Ethics in Security Research Which lines should not be crossed? - - PowerPoint PPT Presentation

ethics in security research which lines should not be
SMART_READER_LITE
LIVE PREVIEW

Ethics in Security Research Which lines should not be crossed? - - PowerPoint PPT Presentation

Ethics in Security Research Which lines should not be crossed? Sebastian Schrittwieser, Martin Mulazzani, Edgar Weippl Ideas of this talk Proposal of fundamental ethical principles Analysis of their role in recent papers Discussion


slide-1
SLIDE 1

Ethics in Security Research Which lines should not be crossed?

Sebastian Schrittwieser, Martin Mulazzani, Edgar Weippl

slide-2
SLIDE 2
slide-3
SLIDE 3
  • Proposal of fundamental ethical principles
  • Analysis of their role in recent papers
  • Discussion - no judgement!

Ideas of this talk

slide-4
SLIDE 4

Ethical Principles

slide-5
SLIDE 5

Do not harm humans actively!

slide-6
SLIDE 6
  • Patients were not informed about available

treatments

  • No precautions were taken that patients did

not infect others

  • They were also actively given false

information regarding treatment Tuskegee syphilis experiment

slide-7
SLIDE 7
  • Patients were not informed about available

treatments

  • No precautions were taken that patients did

not infect others

  • They were also actively given false

information regarding treatment

slide-8
SLIDE 8

What could possibly go wrong? InfoSec research:

slide-9
SLIDE 9
  • Hoax ad on Craigslist
  • Sexually explicit ad posted

as a woman

  • More than 100 men responded
  • Their names, pictures, e-mail and

phone numbers were published

  • Possible results: divorces, firings,

lawsuits, etc.

slide-10
SLIDE 10
  • Hoax ad on Craigslist
  • Sexually explicit ad posted

as a woman

  • More than 100 men responded
  • Their names, pictures, e-mail and

phone numbers were published

  • Possible results: divorces, firings,

lawsuits, etc.

slide-11
SLIDE 11

Do not watch bad things happening!

slide-12
SLIDE 12
  • “passive actors”
  • Watching without helping
  • The researchs knew which computers were

infected and simply watched without taking actions

  • Analogy
  • Observing muggers at a backstreet without

calling the police?

slide-13
SLIDE 13
  • “passive actors”
  • Watching without helping
  • The researchs knew which computers were

infected and simply watched without taking actions

  • Analogy
  • Observing muggers at a backstreet without

calling the police?

slide-14
SLIDE 14
  • “damage to victims [...] would be minimized”
  • Victims were only informed after the

experiments

  • Again: watching without helping
slide-15
SLIDE 15

Do not perform illegal activities to harm illegal activities!

slide-16
SLIDE 16
  • Intercepting a “legal botnet” (SETI@home)

would be unethical

  • Is a similar activity ethical simply because it

is aimed at “bad” people?

  • No argument of self-defense can be made!
slide-17
SLIDE 17
  • Intercepting a “legal botnet” (SETI@home)

would be unethical

  • Is a similar activity ethical simply because it

is aimed at “bad” people?

  • No argument of self-defense can be made!
slide-18
SLIDE 18
  • “some [...] contents have already been widely and

publicly documented. Consequently, we cannot create any new harm simply through association with these entities or repeating these findings”

  • Argument: everyone does it that way…
slide-19
SLIDE 19

Do not conduct undercover research!

slide-20
SLIDE 20
  • “we believe that realistic experiments are the only

way to reliably estimate success rates of attacks in the real-world”

  • We had to do it that way...
  • Does not solve the ethical dilemma!
slide-21
SLIDE 21
  • “we believe that realistic experiments are the only

way to reliably estimate success rates of attacks in the real-world”

  • We had to do it that way...
  • Does not solve the ethical dilemma!
slide-22
SLIDE 22

Conclusions

slide-23
SLIDE 23
  • InfoSec research community is well aware of

ethical questions within their field

  • However, even the most fundamental ethical

principles are difficult to fulfill

  • Things are changing fast in information
  • technology. Threat of guidelines that do not

reflect the actual technological environment?

slide-24
SLIDE 24

Thank you for your attention!

sschrittwieser@sba-research.org