Detecting Stealth Software with Strider GhostBuster
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Quantum resistant public key cryptography: a survey
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Point-and-shoot security design: can we build better tools for developers?
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
In this paper we examine an important example of where a decision designed to improve security has quite the opposite effect due to the longevity of the decision's side effects. The primary example we use to illustrate our point is the deliberate obfuscation and alteration of satellite imagery available online, in an attempt to deprive attackers of sensitive information about certain installations. We will demonstrate that such image modification techniques are short sighted and counterproductive: better security would have been provided if the concerned parties had simply done nothing. This result illustrates the importance of examining security decisions from a temporal perspective, accounting for inevitable progression of technology. Furthermore, we believe this paper illustrates an oft overlooked class of security problems that present non-reversible challenges to the defender long after the questionable security decision has been reversed.