Skip to main content

Strange Bedfellows: How and When to Work with Your Enemy

  • Conference paper
  • First Online:
  • 706 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Abstract

There are many examples of parties that are seemingly in opposition working together. In this position paper, we explore this in the context of security protocols with an emphasis on how these examples might produce long-term benefits for the “good guys” and how a formal model might be used to help prescribe approaches to collaboration with the “bad guys.”

Work supported by ONR and DARPA.

Work partially carried out with support from the National Science Foundation under grants CNS-1018557 and CCF-1101690.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)

    Google Scholar 

  2. Frederick, S., Loewenstein, G., O’Donoghue, T.: Time discounting and time preference: a critical review. J. Econ. Lit. 40(2), 351–401 (2002)

    Article  Google Scholar 

  3. Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: a case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 1–18. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Kannan, K., Telang, R.: An economic analysis of markets for software vulnerabilities. In: Proceedings of the Third Workshop of Economics and Information Security (2004)

    Google Scholar 

  5. Ozment, A.: Bug auctions: vulnerability markets reconsidered. In: Proceedings of the Third Workshop of Economics and Information Security (2004)

    Google Scholar 

  6. Samuelson, P.A.: A note on measurement of utility. Rev. Econ. Stud. 4(2), 155–161 (1937)

    Article  Google Scholar 

  7. Schecter, S.: Quantitatively differentiating system security. In: Proceedings of the First Workshop of Economics and Information Security (2002)

    Google Scholar 

  8. Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machiavelli. In: First Workshop on Issues in the Theory of Security WITS’00, pp. 87–92 (2000)

    Google Scholar 

  9. Zetter, K.: TJX hacker gets 20 years in prison. Wired Magazine (2010). www.wired.com/threatlevel/2010/03/tjx-sentencing

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rebecca N. Wright .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Jaggard, A.D., Wright, R.N. (2014). Strange Bedfellows: How and When to Work with Your Enemy. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics