Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/644527.644529acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Defending against an Internet-based attack on the physical world

Published: 21 November 2002 Publication History

Abstract

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide a warning to the Internet community of what is currently possible. The attack is, to some degree, a consequence of the availability of private information on the Web, and the increase in the amount of personal information that users must reveal to obtain Web services.

References

[1]
T. Aura, P. Nikander, and J. Leiwo. Dos resistant authentication with client puzzles. In Proceedings of the Cambridge Security Protocols Workshop 2000, LNCS, April 2000.]]
[2]
S. Byers, C. Silva, and J. Freire. Imaging web databases with restricted query access, 2001.]]
[3]
B. Cheswick and S. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company, 1994.]]
[4]
A. L. Coates, H. S. Baird, and R. J. Fateman. Pessimal print: a reverse Turing test. In Proceedings of the IAPR 2001 International Conference Document Analysis and Recognition (ICDAR 2001), September 2001.]]
[5]
D. Dean and A. Stubblefield. Using client puzzles to protect tls. 10th Annual USENIX Security Symposium, 2001.]]
[6]
N. S. Foundation. Report on the national workshop on internet voting, March 2001.]]
[7]
A. Juels and J. Brainard. Client puzzles: A cryptographic defense against connection depletion attacks. In S. Kent, editor, Proceedings of NDSS 99, pages 151--165, 1999.]]
[8]
M. Naor. Verification of a human in the loop or identification via the turing test, 1996.]]
[9]
N. C. on Federal Election Reform. To assure pride and confidence in the electoral process, August 2001.]]
[10]
M. R. P. Syverson and D. Goldschlag. Private web browsing. Journal of Computer Security, 5(3):237--248., 1997.]]
[11]
T. H. Project, editor. Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Addison-Wesley Publishing Company, 2002.]]
[12]
M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. ACM Transactions on Information System Security, 1(1), April 1998.]]
[13]
T. D. O. P. The Debate Over Technology. Voting in the information age: The debate over technology, January 2001.]]
[14]
C.-M. voting technology project. Voting: What is; what could be, July 2001.]]

Cited By

View all
  • (2022)Patient-Controlled Mechanism Using Pseudonymization Technique for Ensuring the Security and Privacy of Electronic Health RecordsInternational Journal of Reliable and Quality E-Healthcare10.4018/IJRQEH.29707611:1(1-15)Online publication date: Jan-2022
  • (2022)Blockchain-Enabled Electronic Health Records for Healthcare 4.0International Journal of E-Health and Medical Communications10.4018/IJEHMC.30943813:4(1-13)Online publication date: 11-Aug-2022
  • (2004)Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-LoopFinancial Cryptography10.1007/978-3-540-27809-2_5(39-53)Online publication date: 2004
  • Show More Cited By

Index Terms

  1. Defending against an Internet-based attack on the physical world

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
    November 2002
    115 pages
    ISBN:1581136331
    DOI:10.1145/644527
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 November 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Internet Threats
    2. automated attacks
    3. computer security
    4. comuter security
    5. cybercrime
    6. internet threats

    Qualifiers

    • Article

    Conference

    CCS02
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 106 of 355 submissions, 30%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Patient-Controlled Mechanism Using Pseudonymization Technique for Ensuring the Security and Privacy of Electronic Health RecordsInternational Journal of Reliable and Quality E-Healthcare10.4018/IJRQEH.29707611:1(1-15)Online publication date: Jan-2022
    • (2022)Blockchain-Enabled Electronic Health Records for Healthcare 4.0International Journal of E-Health and Medical Communications10.4018/IJEHMC.30943813:4(1-13)Online publication date: 11-Aug-2022
    • (2004)Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-LoopFinancial Cryptography10.1007/978-3-540-27809-2_5(39-53)Online publication date: 2004
    • (2003)Honeypots in blackhat mode and its implications [computer security]Proceedings of the 8th International Scientific and Practical Conference of Students, Post-graduates and Young Scientists. Modern Technique and Technologies. MTT'2002 (Cat. No.02EX550)10.1109/PDCAT.2003.1236284(185-188)Online publication date: 2003

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media