Below the Salt

(Transcript of Discussion)
  • Matt Blaze
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)


The talk that I came here to give is about some work that we’re just getting started with, joint work with Sandy Clark (who is here) and Patrick McDaniel (who is out with pneumonia, so I’m standing in his stead). This is based on the observation that one of the ways in which we get into trouble is by designing protocols based on incorrect assumptions about the security of components at a lower level than the one that we’re reasoning about; we tend to make assumptions that change out from under us. And in particular I’m going to focus on various kinds of wireless networks. Wireless networks have of course increased in importance, partly during the time since many of the underlying protocols used for them had been designed, and in fact wireless networks are also where many of the most spectacular protocol failures that we point at to show why protocol design is important and interesting. If you want to know what happens when you don’t ask a smart protocol designer to help you, we can look to examples in wireless networks. I think we can expect this to be a rich source of cautionary tales for some time to come.


Mobile Telephone Realistic Threat Threat Model Cautionary Tale Short Shelf Life 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Matt Blaze
    • 1
  1. 1.University of PennsylvaniaUSA

Personalised recommendations