vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the agility to monitor or control that other party” (Mayer et al., 1995)
vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the agility to monitor or control that other party” (Mayer et al., 1995)
outbalancing the advantages yielded by the trust relationship? • Can I mitigate misplaced trust? • Maybe there is an entity I trust enough? (Centralized) • Maybe trust should be distributed to a quorum? (Federated) • Maybe trust should be completely distributed without central nodes? (Decentralized)
time. Meanwhile .gov or hospitals might be vulnerable • Data localization doesn’t matter. Where are the keys stored? • Are standards kept up-to-date? • Studies show that password policies (rotation, restrictions …) make users less secure
• Usually, easy to find the low-hanging fruit. Raising costs for attacker to find vulnerabilities • Most large tech companies have a “red team” that is constantly looking for vulnerabilities before the “bad guys” find them
of the software by security researchers and academics • Why easier? • No need for reverse engineering • Builds can be instrumented for analysis techniques (such as static analysis, fuzzing, constraint solving…)
support open-source software that constitutes critical infrastructure for the EU • EU-FOSSA: Pilot Project for auditing of Open Source Software at the European Institutions
Can be applied in other areas including software updates, end-to-end encrypted messaging (CONIKS) … • Distributed ledger community is working on solving similar problems
we have a formally verified implementation of a voting protocol that comes with strong security proofs • Should we be using it? • Lack of widespread understanding of how the voting system fundamentally works • “The election is gonna be rigged” feeling • There might be lower-level attacks • Does it run in a trusted environment? • How do we verify the silicon?