for the ecosystem, and when have incentives to disclose Identifies the variables that would drive the analysis Identifies the variables that would drive the analysis Warmly invite additional research into the empirics or interesting cases – when the variables should result in disclosure or not Warmly invite additional research into the empirics or interesting cases – when the variables should result in disclosure or not