On unreasonable ineffectiveness Problem of security engineering: - - PowerPoint PPT Presentation

on unreasonable ineffectiveness
SMART_READER_LITE
LIVE PREVIEW

On unreasonable ineffectiveness Problem of security engineering: - - PowerPoint PPT Presentation

Ineffectiveness of trust D. Pavlovic On unreasonable ineffectiveness Problem of security engineering: Background Analysis the case of adverse selection Method of trust certificates Conclusion Dusko Pavlovic Kestrel Institute and Oxford


slide-1
SLIDE 1

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

On unreasonable ineffectiveness

  • f security engineering:

the case of adverse selection

  • f trust certificates

Dusko Pavlovic

Kestrel Institute and Oxford University

Elva, Estonia June 2010

slide-2
SLIDE 2

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Outline

Problem: All protocols are insecure Background: Notion of trust Analysis: Trust dynamics Method: Learning trust concepts Conclusion: Security is an elephant

slide-3
SLIDE 3

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Outline

Problem: All protocols are insecure The life cycle of security Adverse selection Problem of trust Background: Notion of trust Analysis: Trust dynamics Method: Learning trust concepts Conclusion: Security is an elephant

slide-4
SLIDE 4

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

The Unreasonable Effectiveness

  • f Mathematics in Natural Sciences
  • E. Wigner (1960)

◮ Why is nature made in the measure of our mind?

slide-5
SLIDE 5

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

The Unreasonable Ineffectiveness

  • f Engineering in Security

◮ Why are we not becoming more secure

from more security technologies?

slide-6
SLIDE 6

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

The Unreasonable Ineffectiveness

  • f Engineering in Security

Why?

slide-7
SLIDE 7

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Failures are first-class citizens

slide-8
SLIDE 8

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Failures are first-class citizens

Bull’s protocol

◮ Isabelle: secure for E(k, m; n) ◮ Ryan & Schneider: not for E(k, m; n) = n ⊕ Hk(m)

slide-9
SLIDE 9

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Failures are first-class citizens

Bull’s protocol

◮ Isabelle: secure for E(k, m; n) ◮ Ryan & Schneider: not for E(k, m; n) = n ⊕ Hk(m)

IPSec GDoI

◮ IETF MSec WG: secure (7 drafts), verified (3 times) ◮ Cathy & Dusko: GDoI_PoP attack

slide-10
SLIDE 10

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Failures are first-class citizens

Bull’s protocol

◮ Isabelle: secure for E(k, m; n) ◮ Ryan & Schneider: not for E(k, m; n) = n ⊕ Hk(m)

IPSec GDoI

◮ IETF MSec WG: secure (7 drafts), verified (3 times) ◮ Cathy & Dusko: GDoI_PoP attack

MQV

◮ NSA: "MQV is critical for national security of US" ◮ Krawczyk: MQV insecure

slide-11
SLIDE 11

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Failures are first-class citizens

Bull’s protocol

◮ Isabelle: secure for E(k, m; n) ◮ Ryan & Schneider: not for E(k, m; n) = n ⊕ Hk(m)

IPSec GDoI

◮ IETF MSec WG: secure (7 drafts), verified (3 times) ◮ Cathy & Dusko: GDoI_PoP attack

MQV

◮ NSA: "MQV is critical for national security of US" ◮ Krawczyk: MQV insecure, HMQV proven secure

slide-12
SLIDE 12

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Failures are first-class citizens

Bull’s protocol

◮ Isabelle: secure for E(k, m; n) ◮ Ryan & Schneider: not for E(k, m; n) = n ⊕ Hk(m)

IPSec GDoI

◮ IETF MSec WG: secure (7 drafts), verified (3 times) ◮ Cathy & Dusko: GDoI_PoP attack

MQV

◮ NSA: "MQV is critical for national security of US" ◮ Krawczyk: MQV insecure, HMQV proven secure ◮ Menezes: HMQV insecure

slide-13
SLIDE 13

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Security is an adversarial process

Protocol Attack

slide-14
SLIDE 14

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Security is an adversarial process

Protocol Attack

counter-model theory

slide-15
SLIDE 15

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Adverse selection

TRUSTE-certified uncertified honest 94.6% 97.5% malicious 5.4% 2.5 %

Table: Trustworthyness of TRUSTE [Edelman 2007]

slide-16
SLIDE 16

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Adverse selection

Google sponsored

  • rganic

top 4.44% 2.73% top 3 5.33% 2.93 % top 10 5.89% 2.74 % top 50 5.93% 3.04 %

Table: Malicious search engine placements [Edelman 2007]

slide-17
SLIDE 17

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Adverse selection

Yahoo! sponsored

  • rganic

top 6.35% 0.00% top 3 5.72% 0.35 % top 10 5.14% 1.47 % top 50 5.40% 1.55 %

Table: Malicious search engine placements [Edelman 2007]

slide-18
SLIDE 18

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Adverse selection

Ask sponsored

  • rganic

top 7.99% 3.23% top 3 7.99% 3.24 % top 10 8.31% 2.94 % top 50 8.20% 3.12 %

Table: Malicious search engine placements [Edelman 2007]

slide-19
SLIDE 19

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Adverse selection

"Pillars of the society" phenomenon

◮ social hubs are more often corrupt ◮ the rich are more often thieves ◮ . . .

slide-20
SLIDE 20

Ineffectiveness of trust

  • D. Pavlovic

Problem

The life cycle of security Adverse selection Problem of trust

Background Analysis Method Conclusion

Problem of trust

◮ Why does adverse selection happen? ◮ Can it be eliminated? Limited? ◮ Can we hedge against it? ◮ Is there a rational trust policy?

slide-21
SLIDE 21

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Outline

Problem: All protocols are insecure Background: Notion of trust Analysis: Trust dynamics Method: Learning trust concepts Conclusion: Security is an elephant

slide-22
SLIDE 22

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

What is trust?

Alice trusts that Bob will act according to protocol Φ.

slide-23
SLIDE 23

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

What is trust?

Alice trusts that Bob will act according to protocol Φ.

Examples

◮ shopping: Bob will deliver goods ◮ marketing: Bob will pay for goods ◮ access control: Bob will not abuse resources ◮ key infrastructure: Bob’s keys are not compromised

slide-24
SLIDE 24

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Modeling trust

Trust relation u

Φ

−→

r

j

◮ u: trustor ◮ j: trustee ◮ Φ: entrusted concept (protocol, task, property) ◮ r: trust rating

slide-25
SLIDE 25

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Views of Trust

Local: trust logics

u

Φ

−→ j means that

◮ u requires Φ ◮ j guarantees Φ

slide-26
SLIDE 26

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Views of Trust

Global: trust networks

u

d

−→

r

v

d

−→

s

w

b

−→

t

k means that

◮ u has a delegation certificate for v ◮ v has a delegation certificate for w ◮ w has a binding certificate for the key k

slide-27
SLIDE 27

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Views of Trust

Global: trust networks

u

d

−→

r

v

d

−→

s

w

b

−→

t

k means that

◮ u has a delegation certificate for v ◮ v has a delegation certificate for w ◮ w has a binding certificate for the key k ◮ thus u can use the key k

◮ even compute its trust rating rst

◮ although they had no direct contact

slide-28
SLIDE 28

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Network dynamics

Networks are built upon networks:

◮ session keys upon long term keys ◮ strong secrets upon weak secrets ◮ crypto channels upon physical or social channels

slide-29
SLIDE 29

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Network dynamics

Networks are built upon networks:

◮ session keys upon long term keys ◮ strong secrets upon weak secrets ◮ crypto channels upon physical or social channels ◮ secure interactions upon trust ◮ trust upon secure interactions

slide-30
SLIDE 30

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Outline

Problem: All protocols are insecure Background: Notion of trust Analysis: Trust dynamics Trust dynamics Trust distribution Interpretation Recommender dynamics Trust authority Method: Learning trust concepts

slide-31
SLIDE 31

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust dynamics

For a moment, we assume that the entrusted property Φ is fixed, and analyze dynamics of trust rating u −→

r

k

slide-32
SLIDE 32

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust rating matrix

trustees trustors

6 11 1 2 4

τ1 4 11 6 τ2 1 2

slide-33
SLIDE 33

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Private trust dynamics

trustees trustors

6 11 4

τ(t) 4 11 6

slide-34
SLIDE 34

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Private trust dynamics

trustees trustors X(t + 1) i Prob

  • X(t + 1) = i
  • = C(t)τi(t)

(where C(t) =

1−α

  • i∈J τi (t))
slide-35
SLIDE 35

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Private trust dynamics

trustees trustors X ( t + 1 ) new Prob

  • X(t + 1) = new
  • =

α

slide-36
SLIDE 36

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Private trust dynamics

Trust updating process

τi(t + 1) =                        τi(t) if i X(t + 1) if i = X, not satisfactory 1 if i = X, satisfactory, new 1 + τi(t) if i = X, satisfactory, not new

slide-37
SLIDE 37

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

Task

Estimate wℓ(t) = #{i ∈ J | τi(t) = ℓ}

slide-38
SLIDE 38

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

w1(t + 1) − w1(t) = J · Prob

  • X(t + 1) = i | i new
  • · γ⊥

−w1(t) · Prob

  • X(t + 1) = i | τi(t) = 1
  • =

Jαγ⊥ − w1(t)C(t)

slide-39
SLIDE 39

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

wℓ(t + 1) − wℓ(t) = wℓ−1(t) · Prob

  • X(t + 1) = i | τi(t) = ℓ − 1
  • · γℓ−1

− wℓ(t) · Prob

  • X(t + 1) = i | τi(t) = ℓ
  • =

wℓ−1(t)C(t)(ℓ − 1)γℓ−1 − wℓ(t)C(t)ℓ

slide-40
SLIDE 40

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

The system ∆tw1(t) = Jαγ⊥ − C(t)w1(t) ∆twℓ(t) = wℓ−1(t)C(t)(ℓ − 1)γℓ−1 − wℓ(t)C(t)ℓ

slide-41
SLIDE 41

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

. . . divided by J becomes ∆tv1(t) = αγ⊥ − C(t)v1(t) ∆tvℓ(t) = vℓ−1(t)C(t)(ℓ − 1)γℓ−1 − vℓ(t)C(t)ℓ where vℓ(t) = wℓ(t)

J

= Prob(i ∈ J | τi(t) = ℓ) form a stochastic process v : N −→ DR

slide-42
SLIDE 42

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

. . . and since v : N −→ DR is a martingale, it extends to v : R −→ DR and the system becomes dv1 dt = αγ⊥ − c t v1 dvℓ dt = γℓ−1c(ℓ − 1)vℓ−1 − cℓvℓ t where C(t) ≈ c

t , for c = 1−α 1+αγ⊥ (see Appendix)

slide-43
SLIDE 43

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

The steady state of v : R −→ DR will be in the form vℓ(t) = t · υℓ, where υ1 = αγ⊥ − cυ1 υℓ = γℓ−1c(ℓ − 1)υℓ−1 − cℓυℓ

slide-44
SLIDE 44

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

The steady state of v : R −→ DR will be in the form vℓ(t) = t · υℓ, where υ1 = αγ⊥ c + 1 υℓ = (ℓ − 1)γℓ−1c ℓc + 1 υℓ−1

slide-45
SLIDE 45

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

. . . which expands into υ2 = αγ⊥ c + 1 · γ1c 2c + 1 υ3 = αγ⊥ c + 1 · γ1c 2c + 1 · 2γ2c 3c + 1 . . . υn = αγ⊥        

n−1

  • ℓ=1

γℓ         cn−1 · (n − 1)! n

k=1(kc + 1)

= αγ⊥Gn−1 c · (n − 1)! n

k=1

  • k + 1

c

  • =

αγ⊥Gn−1 c · Γ(n)Γ

  • 1 + 1

c

  • Γ
  • n + 1 + 1

c

  • =

αγ⊥Gn−1 c · B

  • n, 1 + 1

c

slide-46
SLIDE 46

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

The solution υ1 = αγ⊥ c + 1 υn = αγ⊥Gn−1 c B

  • n, 1 + 1

c

  • n→∞

−→ αγ⊥G c n−(1+ 1

c)

where G =

  • ℓ=1

γℓ > 0 follows from 1 esℓ ≤ γℓ ≤ 1 for some

  • ℓ=1

sℓ < ∞

slide-47
SLIDE 47

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

Theorem

The described process of trust building leads, in the long run, to the power law distribution of the number of trusteess with the trust rating n wn ≈ αγ⊥GJ c n−(1+ 1

c)

slide-48
SLIDE 48

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

Theorem

The described process of trust building leads, in the long run, to the power law distribution of the number of trusteess with the trust rating n wn ≈ αγ⊥GJ c n−(1+ 1

c)

provided that the incidence of dishonest principals who act honestly long enough to accumulate a high trust rating — is low enough

slide-49
SLIDE 49

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust distribution

Theorem

The described process of trust building leads, in the long run, to the power law distribution of the number of trusteess with the trust rating n wn ≈ αγ⊥GJ c n−(1+ 1

c)

provided that the incidence of dishonest principals who act honestly long enough to accumulate a high trust rating — is low enough (so that γℓ

ℓ→∞

−→ 1 fast enough)

slide-50
SLIDE 50

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

What does this mean?

Some things have a fixed scale

Figure: Normal distribution f(x) = ae−bx2

slide-51
SLIDE 51

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

What does this mean?

Many social phenomena are scale-free

Figure: Power law w(x) = ax−(1+b)

slide-52
SLIDE 52

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Dynamics → robustness → fragility

Dynamics of scale-free distributions

  • V. Pareto: "The rich get richer"
slide-53
SLIDE 53

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Dynamics → robustness → fragility

Dynamics of scale-free distributions

  • V. Pareto: "The rich get richer"

Robustness of scale free distributions

The market is stabilized by the hubs of wealth.

slide-54
SLIDE 54

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Dynamics → robustness → fragility

Dynamics of scale-free distributions

  • V. Pareto: "The rich get richer"

Robustness of scale free distributions

The market is stabilized by the hubs of wealth.

Fragility of scale free distributions

Theft is easier when there are very rich people.

slide-55
SLIDE 55

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Policy guidance

Change dynamics

Modify the process of accumulation to assure a less fragile distribution of trust.

slide-56
SLIDE 56

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Policy guidance

Change dynamics

Modify the process of accumulation to assure a less fragile distribution of trust, wealth, evolutionary fitness. . . .

slide-57
SLIDE 57

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Policy guidance??

Change dynamics

Modify the process of accumulation to assure a less fragile distribution of trust, wealth, evolutionary fitness. . . .

slide-58
SLIDE 58

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Policy guidance??

Change dynamics

Modify the process of accumulation to assure a less fragile distribution of trust, wealth, evolutionary fitness. . . .

Moral

Simple social processes lead to complex policy problems.

slide-59
SLIDE 59

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Private vs public trust

But we only talked about private trust vectors.

slide-60
SLIDE 60

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Private vs public trust

But we only talked about private trust vectors. Why is private trust accumulation a social process?

slide-61
SLIDE 61

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Public trust process

Using recommenders trustees trustors recommenders

3 5 1 9 2 2 1 6

2 A1 2 5 3 1 A2 6 1 9 σ τ 10 11 6 9

slide-62
SLIDE 62

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Public trust process

Using recommenders trustees trustors recommenders

5 1 2 1

2 A1 2 5 3 1 A2 6 1 9 σ τ 10 11 6 9

slide-63
SLIDE 63

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Public trust process

Using recommenders trustees trustors recommenders

5 1 2 1 try

2 A1 2 5 3 1 A2 6 1 9 σ τ 10 11 6 9

slide-64
SLIDE 64

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Public trust process

Using recommenders trustees trustors recommenders

5 1 try f e e d b a c k f e e d b a c k

2 A1 2 5 3 1 A2 6 1 9 σ τ 10 11 6 9

slide-65
SLIDE 65

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Public trust process

Using recommenders trustees trustors recommenders

6 2 try f e e d b a c k f e e d b a c k

2 A1 2 6 3 1 A2 6 2 9 σ τ 10 14 6 9

slide-66
SLIDE 66

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Public trust process

Using recommenders trustees trustors recommenders

3 6 6 9 2 3 2 6

3 A1 2 6 3 2 A2 6 2 9 σ τ 18 22 9 18

slide-67
SLIDE 67

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust authority distribution

Upshot

Recommenders’ public trust vectors also obey the power law distribution. Recommenders’ reputations obey the power law distribution.

slide-68
SLIDE 68

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis

Trust dynamics Trust distribution Interpretation Recommenders Trust authority

Method Conclusion

Trust authority distribution

Upshot

Recommenders’ public trust vectors also obey the power law distribution. Recommenders’ reputations obey the power law distribution.

Consequence

Adverse selection

slide-69
SLIDE 69

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Outline

Problem: All protocols are insecure Background: Notion of trust Analysis: Trust dynamics Method: Learning trust concepts Negative result Trust semantics Conclusion: Security is an elephant

slide-70
SLIDE 70

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Fragility of trust networks

Corollary

The hubs attract attacks as soon as trust is (a) public (b) uniform (c) abstract

slide-71
SLIDE 71

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Fragility of trust networks

Corollary

The hubs attract attacks as soon as trust is (a) public

◮ ratings available to all

(b) uniform

◮ all certificates equally secure

(c) abstract

◮ "trust laundering" ("Non olet.")

slide-72
SLIDE 72

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Defending trust networks

Policy

Possible defense strategies are: (a) non-public: private trust vectors

◮ recommendations must be public

(b) non-uniform: higher security for higher trust

◮ complicated; contradicts (a).

(c) non-abstract: retain trust concepts

◮ "trust unlaundering": u Φ

−→

r

j

slide-73
SLIDE 73

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Defending trust networks

Policy

Possible defense strategies are: (a) non-public: private trust vectors

◮ recommendations must be public

(b) non-uniform: higher security for higher trust

◮ complicated; contradicts (a).

(c) non-abstract: retain trust concepts

◮ "trust unlaundering": u Φ

−→

r

j

◮ record the actual feedback (∼ "marked money")

slide-74
SLIDE 74

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Defending trust networks

Policy

Possible defense strategies are: (a) non-public: private trust vectors

◮ recommendations must be public

(b) non-uniform: higher security for higher trust

◮ complicated; contradicts (a).

(c) non-abstract: retain trust concepts

◮ "trust unlaundering": u Φ

−→

r

j

◮ record the actual feedback (∼ "marked money") ◮ credit rating

slide-75
SLIDE 75

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Defending trust networks

Policy

Possible defense strategies are: (a) non-public: private trust vectors

◮ recommendations must be public

(b) non-uniform: higher security for higher trust

◮ complicated; contradicts (a).

(c) non-abstract: retain trust concepts

◮ "trust unlaundering": u Φ

−→

r

j

◮ record the actual feedback (∼ "marked money") ◮ credit rating ◮ trust concept learning

slide-76
SLIDE 76

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Trust spaces

Definition

For the sets

◮ U of trustors, and ◮ J of trustees

we call

◮ a linear subspace of RU — trustor space ◮ a linear subspace of RJ — trustee space

slide-77
SLIDE 77

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Trust communities

Definition

Let M = (u −→

r

j)U×J be a trust matrix.

◮ A trustor community is an eigenspace of M‡M. ◮ A trustee community is an eigenspace of MM‡.

slide-78
SLIDE 78

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Spectral decomposition of trust matrix

M induces a bijection Λ between the communities RU RJ

M

U J

Λ Ψ‡ Ψ Υ‡ Υ

M =

d

  • ℓ=1

λℓ|ΨℓΥℓ|

slide-79
SLIDE 79

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Trust concepts

Definition

Let M = (u −→

r

j)U×J be a trust matrix. A trust concept is a pair Φℓ = Υℓ, Ψℓ where

◮ Υℓ ⊆ RU is a trustor community ◮ Ψℓ ⊆ RJ is a trustee community ◮ Λ(Υℓ) = Ψℓ

slide-80
SLIDE 80

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method

Negative result Learning trust

Conclusion

Qualitative decomposition of trust

u

Φ = rℓΦℓ

− − − − − − − − − →

r = rℓ

j where rℓ = λℓΨjℓΥuℓ

slide-81
SLIDE 81

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Outline

Problem: All protocols are insecure Background: Notion of trust Analysis: Trust dynamics Method: Learning trust concepts Conclusion: Security is an elephant

slide-82
SLIDE 82

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Security is an adversarial process

Trust Adverse selection

rich get richer learning trust

slide-83
SLIDE 83

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Security is a collaborative process

cryptography protocols pervasive, embedded, economics of security trust and risk, social choice (voting, market) physical security security information systems, search, learning

slide-84
SLIDE 84

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Security Engineering

Six Blind Men and the Elephant

slide-85
SLIDE 85

Ineffectiveness of trust

  • D. Pavlovic

Problem Background Analysis Method Conclusion

Summary

◮ Problem: old ◮ Background: fragmented ◮ Analysis: dynamics ◮ Method: semantics (no simple policy)