Communications of the ACM
Principles, techniques, and ethics of stage magic and their application to human interface design
INTERCHI '93 Proceedings of the INTERCHI '93 conference on Human factors in computing systems
Artificial liars: Why computers will (necessarily)deceive us and each other
Ethics and Information Technology
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Inconsistency: the good, the bad, and the ugly
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Deception and magic in collaborative interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Resilience is more than availability
Proceedings of the 2011 workshop on New security paradigms workshop
Inconsistency-Induced Learning for Perpetual Learners
International Journal of Software Science and Computational Intelligence
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developing systematic methods of deception. The cornerstone of these methods is internal consistency: projecting a "false reality", or "fiction", that the attacker is to accept as reality. We challenge the necessity of this cornerstone, and explore the nature and possible uses of inconsistency in deception as a defense.