Below the Salt
The talk that I came here to give is about some work that we’re just getting started with, joint work with Sandy Clark (who is here) and Patrick McDaniel (who is out with pneumonia, so I’m standing in his stead). This is based on the observation that one of the ways in which we get into trouble is by designing protocols based on incorrect assumptions about the security of components at a lower level than the one that we’re reasoning about; we tend to make assumptions that change out from under us. And in particular I’m going to focus on various kinds of wireless networks. Wireless networks have of course increased in importance, partly during the time since many of the underlying protocols used for them had been designed, and in fact wireless networks are also where many of the most spectacular protocol failures that we point at to show why protocol design is important and interesting. If you want to know what happens when you don’t ask a smart protocol designer to help you, we can look to examples in wireless networks. I think we can expect this to be a rich source of cautionary tales for some time to come.
KeywordsMobile Telephone Realistic Threat Threat Model Cautionary Tale Short Shelf Life
Unable to display preview. Download preview PDF.