TIM MULLER Tim.Muller@nottingham.ac.uk
Assistant Professor
Provably Robust Decisions based on Potentially Malicious Sources of Information
Muller, Tim; Wang, Dongxia; Sun, Jun
Authors
Dongxia Wang
Jun Sun
Abstract
Sometimes a security-critical decision must be made using information provided by peers. Think of routing messages, user reports, sensor data, navigational information, blockchain updates. Attackers manifest as peers that strategically report fake information. Trust models use the provided information, and attempt to suggest the correct decision. A model that appears accurate by empirical evaluation of attacks may still be susceptible to manipulation. For a security-critical decision, it is important to take the entire attack space into account. Therefore, we define the property of robustness: the probability of deciding correctly, regardless of what information attackers provide. We introduce the notion of realisations of honesty, which allow us to bypass reasoning about specific feedback. We present two schemes that are optimally robust under the right assumptions. The “majority-rule” principle is a special case of the other scheme which is more general, named “most plausible realisations”.
Conference Name | 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) |
---|---|
Conference Location | Boston, Massachusetts, USA. |
Start Date | Jun 22, 2020 |
End Date | Jun 26, 2020 |
Acceptance Date | Apr 20, 2020 |
Online Publication Date | Aug 4, 2020 |
Publication Date | Jun 22, 2020 |
Deposit Date | Sep 18, 2023 |
Publisher | Institute of Electrical and Electronics Engineers |
Pages | 411-425 |
Book Title | 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) |
ISBN | 9781728165738 |
DOI | https://doi.org/10.1109/csf49147.2020.00036 |
Public URL | https://nottingham-repository.worktribe.com/output/5227208 |
Publisher URL | https://ieeexplore.ieee.org/document/9155184 |
You might also like
The Reputation Lag Attack
(2019)
Conference Proceeding
Information Theoretical Analysis of Unfair Rating Attacks under Subjectivity
(2019)
Journal Article
Is It Harmful when Advisors Only Pretend to Be Honest?
(2016)
Conference Proceeding
Using Information Theory to Improve the Robustness of Trust Systems
(2015)
Conference Proceeding
The Fallacy of Endogenous Discounting of Trust Recommendations
(2015)
Conference Proceeding
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search