Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6883956 | Computers & Security | 2018 | 23 Pages |
Abstract
In this research, we first introduce formal game-based security definitions that capture the technique's claimed security impact and present a general game-based model using these definitions. We then apply this general model to faux, obfuscated, and active response patches to formally analyze their security impact. Finally, we discuss whether these ideal properties of deceptive systems can be achieved in reality.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Jeffrey Avery, John Ross Wallrabenstein,