Putting trojans on the horns of a dilemma: Redundancy for information theft detection

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Conventional approaches to either information flow security or intrusion detection are not suited to detecting Trojans that steal information such as credit card numbers using adVanced cryptovirological and inference channel techniques. We propose a technique based on repeated deterministic replays in a virtual machine to detect the theft of private information. We prove upper bounds on the average amount of information an attacker can steal without being detected, even if they are allowed an arbitrary distribution of visible output states. Our intrusion detection approach is more practical than traditional approaches to information flow security. We show that it is possible to, for example, bound the average amount of information an attacker can steal from a 53-bit credit card number to less than a bit by sampling only 11 of the 253 possible outputs visible to the attacker, using a two-pronged approach of hypothesis testing and information theory. ©Springer-Verlag Berlin Heidelberg 2009.

Cite

CITATION STYLE

APA

Crandall, J. R., Brevik, J., Ye, S., Wassermann, G., De Oliveira, D. A. S., Su, Z., … Chong, F. T. (2009). Putting trojans on the horns of a dilemma: Redundancy for information theft detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5430 LNCS, pp. 244–262). https://doi.org/10.1007/978-3-642-01004-0_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free