Towards formal analysis of insider threats for auctions
Conference paper
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963
Type | Conference paper |
---|---|
Title | Towards formal analysis of insider threats for auctions |
Authors | Kammueller, F., Kerber, M. and Probst, C. |
Abstract | This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions. |
Keywords | auctions, formal methods, insider threat |
Research Group | Foundations of Computing group |
Conference | ACM-CCS Workshop on Management of Security of Insider Threats |
Page range | 23-34 |
ISBN | |
Hardcover | 9781450345712 |
Publisher | Association for Computing Machinery (ACM) |
Publication dates | |
28 Oct 2016 | |
Publication process dates | |
Deposited | 19 Sep 2016 |
Accepted | 10 Sep 2016 |
Output status | Published |
Accepted author manuscript | |
Copyright Statement | © 2016 ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST '16), http://dx.doi.org/10.1145//2995959.2995963 |
Digital Object Identifier (DOI) | https://doi.org/10.1145/2995959.2995963 |
Language | English |
Book title | Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST '16) |
https://repository.mdx.ac.uk/item/869vy
Download files
65
total views15
total downloads2
views this month0
downloads this month