security_economics
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security_economics [2018/05/22 20:49] – channam.ngo@unitn.it | security_economics [2018/11/26 00:34] – [Beyond 1-5 Risk Matrices: quantitative likelihood] fabio.massacci@unitn.it | ||
---|---|---|---|
Line 5: | Line 5: | ||
+ | * On the fairness of seucirty taxes in presence on interdependence | ||
+ | * Estimating quantitative likelihood | ||
* Cyber-Insurance: | * Cyber-Insurance: | ||
- | * The Work Averse Attacker Model | + | * The Work Averse Attacker Model (A different way to consider attackers) |
* Black markets actually work! | * Black markets actually work! | ||
* Risk vs Rule base regulation: what is the best way to regulate? | * Risk vs Rule base regulation: what is the best way to regulate? | ||
Line 14: | Line 16: | ||
See also our section on [[vulnerability_discovery_models|Finding and Assessing Vulnerabilities]] in particular if you are interesting in understanding what's the risk reduction for different types of vulnerabilities and [[malware_analysis|Malware Analysis]]. | See also our section on [[vulnerability_discovery_models|Finding and Assessing Vulnerabilities]] in particular if you are interesting in understanding what's the risk reduction for different types of vulnerabilities and [[malware_analysis|Malware Analysis]]. | ||
- | ==== FuturesMEX: Secure, distributed futures market exchange | + | ==== |
- | In the IEEE Symposium on Security and Privacy (2018), one of the top tier security conferences, | + | |
- | Futures exchange is the operator of a futures market which consists | + | Several definitions |
- | An exchange has three main functions: (1) Price discovery that allows traders to post/cancel limit orders to form the anonymous order book where only price and volume are publicly visible but not the identity of the traders that post the orders; (2) Transaction management in which the exchange processes the market orders for actual transactions; | + | * //Risk = Impact · Likelihood// |
- | As of today, all the exchanges are centralized, | + | For a company, impact is easy to calculate as data about one's own asset is routinely collected. Likelihood |
- | We design a hybrid solution and opt to use as much standard crypto building blocks as possible including public ledger, anonymous communication network, commitment scheme, zero-knowledge proof system, Merkle tree and generic MPC. | ||
- | |||
- | To overcome the denial-of-service attack where the adversary aborts the protocol, we make the abort costly. In particular we employ the penalty strategy of Hawk (S&P 16) in which the initial cash reserve is locked and only released after the final Mark To Market phase. The aborting party is prevented to join the final phase hence he will lose the deposit --- the ultimate possible financial penalty. | ||
- | |||
- | Using the Lean Hog futures data in the first quarter of 2017 obtained from the CME, we demonstrate that our hybrid solution is able to maintain proportional burden in which the crypto overhead for the retail traders are close to zero while the full MPC solution yields magnitude of orders higher burden for them. Our optimized implementation is also practical enough to fit most of the Lean Hog trading days into only 1 or 2 days of computation. Further optimizations are possible, such as zk-proofs generation parallelization. | ||
==== Cyber-Insurance: | ==== Cyber-Insurance: | ||
Line 74: | Line 70: | ||
If you like to have an idea of the model this other picture shows you the Change in the number of attacked systems for two attacks against different systems Δ = T days apart ({{: | If you like to have an idea of the model this other picture shows you the Change in the number of attacked systems for two attacks against different systems Δ = T days apart ({{: | ||
- | If you are interested in knowing whether we could use this insight for actual predictions please look at our [[https:// | + | If you are interested in knowing whether we could use this insight for actual predictions please look at our [[https:// |
security_economics.txt · Last modified: 2021/01/29 10:58 by 127.0.0.1