变形 发表于 2025-3-26 21:48:30
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript ofkinds of things that can go wrong, I used Shodan to search for an existing Industrial Control System connected to the Internet. I gave my first version of this talk in March 2016, and have given it a couple of times in the interim. Each time I prepared for the talk, I revisited the ICS, and each tim明智的人 发表于 2025-3-27 03:57:18
,Assuring the Safety of Asymmetric Social Protocols,, Nigerian scams and the like) is carried out by abusing social protocols—that is to say, computer-mediated interactions between human subjects. We call a social protocol “asymmetric” when the initial sender benefits from execution of the protocol but the recipient is not guaranteed against dishones哑巴 发表于 2025-3-27 07:31:44
http://reply.papertrans.cn/87/8635/863428/863428_33.png大都市 发表于 2025-3-27 12:12:27
http://reply.papertrans.cn/87/8635/863428/863428_34.pngnerve-sparing 发表于 2025-3-27 14:34:44
http://reply.papertrans.cn/87/8635/863428/863428_35.png附录 发表于 2025-3-27 20:08:26
Making Decryption Accountable,. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.Trigger-Point 发表于 2025-3-28 01:41:17
Making Decryption Accountable (Transcript of Discussion),t tell my parents where I was going because I wanted my privacy. But my parents naturally wanted to make sure that they’d have some recourse if I don’t come back at the expected time. They wanted security in other words. We hit upon a compromise whereby I would put my plans in an envelope, and leave大厅 发表于 2025-3-28 05:43:48
http://reply.papertrans.cn/87/8635/863428/863428_38.png种属关系 发表于 2025-3-28 07:30:29
Key Exchange with the Help of a Public Ledger,stency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior koptic-nerve 发表于 2025-3-28 11:07:51
,Reconciling Multiple Objectives – Politics or Markets?,ems. At the deepest level, security protocols determine the power structure of a system: who can do what with whom. The development, adoption, spread and evolution of protocols, and competition between them, are both political and economic activities. They may reconcile multiple objectives or be the