Dr TIM MULLER Tim.Muller@nottingham.ac.uk
ASSISTANT PROFESSOR
Provably Robust Decisions based on Potentially Malicious Sources of Information
Muller, Tim; Wang, Dongxia; Sun, Jun
Authors
Dongxia Wang
Jun Sun
Abstract
Sometimes a security-critical decision must be made using information provided by peers. Think of routing messages, user reports, sensor data, navigational information, blockchain updates. Attackers manifest as peers that strategically report fake information. Trust models use the provided information, and attempt to suggest the correct decision. A model that appears accurate by empirical evaluation of attacks may still be susceptible to manipulation. For a security-critical decision, it is important to take the entire attack space into account. Therefore, we define the property of robustness: the probability of deciding correctly, regardless of what information attackers provide. We introduce the notion of realisations of honesty, which allow us to bypass reasoning about specific feedback. We present two schemes that are optimally robust under the right assumptions. The “majority-rule” principle is a special case of the other scheme which is more general, named “most plausible realisations”.
Citation
Muller, T., Wang, D., & Sun, J. (2020, June). Provably Robust Decisions based on Potentially Malicious Sources of Information. Presented at 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), Boston, Massachusetts, USA
Presentation Conference Type | Edited Proceedings |
---|---|
Conference Name | 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) |
Start Date | Jun 22, 2020 |
End Date | Jun 26, 2020 |
Acceptance Date | Apr 20, 2020 |
Online Publication Date | Aug 4, 2020 |
Publication Date | Jun 22, 2020 |
Deposit Date | Sep 18, 2023 |
Publisher | Institute of Electrical and Electronics Engineers |
Pages | 411-425 |
Book Title | 2020 IEEE 33rd Computer Security Foundations Symposium (CSF) |
ISBN | 9781728165738 |
DOI | https://doi.org/10.1109/csf49147.2020.00036 |
Public URL | https://nottingham-repository.worktribe.com/output/5227208 |
Publisher URL | https://ieeexplore.ieee.org/document/9155184 |
You might also like
A Difficulty in Trust Modelling
(2023)
Presentation / Conference Contribution
Pre-Signature Scheme for Trustworthy Offline V2V Communication
(2023)
Presentation / Conference Contribution
Simulating the Impact of Personality on Fake News
(2021)
Presentation / Conference Contribution
The Reputation Lag Attack
(2019)
Presentation / Conference Contribution
Information Theoretical Analysis of Unfair Rating Attacks under Subjectivity
(2019)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search