Skip to main content
Erschienen in: Journal of Cryptology 4/2013

01.10.2013

FlipIt: The Game of “Stealthy Takeover”

verfasst von: Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest

Erschienen in: Journal of Cryptology | Ausgabe 4/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very secrecy of “secret” keys that cryptographers assume in designing secure protocols. In this article, we introduce a game-theoretic framework for modeling various computer security scenarios prevalent today, including targeted attacks. We are particularly interested in situations in which an attacker periodically compromises a system or critical resource completely, learns all its secret information and is not immediately detected by the system owner or defender. We propose a two-player game between an attacker and defender called FlipIt or The Game of “Stealthy Takeover.” In FlipIt, players compete to control a shared resource. Unlike most existing games, FlipIt allows players to move at any given time, taking control of the resource. The identity of the player controlling the resource, however, is not revealed until a player actually moves. To move, a player pays a certain move cost. The objective of each player is to control the resource a large fraction of time, while minimizing his total move cost. FlipIt provides a simple and elegant framework in which we can formally reason about the interaction between attackers and defenders in practical scenarios. In this article, we restrict ourselves to games in which one of the players (the defender) plays with a renewal strategy, one in which the intervals between consecutive moves are chosen independently and uniformly at random from a fixed probability distribution. We consider attacker strategies ranging in increasing sophistication from simple periodic strategies (with moves spaced at equal time intervals) to more complex adaptive strategies, in which moves are determined based on feedback received during the game. For different classes of strategies employed by the attacker, we determine strongly dominant strategies for both players (when they exist), strategies that achieve higher benefit than all other strategies in a particular class. When strongly dominant strategies do not exist, our goal is to characterize the residual game consisting of strategies that are not strongly dominated by other strategies. We also prove equivalence or strict inclusion of certain classes of strategies under different conditions. Our analysis of different FlipIt variants teaches cryptographers, system designers, and the community at large some valuable lessons:
1.
Systems should be designed under the assumption of repeated total compromise, including theft of cryptographic keys. FlipIt provides guidance on how to implement a cost-effective defensive strategy.
 
2.
Aggressive play by one player can motivate the opponent to drop out of the game (essentially not to play at all). Therefore, moving fast is a good defensive strategy, but it can only be implemented if move costs are low. We believe that virtualization has a huge potential in this respect.
 
3.
Close monitoring of one’s resources is beneficial in detecting potential attacks faster, gaining insight into attacker’s strategies, and scheduling defensive moves more effectively.
 
Interestingly, FlipIt finds applications in other security realms besides modeling of targeted attacks. Examples include cryptographic key rotation, password changing policies, refreshing virtual machines, and cloud auditing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
[2]
Zurück zum Zitat G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proc. 14th ACM Conference on Computer and Communication Security (CCS) (2007) G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proc. 14th ACM Conference on Computer and Communication Security (CCS) (2007)
[3]
Zurück zum Zitat K.D. Bowers, A. Juels, A. Oprea, HAIL: A high-availability and integrity layer for cloud storage, in Proc. 16th ACM Conference on Computer and Communication Security (CCS) (2009) K.D. Bowers, A. Juels, A. Oprea, HAIL: A high-availability and integrity layer for cloud storage, in Proc. 16th ACM Conference on Computer and Communication Security (CCS) (2009)
[4]
Zurück zum Zitat K.D. Bowers, M. van Dijk, A. Juels, A. Oprea, R. Rivest, Remote assessment of fault tolerance, in Proc. 18th ACM Conference on Computer and Communication Security (CCS) (2011) K.D. Bowers, M. van Dijk, A. Juels, A. Oprea, R. Rivest, Remote assessment of fault tolerance, in Proc. 18th ACM Conference on Computer and Communication Security (CCS) (2011)
[5]
Zurück zum Zitat D.Y. Chan, M.A. Vasarhelyi, Innovation and practice of continuous auditing. Int. J. Account. Inf. Syst. 12(2), 152–160 (2011) CrossRef D.Y. Chan, M.A. Vasarhelyi, Innovation and practice of continuous auditing. Int. J. Account. Inf. Syst. 12(2), 152–160 (2011) CrossRef
[6]
Zurück zum Zitat Y. Dodis, J. Katz, S. Xu, M. Yung, Key-insulated public key cryptosystems, in Proc. IACR EUROCRYPT (2002) Y. Dodis, J. Katz, S. Xu, M. Yung, Key-insulated public key cryptosystems, in Proc. IACR EUROCRYPT (2002)
[7]
Zurück zum Zitat N. Falliere, L.O. Murchu, E. Chien, W32.stuxnet dossier (2011). Symantec white paper N. Falliere, L.O. Murchu, E. Chien, W32.stuxnet dossier (2011). Symantec white paper
[8]
Zurück zum Zitat W. Feller, An Introduction to Probability Theory and Its Applications, 2nd edn. (Wiley, New York, 2011) W. Feller, An Introduction to Probability Theory and Its Applications, 2nd edn. (Wiley, New York, 2011)
[9]
Zurück zum Zitat R.G. Gallager, Discrete Stochastic Processes (Springer, Berlin, 1996) CrossRef R.G. Gallager, Discrete Stochastic Processes (Springer, Berlin, 1996) CrossRef
[10]
Zurück zum Zitat S.N. Hamilton, W.L. Miller, A. Ott, O.S. Saydjari, Challenges in applying game theory to the domain of information warfare, in Information Survivability Workshop (ISW) (2002) S.N. Hamilton, W.L. Miller, A. Ott, O.S. Saydjari, Challenges in applying game theory to the domain of information warfare, in Information Survivability Workshop (ISW) (2002)
[11]
Zurück zum Zitat G. Itkis, Cryptographic tamper-evidence, in Proc. 10th ACM Conference on Computer and Communication Security (CCS) (2003) G. Itkis, Cryptographic tamper-evidence, in Proc. 10th ACM Conference on Computer and Communication Security (CCS) (2003)
[12]
Zurück zum Zitat G. Itkis, Handbook of Information Security (Wiley, New York, 2006) G. Itkis, Handbook of Information Security (Wiley, New York, 2006)
[13]
Zurück zum Zitat A. Juels, B. Kaliski, PORs: Proofs of retrievability for large files, in Proc. 14th ACM Conference on Computer and Communication Security (CCS) (2007), pp. 584–597 CrossRef A. Juels, B. Kaliski, PORs: Proofs of retrievability for large files, in Proc. 14th ACM Conference on Computer and Communication Security (CCS) (2007), pp. 584–597 CrossRef
[14]
Zurück zum Zitat J. Katz, Bridging game theory and cryptography: recent results and future directions, in Proc. Theory of Cryptography Conference (TCC) (2008), pp. 251–272 CrossRef J. Katz, Bridging game theory and cryptography: recent results and future directions, in Proc. Theory of Cryptography Conference (TCC) (2008), pp. 251–272 CrossRef
[15]
Zurück zum Zitat G.J. Mailath, L. Samuelson, Repeated Games and Reputations: Long-Run Relationships (Oxford University Press, London, 2006) CrossRef G.J. Mailath, L. Samuelson, Repeated Games and Reputations: Long-Run Relationships (Oxford University Press, London, 2006) CrossRef
[16]
Zurück zum Zitat P. Mell, T. Grance, The NIST definition of cloud computing. NIST Special Publication 800-145 (2011) P. Mell, T. Grance, The NIST definition of cloud computing. NIST Special Publication 800-145 (2011)
[17]
Zurück zum Zitat T. Moore, A. Friedman, A. Procaccia, Would a “cyber warrior” protect us? Exploring trade-offs between attack and defense of information systems, in Proc. New Security Paradigms Workshop (NSPW) (2010), pp. 85–94 T. Moore, A. Friedman, A. Procaccia, Would a “cyber warrior” protect us? Exploring trade-offs between attack and defense of information systems, in Proc. New Security Paradigms Workshop (NSPW) (2010), pp. 85–94
[18]
Zurück zum Zitat R.B. Myerson, Game Theory—Analysis of Conflict (Harvard University Press, Cambridge, 1997) R.B. Myerson, Game Theory—Analysis of Conflict (Harvard University Press, Cambridge, 1997)
[19]
Zurück zum Zitat K.C. Nguyen, T. Alpcan, T. Basar, Security games with incomplete information, in Proc. IEEE International Conference on Communications (ICC) (2009) K.C. Nguyen, T. Alpcan, T. Basar, Security games with incomplete information, in Proc. IEEE International Conference on Communications (ICC) (2009)
[20]
Zurück zum Zitat J. Pathak, B. Chaouch, R.S. Sriram, Minimizing cost of continuous audit: counting and time dependent strategies. J. Account. Public Policy 24, 61–75 (2005) CrossRef J. Pathak, B. Chaouch, R.S. Sriram, Minimizing cost of continuous audit: counting and time dependent strategies. J. Account. Public Policy 24, 61–75 (2005) CrossRef
[21]
Zurück zum Zitat D. Pavlovic, Gaming security by obscurity (2011). CoRR abs/1109.5542 D. Pavlovic, Gaming security by obscurity (2011). CoRR abs/1109.5542
[23]
Zurück zum Zitat S. Ross, Stochastic Processes (Wiley, New York, 1996) MATH S. Ross, Stochastic Processes (Wiley, New York, 1996) MATH
[24]
Zurück zum Zitat S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, Q. Wu, A survey of game theory as applied to network security, in Proc. Hawaii International Conference on System Sciences (HICSS) (2010), pp. 1–10 S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, Q. Wu, A survey of game theory as applied to network security, in Proc. Hawaii International Conference on System Sciences (HICSS) (2010), pp. 1–10
[25]
Zurück zum Zitat N.D. Schwartz, C. Drew, RSA faces angry users after breach. New York Times, p B1, 8 June 2011 N.D. Schwartz, C. Drew, RSA faces angry users after breach. New York Times, p B1, 8 June 2011
[26]
Zurück zum Zitat H. Shacham, B. Waters, Compact proofs of retrievability, in Proc. IACR ASIACRYPT. LNCS, vol. 5350 (2008), pp. 90–107 H. Shacham, B. Waters, Compact proofs of retrievability, in Proc. IACR ASIACRYPT. LNCS, vol. 5350 (2008), pp. 90–107
[27]
Zurück zum Zitat R.S. Sutton, A.G. Barto, Reinforcement Learning: An Introduction (MIT Press, Cambridge, 1998) (Bradford Book) R.S. Sutton, A.G. Barto, Reinforcement Learning: An Introduction (MIT Press, Cambridge, 1998) (Bradford Book)
Metadaten
Titel
FlipIt: The Game of “Stealthy Takeover”
verfasst von
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
Publikationsdatum
01.10.2013
Verlag
Springer US
Erschienen in
Journal of Cryptology / Ausgabe 4/2013
Print ISSN: 0933-2790
Elektronische ISSN: 1432-1378
DOI
https://doi.org/10.1007/s00145-012-9134-5

Premium Partner