The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2010 vol.8)
pp: 70-73
Daniel Bilar , University of New Orleans
ABSTRACT
Attacks targeting something or someone indirectly—nth order attacks against end systems--have occurred on a large scale in real life. It goes to the heart of how conflicts between open societies and their enemies are waged: trust subsystems. Trust helps lower tangible and intangible transaction costs between individuals, corporations, and the state. Members of "high-trust" societies like the United States leverage trust beyond family ties to form efficient civic and economic organizations. Because trust permeates every facet of open societies, it's a very easy assumption for malicious actors to violate.
INDEX TERMS
nth order attack, Highly Optimized Tolerance, assumption violation, trust, attack, subsystem, systems, security
CITATION
Daniel Bilar, "Degradation and Subversion through Subsystem Attacks", IEEE Security & Privacy, vol.8, no. 4, pp. 70-73, July/August 2010, doi:10.1109/MSP.2010.122
REFERENCES
1. J. Carlson and J. Doyle, "Highly Optimized Tolerance: Robustness and Design in Complex Systems," Physical Rev. Letters, vol. 84, no. 11, 2000, pp. 2529–2532.
2. J. Doyle and J. Carlson, "Power Laws, Highly Optimized Tolerance, and Generalized Source Coding," Physical Rev. Letters, vol. 84, no. 24, 2000, pp. 5656–5659.
3. M. Guirguis and A. Bestavros, "Reduction of Quality (RoQ) Attacks on Internet End-Systems," Proc. IEEE INFOCOM, IEEE Press, 2005, pp. 1362–1372.
4. H. Yanxiang et al., "Reduction of Quality (RoQ) Attacks on Structured Peer-to-Peer Networks," IEEE Int'l Parallel and Distributed Processing Symp. (IPDPS 09), IEEE Press, 2009, pp. 1–9.
5. Y. Liu, M.K. Reiter, and P. Ning, "False Data Injection Attacks against State Estimation in Electric Power Grids," ACM Conf. on Computer and Communications Security (CCS 09), ACM Press, 2009, pp. 21–32.
6. W. Poundstone, Gaming the Vote: Why Elections Aren't Fair, Hill and Wang, 2008
7. R. Roemer et al., "Return-Oriented Programming: Systems, Languages, and Applications," 2009; cseweb.ucsd.edu/~hovav/dist/rop.pdf.
8. H. Mittal, "Are You Playing in a Toxic Dark Pool ?," J. Trading, vol. 3, no. 3, 2008, pp. 20–33.
9. F. Fukuyama, Trust: The Social Virtues and the Creation of Prosperity, Free Press, 1996.
10. G. Ackerman and J. Tamsett eds, , Jihadists and Weapons of Mass Destruction, CRC Press, 2009, pp. 89–90.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool