Skip to main content
Top

2018 | OriginalPaper | Chapter

10. Development and Proliferation of Offensive Weapons in Cyber-Security

Author : Trey Herr

Published in: Cyber Weaponry

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The proliferation of cyber weapons can put powerful offensive capabilities into the hands of states. This chapter explores just what a cyber weapon is and how the process of proliferation works. Highlighting the importance of information in building these offensive capabilities, the chapter argues that what should be considered a weapon is just a small part of what is proliferated in cybersecurity. While states have dominated the debate regarding cybersecurity threats, non-state and criminal actors play key roles in facilitating proliferation through the malware markets. When states and policymakers begin to examine how to disrupt the proliferation of new offensive techniques and methods, they should start with improving software security and resilience.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Basic Input/Output System or Unified Extensible Firmware Interface—both of which serve a similar purpose.
 
2
This in conjunction with the need for material resources to build test environments for this malware and the precision required of intelligence collected on potential targets are part of the explanation behind why there have been so few destructive attacks.
 
3
The information security community is an interconnected web of researchers, organizations, and for-profit companies. There exists an as-yet not well studied pattern of information sharing, both intentional and not, within this web which makes it difficult to contain knowledge of an offensive security innovation (outside of government) for very long. Some of this is because of the ethos of sharing novel finds and insights between researchers to help others get ahead of the curve while some is also likely due to some espionage by states and more sophisticated criminal groups on the same firms watching them.
 
4
There are instances where groups have stolen or recovered spent or improperly disposed of weapons of mass destruction materials. These cases would constitute unintentional proliferation, but are extremely rare.
 
5
Note—the last two paragraphs are excerpted from Trey Herr, “Governing Proliferation in Cybersecurity,” Global Summitry, 2, no. 1 (July 2017).
 
Literature
go back to reference Böhme R (2005) Vulnerability markets. In: Proceedings of 22C3, vol 27, p 30 Böhme R (2005) Vulnerability markets. In: Proceedings of 22C3, vol 27, p 30
go back to reference Bonfante G, Marion J-Y, Sabatier F, Thierry A (2013) Analysis and diversion of Duqu’s driver. In: Colon Osorio FC (ed) Proceedings of the 2013 8th international conference on malicious and unwanted software, presented at the international conference on malicious and unwanted software, IEEE, Fajardo, Puerto RIco, USA, pp 109–115 Bonfante G, Marion J-Y, Sabatier F, Thierry A (2013) Analysis and diversion of Duqu’s driver. In: Colon Osorio FC (ed) Proceedings of the 2013 8th international conference on malicious and unwanted software, presented at the international conference on malicious and unwanted software, IEEE, Fajardo, Puerto RIco, USA, pp 109–115
go back to reference Herley C, Florêncio D (2010) Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy. In: Moore T, Pym D, Ioannidis C (eds) Economics of information security and privacy. Springer, Boston, pp 33–53CrossRef Herley C, Florêncio D (2010) Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy. In: Moore T, Pym D, Ioannidis C (eds) Economics of information security and privacy. Springer, Boston, pp 33–53CrossRef
go back to reference Herr T (2014) PrEP: a framework for malware & cyber weapons. J Inf Warf 13(1):87–106 Herr T (2014) PrEP: a framework for malware & cyber weapons. J Inf Warf 13(1):87–106
go back to reference Herr T (2016) Malware counter-proliferation and the Wassenaar arrangement. In: 2016 8th international conference on cyber conflict: cyber power. Presented at the CyCon, IEEE, Tallinn, Estonia. pp 175–190 Herr T (2016) Malware counter-proliferation and the Wassenaar arrangement. In: 2016 8th international conference on cyber conflict: cyber power. Presented at the CyCon, IEEE, Tallinn, Estonia. pp 175–190
go back to reference Herr T (2017a) Countering the proliferation of malware – targeting the vulnerability lifecycle. Belfer Center, Harvard Kennedy School, Cambridge, MA Herr T (2017a) Countering the proliferation of malware – targeting the vulnerability lifecycle. Belfer Center, Harvard Kennedy School, Cambridge, MA
go back to reference Herr T, Armbrust E (2015) Milware: identification and implications of state authored malicious software. NSPW ’15 proceedings of the 2015 new security paradigms workshop, ACM, Twente, Netherlands, pp 29–43 Herr T, Armbrust E (2015) Milware: identification and implications of state authored malicious software. NSPW ’15 proceedings of the 2015 new security paradigms workshop, ACM, Twente, Netherlands, pp 29–43
go back to reference InfoSec Institute (2017) Best DOS attacks and free DOS attacking tools, InfoSec Institute InfoSec Institute (2017) Best DOS attacks and free DOS attacking tools, InfoSec Institute
go back to reference Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. Secur Priv IEEE 9(3):49–51CrossRef Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. Secur Priv IEEE 9(3):49–51CrossRef
go back to reference Langner R (2013) Langner – to kill a Centrifuge.pdf, The Langner Group, p 36 Langner R (2013) Langner – to kill a Centrifuge.pdf, The Langner Group, p 36
go back to reference Levchenko K, Pitsillidis A, Chachra N, Enright B, Félegyházi M, Grier C, Halvorson T et al (2011) Click trajectories: end-to-end analysis of the spam value chain. Security and Privacy (SP), 2011 I.E. symposium on, IEEE, pp 431–446 Levchenko K, Pitsillidis A, Chachra N, Enright B, Félegyházi M, Grier C, Halvorson T et al (2011) Click trajectories: end-to-end analysis of the spam value chain. Security and Privacy (SP), 2011 I.E. symposium on, IEEE, pp 431–446
go back to reference Ozment A (2004) Bug auctions: vulnerability markets reconsidered. Third workshop on the economics of information security, pp 19–26 Ozment A (2004) Bug auctions: vulnerability markets reconsidered. Third workshop on the economics of information security, pp 19–26
go back to reference Prunckun H (2012) Counterintelligence theory and practice. Rowman & Littlefield Publishers, Lanham Prunckun H (2012) Counterintelligence theory and practice. Rowman & Littlefield Publishers, Lanham
go back to reference Radianti J (2010) Eliciting information on the vulnerability black market from interviews. Presented at the fourth international conference on emerging security information, systems and technologies, IEEE, pp 93–96 Radianti J (2010) Eliciting information on the vulnerability black market from interviews. Presented at the fourth international conference on emerging security information, systems and technologies, IEEE, pp 93–96
go back to reference Thomas K, Huang D, Wang D, Bursztein E, Grier C, Holt TJ, Kruegel C et al (2015) Framing dependencies introduced by underground commoditization. Presented at the workshop on the economics of information security. Available at: http://damonmccoy.com/papers/WEIS15.pdf. Accessed 29 Nov 2015 Thomas K, Huang D, Wang D, Bursztein E, Grier C, Holt TJ, Kruegel C et al (2015) Framing dependencies introduced by underground commoditization. Presented at the workshop on the economics of information security. Available at: http://​damonmccoy.​com/​papers/​WEIS15.​pdf. Accessed 29 Nov 2015
go back to reference Varner R, Collier W (1978) A matter of risk. Random House, New York Varner R, Collier W (1978) A matter of risk. Random House, New York
Metadata
Title
Development and Proliferation of Offensive Weapons in Cyber-Security
Author
Trey Herr
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-74107-9_10