SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Sharing Sensitive Data


               The	Phish-Market	Protocol
               Secure Sharing Between Competitors


      The Phish-Market protocol encourages take-down
      companies to share information about malicious websites
      by compensating them for this data without revealing
      sensitive information to their competitors. Cryptography
      lets contributing firms verify payment amounts without
      learning which offered website URLs were “purchased.”




               C
Tal Moran                 onsider the following situation: company A                          Unfortunate-
and Tyler                 is a startup with a new product that it would                   ly, in practice,
Moore                     like to market. Company B is a mailing-list                     two companies often have trouble finding a third party
Harvard                   provider and has a huge database of people’s                    that they both completely trust. Situations like these are
University     names, addresses, and attributes.                                          where modern cryptography can truly shine. Using a
                   Based on its research, company A is convinced                          cryptographic protocol, companies A and B can emu-
               that people who like dogs and are more than six feet                       late a virtual trusted party that provides the same services a
               tall will respond favorably to an advertisement for its                    real one would, but without having to trust in anything
               product. Thus, A would like to purchase a list of po-                      but their own implementation of the protocol.
               tential customers with these attributes from company                           We’ve constructed an efficient protocol that solves
               B. However, A doesn’t want to reveal its marketing                         this problem, which we believe can be applied to
               strategy—if competitors discover that A’s product is                       many similar data-sharing problems.
               being targeted to tall dog-lovers, they might be able
               to scoop it.                                                               Phishing Website Take Down
                   One solution would be for company A to buy the                         Our original motivation came from a seemingly un-
               entire database from company B. This would certainly                       related real-life problem: an attempt to encourage data
               hide any specific attributes A is looking for. However,                    sharing between phishing take-down companies.
               this could be prohibitively expensive—the actual data                          Phishing is the criminal activity of enticing people
               A is interested in is only a tiny fraction of the database.                to visit websites that impersonate genuine bank web-
               Moreover, A might already have a list of potential cus-                    sites and dupe visitors into revealing passwords and
               tomers compiled from other sources; A would prefer                         other credentials. (Although a wide range of compa-
               not to pay twice for data it already has. There might                      nies have been subject to phishing attacks, most are
               also be privacy or regulatory issues preventing B from                     financial institutions; for simplicity, we use the term
               selling too much of its information to one entity.                         “banks” for firms being attacked.) One key counter-
                   A second possibility would be for both companies                       measure to phishing is to promptly remove the imita-
               to use a trusted third party (TTP). Company A can                          tion websites. Banks can achieve removal by erasing
               disclose its secret strategy and the list of names it al-                  the webpages from the hosting machine or contacting
               ready knows to the TTP while company B discloses                           a registrar to suspend a domain name from the Do-
               its entire database. In this case, the TTP could search                    main Name System (DNS), so the fraudulent host can
               the database for tall dog-lovers who aren’t on A’s “al-                    no longer be resolved.
               ready known” list, send those to A, and reveal only                            Although some banks deal with phishing web-
               the total sum company A must pay to company B in                           site removal exclusively in-house, most hire specialist
               return for this information.                                               take-down companies to carry out the task. Such com-

40	            COPUBLISHED	BY	THE	IEEE	COMPUTER	AND	RELIABILITY	SOCIETIES							■						1540-7993/10/$26.00	©	2010	IEEE							■						JULY/AUGUST	2010
Sharing Sensitive Data


    Table 1. Timed and financial exposure to phishing attacks caused by not sharing data.*

    Exposure figures (six-month totals)                 tA’s client banks                                         tB ’s client banks
    Actual values                                       1,005,000 hrs ($276 million)                              78,000 hrs ($32.0 million)
    Effect of not sharing                               587,000 hrs ($163 million)                                17,000 hrs ($3.5 million)
    Expected exposure if sharing                        418,000 hrs ($113 million)                                61,000 hrs ($28.5 million)
    *Numbers in red indicate the portion of phishing risk caused by slower take down.




panies—typically, divisions of brand-protection firms                              Ordinary phishing sites                      Mean lifetime (hours)
or information security service providers—perform                                        τA              Others                     τA              Others
two key services. First, they’re good at getting phish-                                         τA 1st                                     τA 1st
ing websites removed quickly, having developed rela-                                             577                                        44
tionships with ISPs and registrars across the globe and                          4,118                      5,962              17                       112
                                                                                              Others 1st                                 Others 1st
deployed multilingual teams at 24/7 operation centers.                                          4,313                                       56
Second, they collect a more timely and comprehensive
listing of phishing URLs than banks normally gather.
    Most take-down companies view their URL feeds
as a key competitive advantage over banks and oth-                     Figure 1. Missed phishing websites. We can see how substantial
er take-down providers. However, recent work has                       incompleteness in one take-down company’s URL feed slowed removal of
shown that the feeds such companies compile suffer                     phishing websites impersonating 54 banks.1
from large gaps in coverage that significantly prolong
the time needed to remove phishing websites. Tyler
Moore and Richard Clayton examined six months of                       can indicate which bank is the subject of the phishing
aggregated URL feeds from many sources, includ-                        URL or customer attributes in a database.
ing two major take-down companies.1 They found                            At a high level, the Phish-Market protocol does
that up to 40 percent of phishing websites remained                    the following:
unknown to the company with the take-down con-
tract but were discovered by others. Another 29 per-                   • shares only those records that match the tags the
cent were discovered by the responsible take-down                        buyer requests;
company only after others had identified them. By                      • hides from the seller which records the buyer receives;
measuring these missed websites’ substantially lon-                    • hides from the seller which tags the buyer requests; and
ger lifetimes, Moore and Clayton estimated that 120                    • securely tallies the number of records the buyer re-
banks served by these two companies collectively risk                    ceives without double-counting records from the
at least US$330 million per year by failing to share                     seller that the buyer already has.
proprietary URL feeds (see Table 1).
    Figure 1 gives the details for one take-down com-                  These requirements are essential for take-down com-
pany, labeled tA. The left circle represents the phishing              panies considering sharing phishing URL data. The
sites that appear in tA’s feed, and the right circle the               first requirement ensures that only URLs pertaining
sites that appear in its competitors’ feeds. The intersec-             to banks that the take-down company is interested in
tion contains the sites that appear in all feeds, the top              are exchanged. The second and third requirements
half representing sites that tA found before other com-                protect the acquiring firm from revealing too much
panies, and the bottom those others found before tA.                   about its business posture, such as its client banks and
                                                                       its weaknesses in phishing-website-detection capabil-
The Phish-Market Protocol                                              ity. The fourth requirement assures both the buyer
Named after its applicability to sharing phishing                      and seller that the exchange is fair. We anticipate that
URLs, the Phish-Market protocol can efficiently solve                  take-down companies would execute the protocol as
data-sharing problems while overcoming the sharing                     both buyers and sellers, and that only the net con-
entities’ competitive concerns. Contributors are com-                  tributor would be compensated financially.
pensated, but sensitive details that might be inferred                     The requirements also match up nicely to the cus-
from a transaction are hidden from both parties, all                   tomer database provider problem. In fact, we envi-
without requiring access to a TTP. The protocol aims                   sion many data-sharing applications that could benefit
to let a buyer acquire new records, such as phishing                   from a sharing mechanism like the Phish-Market pro-
URLs or customer details, from a seller. The buyer                     tocol. For instance, hospitals might be willing to share
is interested only in a subset of data matching one                    de-identified patient records with medical researchers.
or more tags, attributes describing the records. Tags                  Instead of sharing entire databases, they might share

	                                                                                                                     www.computer.org/security	              41
Sharing Sensitive Data


                                                                                                                           Proof of         Proof of
      1 Committment                     2a Offer                      2b Choice                 3 Payment              4                5
                                                                                                                           payment          preknowledge
                                                                         Case 1: Bob is not
                                                                         interested

                       C                                                                  1                 $0                                     P
                                                        P
                                                                                                                                  P
                                   D       1        2
                                                C                             2

                                                        C
                   A
                           B

                                                                                  P
           A   B       C       D                            C   P                     P                                     $1              1          B
                                            1           2




                                                                    Case 2: Bob is interested   Case 2a: knows info
                                                                                          2
                                                                                                            $0
                                                                                                                                  P
                                                                                  1



                                                                                  P
                                                                                                                            $1              1          A




      6 Settlement
        ... many transactions later
                                                                                                Case 2b: Info is new

                                                                                                            $1                                     P




                                                                                                                            $1              1          B




Figure 2. Overview of the Phish-Market protocol. Columns correspond to protocol steps, whereas rows correspond to the different
situations that might occur during execution (note that to the seller, the different situations are indistinguishable).



                                   only those records matching a combination of diseases               Step 2: Seller Offer and Buyer Choice
                                   and other selected attributes. Oil companies might                  Sally sends Bob an offer for each record she wishes to
                                   like to purchase geographical data on seabeds without               sell. Included in the offer is a tag, a commitment to the
                                   revealing their exploration plans to competitors.                   record, and a “proof key” (explained in steps 4 and 5).
                                       Other types of information security data lists, such            Bob can use the tag to decide whether he’s interested in
                                   as DNS and IP blacklists, could also be more effective              the record Sally is offering. If Bob chooses not to learn
                                   if shared more widely among security firms.                         the record, he will instead learn a second proof key that
                                                                                                       will let him withhold payment for this record later in
                                   Protocol Overview                                                   the protocol (without revealing the fact to Sally).
                                   We now describe the Phish-Market protocol at a high                     To keep Bob’s choice secret from Sally, Bob and
                                   level, keeping the cryptography details to a minimum.               Sally execute an Oblivious Transfer (OT) protocol.
                                   A detailed technical description will appear in a com-              We can think of this OT protocol as Sally placing the
                                   panion paper.2 We use several cryptographic primi-                  record and a proof key in two locked boxes. The box-
                                   tives—commitments, zero-knowledge proofs, and oblivious             es are labeled and given to Bob, along with a key that
                                   transfer—which we describe briefly; readers can find                can open either box (but that Bob can only use once).
                                   formal definitions elsewhere.3,4                                    If Bob decides he’s interested in the record, he opens
                                       The entire protocol takes six steps to complete, as             the box with the record; if not, he opens the other box
                                   Figure 2 illustrates, with Bob acting as buyer and Sally            to get the second proof key.
                                   as seller.
                                                                                                       Step 3: Payment
                                   Step 1: Buyer Commitment                                            Bob must now pay up for the new record learned
                                   Bob first commits to his current state of knowledge—                from Sally. Of course, Bob should pay Sally only if he
                                   all the records in his database—and sends his commit-               chooses to learn the record and doesn’t already know
                                   ment to Sally. Cryptographic commitments bind Bob                   it. Hence, he can pay using a real or fake payment. A
                                   to his state of knowledge while keeping the informa-                real payment is a cryptographic commitment to the
                                   tion hidden from Sally. This commitment will let Bob                number 1, whereas a fake payment is a commitment
                                   withhold payment for records he already knows.                      to the number 0. In this context, a commitment from

42	                                IEEE	SECURITY	&	PRIVACY
Sharing Sensitive Data


Bob is a public-key encryption of a value (0 or 1) using    change unknown records, Bob and Sally can finally
a key known only to Bob. Sally can’t infer the com-         settle up. The payment commitments’ homomorphic
mitment’s value without the key, but Bob can poten-         property lets anyone take two commitments and,
tially open the commitment later and thereby prove          without opening either one, compute a commitment
to Sally the true value committed. In fact, Bob will        to the sum of their values. Figure 2 represents this as
never open the payment commitment because this              weighing the piggy bank containing the payments:
will reveal too much information to Sally. Instead, we      we don’t need to open it up to verify the total weight
use commitments with a special homomorphic property         (and from the total weight, no one can tell which in-
that will let Bob prove the total number of real pay-       dividual payments are real and which are fake).
ments made in the settlement phase (step 6) without             Using homomorphic addition, Sally can tally up the
opening any specific payment.                               sum of the many 1 and 0 payment commitments used
                                                            in step 3, even though she can’t open them. Sally takes
Step 4: Proof of Payment                                    the payments from multiple executions and computes
After sending the committed payment to Sally, Bob           a commitment to the total payment, which represents
must demonstrate that it is legitimate. Of course, the      the number of records actually “sold.” Bob can then
payment is only real if Bob committed to 1 and not 0.       open Sally’s aggregated commitment. Sally learns only
This is where the proof keys come in: using a proof         the total number of real payments received (and not
key, Bob can fake a proof and convince Sally that a         which individual payments were real). Bob and Sally
payment is real even if it isn’t. Technically, Bob uses     can use this sum as the basis for a monetary transaction.
a zero-knowledge proof to convince Sally that either
the payment is real or he uses a proof key (a zero-         Security Discussion
knowledge proof lets the prover convince the verifier       Let’s now look at the security guarantees made sepa-
of a statement without revealing anything except for        rately for the seller and buyer. For the buyer, we guar-
the statement’s validity). Figure 2 represents the proof    antee two properties: first, the seller doesn’t learn
with a balance scale; the difference between real and       anything about the set of tags the buyer is interested
fake coins is reflected in their weight (a fake coin, for   in; second, the seller doesn’t learn anything about the
example, weighs nothing, whereas a real coin weighs         set of previously known records. The only exception
1 gram). Bob places the envelope with his payment on        to these guarantees is what information the seller can
one side of the balance and a real coin on the other. If    deduce from the payment amount.
Bob’s payment is real, Sally will see that the balance          The seller’s primary interest is to ensure that she’s
shows the two are equivalent. If Bob doesn’t actually       being justly compensated for each record that the
pay up, he can use the proof key to “lock” the balance      buyer learns from her. We guarantee that the seller’s
into place and make the different weights appear equal.     security in the distributed protocol is the same as for
                                                            an “ideal” protocol involving a TTP, with two cave-
Step 5: Proof of Prior Knowledge                            ats: first, the buyer will learn the tags of all the seller’s
Bob must give Sally one more zero-knowledge proof,          records (given that those are sent in the clear), rather
this time regarding whether he knew about the record        than just those of the records he pays for (as would
before Sally gave it to him. If Bob chose not to learn      be the case using an ideal trusted party). Second, the
the record in step 2, he can’t possibly prove that he       buyer learns which records he already knows that are
already knew it. Alternatively, Bob might have iden-        also in the seller’s database (an ideal third party would
tified a previously unseen record from Sally. In both       send the buyer only records he doesn’t already know).
cases, Bob uses a proof key to generate a fake proof        The reason for both relaxations is efficiency. In partic-
claiming prior knowledge of the record.                     ular, letting the buyer learn records he already knows
    The protocol design restricts how many proof keys       (albeit without paying for them) lets him perform the
Bob has to ensure that he makes a real payment if he        database lookup himself rather than engage in a large,
learns a new record. If Bob had chosen to learn the         joint secure computation with the seller.
record in step 2, he’d be left with a single proof key.         Note that some attacks would still be possible even if
With this remaining key, he can either fake the proof       a TTP were available. For example, no guarantee exists
of payment in step 4 or the proof of prior knowledge        that the records sold will be useful or correctly tagged.
in step 5, but not both. If he chooses to use the proof     A malicious seller could send random strings instead of
key to prove prior knowledge of the record (as he’s         records, forcing the buyer to pay for garbage records
forced to do if the record is new information), he must     (because they wouldn’t appear in the buyer’s database).
provide a real proof of payment in step 4.                  A malicious seller could also attack the buyer’s privacy:
                                                            if she uses the same tag for all the records in a certain
Step 6: Settlement                                          period, she can tell whether the buyer is interested in
After running steps 1 through 5 many times to ex-           the tag if he made a payment at the end of that period.

	                                                                                                 www.computer.org/security	   43
Sharing Sensitive Data


                   Fortunately, mitigating strategies are typically         less than 3 Kbytes of communication—so running
               available to counter these threats when using the pro-       both sides on one server would only cause us to over-
               tocol in the real world. First, the buyer can evaluate       estimate the running time.)
               the records he learns and set the price he’s willing to          To test the protocol’s performance under real-world
               pay for each one based on the quality of records he          conditions, we used the phishing URL feeds from two
               received in the past. If he determines that the seller is    large take-down companies during the first two weeks
               providing low-quality records, the buyer can request         of April 2009. We assigned one take-down company
               a lower dollar price per record or refuse to do business     to be the seller and the other to be the buyer (we ran
               with that seller in the future. This would mitigate the      experiments with both companies playing both roles).
               garbage record attack. Defending against the privacy         For the two-week sample period, one company found
               breach attack is harder—the payment will always leak         8,582 unique URLs, whereas the other discovered
               some information about which tags the buyer is in-           17,721. The first company was interested in obtaining
               terested in. We can help the buyer detect such attacks       phishing URLs for 59 banks, and the second for 54
               by compromising a little on the seller’s privacy: if we      banks, according to the client lists shared with us.
               give the buyer all the tags the seller uses (without the         The primary metric we use to measure our imple-
               corresponding records), the buyer can verify that no         mentation’s performance is the time required to pro-
               set of tags is overly represented.                           cess and transmit each phishing URL from the seller
                   Finally, in a two-party protocol, unlike a protocol      to the buyer. The less time required, the closer the
               that uses a TTP, each side can decide to abort the pro-      URL sharing is to instantaneous. On average, each
               tocol prematurely. This affects our protocol’s security      URL faced a very acceptable delay of 5.13 seconds
               if the buyer decides to abort after learning a record but    to complete the exchange (3.19-second median). Two
               before making the payment. However, the same prob-           main factors affect the total delay. First is the pro-
               lem exists in many remote transactions (when pur-            cessing time required to execute the protocol. This
               chasing physical goods over the phone, for instance,         computational time was very consistent, taking an
               a seller can refuse to send the goods after receiving        average of 2.37 seconds but never more than 4.02 sec-
               payment). Sellers can use the same legal frameworks          onds. The other, less predictable, reason for delay hap-
               to handle a refusal to pay in this case.                     pens whenever many phishing URLs are discovered
                                                                            around the same time. Whenever a clump of URLs
               Protocol Efficiency                                          were reported, some URLs had to wait for others to
               Powerful results from theoretical cryptography dem-          be processed, leading to a longer delay. Although a
               onstrate how we can convert any task using a TTP             multithreaded implementation could minimize these
               into one that doesn’t require third parties.5,6 Howev-       queue delays (by utilizing more CPU cores), we chose
               er, these techniques are usually inefficient. The most       to implement the protocol using a single thread to
               efficient implementations of general techniques (such        demonstrate its feasibility even with modest hard-
               as the Fairplay system7) are still orders of magnitude       ware. Moreover, note that we optimized the protocol
               too slow for practical use on the scale required to share    implementation for clarity and source code general-
               large numbers of records. Even relatively simple com-        ity rather than speed. The average queue delay due to
               putations, such as those needed to hold sugar beet auc-      waiting on other URLs to finish processing was 2.76
               tions in Denmark,8 require specialized protocols to          seconds, and the longest delay was 34.6 seconds.
               overcome this problem.                                           To give readers a better feel for how the processing
                   Fast operation is critical when it comes to distribut-   time varies, Figure 3 plots the cumulative distribution
               ing phishing URL feeds—the longer a phishing website         functions for the time taken to process each URL, the
               remains online, the more customer credentials might be       time that URL spent waiting in the seller’s queue, and
               at risk. Fortunately, the Phish-Market protocol is much      the total delay between the time the URL entered the
               more efficient than generic secure computation.              seller’s queue and the time the buyer received it. The
                   We implemented an elliptic-curve- (EC-) based            computer processed 48.4 percent of the URLs in less
               version of the protocol in Java, using the Qilin             than 3 seconds, yet 9.7 percent took more than 10 sec-
               Crypto SDK (software developer’s kit)9 for the high-         onds. Despite the variation, no URL took more than
               level cryptographic primitives and the Bouncy Castle         37 seconds to process. Given that phishing website re-
               Crypto API (www.bouncycastle.org) for low-level              moval requires human intervention, a 37-second delay
               EC operations (full code for the implementation of           is negligible, and certainly much better than the many
               our protocol is available elsewhere9).                       days longer unknown sites currently take for removal!
                   We simulated both sides of the protocol on a single          In addition to the total delay (red dash-dot line),
               server with one dual-core 2.4-GHz Intel Xeon pro-            Figure 3 plots the delay’s two key components. The
               cessor and 2 Gbytes of memory. (The main bottleneck          green dashed line appears nearly vertical around 2 sec-
               in the protocol is the CPU—one transaction requires          onds, suggesting that the per-URL processing time is

44	            IEEE	SECURITY	&	PRIVACY
Sharing Sensitive Data


very consistent. Meanwhile, the blue solid line plots               100
the queue delay, which accounts for the overall delay’s
stretched tail. Hence, if the queue delay were reduced               80
via multiple processors or threads, the total delay might
                                                                     60
approach the consistently shorter processing time.
    In exchange for these very modest delays, take-




                                                                %
                                                                     40
down companies can trade information on new
phishing websites so that the overall lifetime of such               20                                   Per-transaction processing time
sites is reduced as much as half,1 while crediting the                                                    Queue delay
                                                                                                          Total delay
contributing firm.                                                    0
                                                                           1     4    7    10    13 16 19 22              25     28   31   34
                                                                                                  Time (seconds)


B     alancing the advantages of data sharing with the
      risks of helping competitors or experiencing pri-
vacy breaches is hard. Yet markets, both legitimate and
                                                            Figure 3. Observed cumulative distribution function of the time required to
                                                            share each phishing URL. The measured delay is between the time the seller
illicit, are becoming increasingly data-driven. From        first learned the URL and the time it becomes known to the buyer. The red
identifying users for targeted advertising to blocking      dash-dot line denotes the total real-time delay, and the others denote sub-
spam and shutting down phishing websites, sharing           components of the delay.
data is now essential because no single company has a
complete view of the global environment.
    We’ve designed and implemented a practical              2. T. Moran and T. Moore, “The Phish-Market Protocol:
mechanism for competing, untrusting companies to               Securely Sharing Attack Data between Competitors,”
selectively buy and sell the information that’s relevant       Financial Cryptography and Data Security, LNCS 6052, R.
to their needs without leaking too much additional             Sion, ed., Springer, 2010, pp. 222–237.
data. Although our implementation is focused on the         3. O. Goldreich, Foundations of Cryptography: Basic Tools,
specific data-sharing problem that phishing take-              vol. 1, Cambridge Univ. Press, 2001.
down companies encounter, we can directly apply it          4. O. Goldreich, Foundations of Cryptography: Basic Applica-
to several other problems (such as the mailing-list pro-       tions, vol. 2, Cambridge Univ. Press, 2004.
vider/targeted advertiser example in the introduction)      5. O. Goldreich, S Micali, and A. Wigderson, “How to
and employ our techniques in many similar situations.          Play Any Mental Game or a Completeness Theorem for
    In fact, many data-sharing problems have more              Protocols with Honest Majority,” Proc. 19th Ann. ACM
relaxed requirements than those the Phish-Market               Symp. Theory of Computing (STOC 87), ACM Press,
protocol must satisfy (for instance, an exploring oil          1987, pp. 218–229.
company won’t buy data about locations for which it         6. M. Ben-Or, S. Goldwasser, and A. Wigderson, “Com-
already has information, so the requirement that the           pleteness Theorems for Non-Cryptographic Fault-Tol-
company not pay for data already known isn’t need-             erant Distributed Computation,” Proc. 20th Ann. ACM
ed). In these cases, our protocol can be made simpler          Symp. Theory of Computing (STOC 88), ACM Press,
and even more efficient.                                       1988, pp. 1–10 (extended abstract).
    A key lesson from our experience is that modern         7. D. Malkhi et al., “Fairplay—A Secure Two-Party
cryptographic tools can be very helpful in resolving           Computation System,” Usenix Security Symp., Usenix
the tension between sharing and secrecy. The tech-             Assoc., 2004, pp. 287–302.
niques are now efficient enough to be practical and         8. P. Bogetoft et al., “Secure Multiparty Computation
allow an unprecedented level of control over what              Goes Live,” Financial Cryptography and Data Security,
companies can reveal and what they must not. In                LNCS 5628, R. Dingledine and P. Golle, eds., Spring-
today’s data-driven economy, these tools should be             er, 2009, pp. 325–343.
found in every developer’s toolbox.                         9. T. Moran, “The Qilin Project: A Java SDK for Rapid
                                                               Prototyping of Cryptographic Protocols,” 2009, http://
Acknowledgments                                                qilin.seas.harvard.edu.
We thank Allan Friedman for suggesting the mailing-list
problem described in the introduction.                      Tal Moran is a postdoctoral fellow at the Center for Research
                                                            on Computation and Society at Harvard University. Contact
References                                                  him at talm@seas.harvard.edu.
 1. T. Moore and R. Clayton, “The Consequence of
    Noncooperation in the Fight against Phishing,” Proc.    Tyler Moore is a postdoctoral fellow at the Center for Research
    Anti-Phishing Working Group eCrime Researchers Summit   on Computation and Society at Harvard University. Contact
    (APWG eCrime 08), IEEE Press, 2008, pp. 1–14.           him at tmoore@seas.harvard.edu.


	                                                                                                   www.computer.org/security	                  45

Mais conteúdo relacionado

Mais procurados

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013EMC
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment aap3 IT Recruitment
 
Digital Espionage and Business Intelligence
Digital Espionage and Business IntelligenceDigital Espionage and Business Intelligence
Digital Espionage and Business IntelligenceRoopak K Prajapat
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 

Mais procurados (20)

IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
IAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud FinalIAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud Final
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013RSA Monthly Online Fraud Report - June 2013
RSA Monthly Online Fraud Report - June 2013
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Digital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fouDigital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fou
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment IT Security in the Legal Sector - recruiting in a skills gap environment
IT Security in the Legal Sector - recruiting in a skills gap environment
 
Digital Espionage and Business Intelligence
Digital Espionage and Business IntelligenceDigital Espionage and Business Intelligence
Digital Espionage and Business Intelligence
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 

Destaque

Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement awareingenioustech
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routingingenioustech
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregatesingenioustech
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on bufferingenioustech
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recoveryingenioustech
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache foringenioustech
 
Applied research of e learning
Applied research of e learningApplied research of e learning
Applied research of e learningingenioustech
 

Destaque (8)

Dynamic measurement aware
Dynamic measurement awareDynamic measurement aware
Dynamic measurement aware
 
Peering equilibrium multi path routing
Peering equilibrium multi path routingPeering equilibrium multi path routing
Peering equilibrium multi path routing
 
Efficient computation of range aggregates
Efficient computation of range aggregatesEfficient computation of range aggregates
Efficient computation of range aggregates
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
On the quality of service of crash recovery
On the quality of service of crash recoveryOn the quality of service of crash recovery
On the quality of service of crash recovery
 
Design and evaluation of a proxy cache for
Design and evaluation of a proxy cache forDesign and evaluation of a proxy cache for
Design and evaluation of a proxy cache for
 
Applied research of e learning
Applied research of e learningApplied research of e learning
Applied research of e learning
 
Intrution detection
Intrution detectionIntrution detection
Intrution detection
 

Semelhante a Phish market protocol

Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B TechIDG Connect
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Mitigation of Cyber Threats through Identification of Phishing Websites
Mitigation of Cyber Threats through Identification of Phishing WebsitesMitigation of Cyber Threats through Identification of Phishing Websites
Mitigation of Cyber Threats through Identification of Phishing WebsitesIRJET Journal
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsCBIZ, Inc.
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017Dorado Industries
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 

Semelhante a Phish market protocol (20)

Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
20 Red Hot, Pre-IPO Companies in 2014 B2B Tech
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Cyber threat trends
Cyber threat trendsCyber threat trends
Cyber threat trends
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
Mitigation of Cyber Threats through Identification of Phishing Websites
Mitigation of Cyber Threats through Identification of Phishing WebsitesMitigation of Cyber Threats through Identification of Phishing Websites
Mitigation of Cyber Threats through Identification of Phishing Websites
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 

Mais de ingenioustech

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems fromingenioustech
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization foringenioustech
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of addressingenioustech
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation foringenioustech
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization iningenioustech
 
Online social network
Online social networkOnline social network
Online social networkingenioustech
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlingenioustech
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
Active reranking for web image search
Active reranking for web image searchActive reranking for web image search
Active reranking for web image searchingenioustech
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_controlingenioustech
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titlesingenioustech
 

Mais de ingenioustech (18)

Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Monitoring service systems from
Monitoring service systems fromMonitoring service systems from
Monitoring service systems from
 
Locally consistent concept factorization for
Locally consistent concept factorization forLocally consistent concept factorization for
Locally consistent concept factorization for
 
Measurement and diagnosis of address
Measurement and diagnosis of addressMeasurement and diagnosis of address
Measurement and diagnosis of address
 
Exploiting dynamic resource allocation for
Exploiting dynamic resource allocation forExploiting dynamic resource allocation for
Exploiting dynamic resource allocation for
 
Throughput optimization in
Throughput optimization inThroughput optimization in
Throughput optimization in
 
Tcp
TcpTcp
Tcp
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Peace
PeacePeace
Peace
 
Online social network
Online social networkOnline social network
Online social network
 
Layered approach
Layered approachLayered approach
Layered approach
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Bayesian classifiers programmed in sql
Bayesian classifiers programmed in sqlBayesian classifiers programmed in sql
Bayesian classifiers programmed in sql
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
Active reranking for web image search
Active reranking for web image searchActive reranking for web image search
Active reranking for web image search
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_control
 
Vebek
VebekVebek
Vebek
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 

Último

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Último (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Phish market protocol

  • 1. Sharing Sensitive Data The Phish-Market Protocol Secure Sharing Between Competitors The Phish-Market protocol encourages take-down companies to share information about malicious websites by compensating them for this data without revealing sensitive information to their competitors. Cryptography lets contributing firms verify payment amounts without learning which offered website URLs were “purchased.” C Tal Moran onsider the following situation: company A Unfortunate- and Tyler is a startup with a new product that it would ly, in practice, Moore like to market. Company B is a mailing-list two companies often have trouble finding a third party Harvard provider and has a huge database of people’s that they both completely trust. Situations like these are University names, addresses, and attributes. where modern cryptography can truly shine. Using a Based on its research, company A is convinced cryptographic protocol, companies A and B can emu- that people who like dogs and are more than six feet late a virtual trusted party that provides the same services a tall will respond favorably to an advertisement for its real one would, but without having to trust in anything product. Thus, A would like to purchase a list of po- but their own implementation of the protocol. tential customers with these attributes from company We’ve constructed an efficient protocol that solves B. However, A doesn’t want to reveal its marketing this problem, which we believe can be applied to strategy—if competitors discover that A’s product is many similar data-sharing problems. being targeted to tall dog-lovers, they might be able to scoop it. Phishing Website Take Down One solution would be for company A to buy the Our original motivation came from a seemingly un- entire database from company B. This would certainly related real-life problem: an attempt to encourage data hide any specific attributes A is looking for. However, sharing between phishing take-down companies. this could be prohibitively expensive—the actual data Phishing is the criminal activity of enticing people A is interested in is only a tiny fraction of the database. to visit websites that impersonate genuine bank web- Moreover, A might already have a list of potential cus- sites and dupe visitors into revealing passwords and tomers compiled from other sources; A would prefer other credentials. (Although a wide range of compa- not to pay twice for data it already has. There might nies have been subject to phishing attacks, most are also be privacy or regulatory issues preventing B from financial institutions; for simplicity, we use the term selling too much of its information to one entity. “banks” for firms being attacked.) One key counter- A second possibility would be for both companies measure to phishing is to promptly remove the imita- to use a trusted third party (TTP). Company A can tion websites. Banks can achieve removal by erasing disclose its secret strategy and the list of names it al- the webpages from the hosting machine or contacting ready knows to the TTP while company B discloses a registrar to suspend a domain name from the Do- its entire database. In this case, the TTP could search main Name System (DNS), so the fraudulent host can the database for tall dog-lovers who aren’t on A’s “al- no longer be resolved. ready known” list, send those to A, and reveal only Although some banks deal with phishing web- the total sum company A must pay to company B in site removal exclusively in-house, most hire specialist return for this information. take-down companies to carry out the task. Such com- 40 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ 1540-7993/10/$26.00 © 2010 IEEE ■ JULY/AUGUST 2010
  • 2. Sharing Sensitive Data Table 1. Timed and financial exposure to phishing attacks caused by not sharing data.* Exposure figures (six-month totals) tA’s client banks tB ’s client banks Actual values 1,005,000 hrs ($276 million) 78,000 hrs ($32.0 million) Effect of not sharing 587,000 hrs ($163 million) 17,000 hrs ($3.5 million) Expected exposure if sharing 418,000 hrs ($113 million) 61,000 hrs ($28.5 million) *Numbers in red indicate the portion of phishing risk caused by slower take down. panies—typically, divisions of brand-protection firms Ordinary phishing sites Mean lifetime (hours) or information security service providers—perform τA Others τA Others two key services. First, they’re good at getting phish- τA 1st τA 1st ing websites removed quickly, having developed rela- 577 44 tionships with ISPs and registrars across the globe and 4,118 5,962 17 112 Others 1st Others 1st deployed multilingual teams at 24/7 operation centers. 4,313 56 Second, they collect a more timely and comprehensive listing of phishing URLs than banks normally gather. Most take-down companies view their URL feeds as a key competitive advantage over banks and oth- Figure 1. Missed phishing websites. We can see how substantial er take-down providers. However, recent work has incompleteness in one take-down company’s URL feed slowed removal of shown that the feeds such companies compile suffer phishing websites impersonating 54 banks.1 from large gaps in coverage that significantly prolong the time needed to remove phishing websites. Tyler Moore and Richard Clayton examined six months of can indicate which bank is the subject of the phishing aggregated URL feeds from many sources, includ- URL or customer attributes in a database. ing two major take-down companies.1 They found At a high level, the Phish-Market protocol does that up to 40 percent of phishing websites remained the following: unknown to the company with the take-down con- tract but were discovered by others. Another 29 per- • shares only those records that match the tags the cent were discovered by the responsible take-down buyer requests; company only after others had identified them. By • hides from the seller which records the buyer receives; measuring these missed websites’ substantially lon- • hides from the seller which tags the buyer requests; and ger lifetimes, Moore and Clayton estimated that 120 • securely tallies the number of records the buyer re- banks served by these two companies collectively risk ceives without double-counting records from the at least US$330 million per year by failing to share seller that the buyer already has. proprietary URL feeds (see Table 1). Figure 1 gives the details for one take-down com- These requirements are essential for take-down com- pany, labeled tA. The left circle represents the phishing panies considering sharing phishing URL data. The sites that appear in tA’s feed, and the right circle the first requirement ensures that only URLs pertaining sites that appear in its competitors’ feeds. The intersec- to banks that the take-down company is interested in tion contains the sites that appear in all feeds, the top are exchanged. The second and third requirements half representing sites that tA found before other com- protect the acquiring firm from revealing too much panies, and the bottom those others found before tA. about its business posture, such as its client banks and its weaknesses in phishing-website-detection capabil- The Phish-Market Protocol ity. The fourth requirement assures both the buyer Named after its applicability to sharing phishing and seller that the exchange is fair. We anticipate that URLs, the Phish-Market protocol can efficiently solve take-down companies would execute the protocol as data-sharing problems while overcoming the sharing both buyers and sellers, and that only the net con- entities’ competitive concerns. Contributors are com- tributor would be compensated financially. pensated, but sensitive details that might be inferred The requirements also match up nicely to the cus- from a transaction are hidden from both parties, all tomer database provider problem. In fact, we envi- without requiring access to a TTP. The protocol aims sion many data-sharing applications that could benefit to let a buyer acquire new records, such as phishing from a sharing mechanism like the Phish-Market pro- URLs or customer details, from a seller. The buyer tocol. For instance, hospitals might be willing to share is interested only in a subset of data matching one de-identified patient records with medical researchers. or more tags, attributes describing the records. Tags Instead of sharing entire databases, they might share www.computer.org/security 41
  • 3. Sharing Sensitive Data Proof of Proof of 1 Committment 2a Offer 2b Choice 3 Payment 4 5 payment preknowledge Case 1: Bob is not interested C 1 $0 P P P D 1 2 C 2 C A B P A B C D C P P $1 1 B 1 2 Case 2: Bob is interested Case 2a: knows info 2 $0 P 1 P $1 1 A 6 Settlement ... many transactions later Case 2b: Info is new $1 P $1 1 B Figure 2. Overview of the Phish-Market protocol. Columns correspond to protocol steps, whereas rows correspond to the different situations that might occur during execution (note that to the seller, the different situations are indistinguishable). only those records matching a combination of diseases Step 2: Seller Offer and Buyer Choice and other selected attributes. Oil companies might Sally sends Bob an offer for each record she wishes to like to purchase geographical data on seabeds without sell. Included in the offer is a tag, a commitment to the revealing their exploration plans to competitors. record, and a “proof key” (explained in steps 4 and 5). Other types of information security data lists, such Bob can use the tag to decide whether he’s interested in as DNS and IP blacklists, could also be more effective the record Sally is offering. If Bob chooses not to learn if shared more widely among security firms. the record, he will instead learn a second proof key that will let him withhold payment for this record later in Protocol Overview the protocol (without revealing the fact to Sally). We now describe the Phish-Market protocol at a high To keep Bob’s choice secret from Sally, Bob and level, keeping the cryptography details to a minimum. Sally execute an Oblivious Transfer (OT) protocol. A detailed technical description will appear in a com- We can think of this OT protocol as Sally placing the panion paper.2 We use several cryptographic primi- record and a proof key in two locked boxes. The box- tives—commitments, zero-knowledge proofs, and oblivious es are labeled and given to Bob, along with a key that transfer—which we describe briefly; readers can find can open either box (but that Bob can only use once). formal definitions elsewhere.3,4 If Bob decides he’s interested in the record, he opens The entire protocol takes six steps to complete, as the box with the record; if not, he opens the other box Figure 2 illustrates, with Bob acting as buyer and Sally to get the second proof key. as seller. Step 3: Payment Step 1: Buyer Commitment Bob must now pay up for the new record learned Bob first commits to his current state of knowledge— from Sally. Of course, Bob should pay Sally only if he all the records in his database—and sends his commit- chooses to learn the record and doesn’t already know ment to Sally. Cryptographic commitments bind Bob it. Hence, he can pay using a real or fake payment. A to his state of knowledge while keeping the informa- real payment is a cryptographic commitment to the tion hidden from Sally. This commitment will let Bob number 1, whereas a fake payment is a commitment withhold payment for records he already knows. to the number 0. In this context, a commitment from 42 IEEE SECURITY & PRIVACY
  • 4. Sharing Sensitive Data Bob is a public-key encryption of a value (0 or 1) using change unknown records, Bob and Sally can finally a key known only to Bob. Sally can’t infer the com- settle up. The payment commitments’ homomorphic mitment’s value without the key, but Bob can poten- property lets anyone take two commitments and, tially open the commitment later and thereby prove without opening either one, compute a commitment to Sally the true value committed. In fact, Bob will to the sum of their values. Figure 2 represents this as never open the payment commitment because this weighing the piggy bank containing the payments: will reveal too much information to Sally. Instead, we we don’t need to open it up to verify the total weight use commitments with a special homomorphic property (and from the total weight, no one can tell which in- that will let Bob prove the total number of real pay- dividual payments are real and which are fake). ments made in the settlement phase (step 6) without Using homomorphic addition, Sally can tally up the opening any specific payment. sum of the many 1 and 0 payment commitments used in step 3, even though she can’t open them. Sally takes Step 4: Proof of Payment the payments from multiple executions and computes After sending the committed payment to Sally, Bob a commitment to the total payment, which represents must demonstrate that it is legitimate. Of course, the the number of records actually “sold.” Bob can then payment is only real if Bob committed to 1 and not 0. open Sally’s aggregated commitment. Sally learns only This is where the proof keys come in: using a proof the total number of real payments received (and not key, Bob can fake a proof and convince Sally that a which individual payments were real). Bob and Sally payment is real even if it isn’t. Technically, Bob uses can use this sum as the basis for a monetary transaction. a zero-knowledge proof to convince Sally that either the payment is real or he uses a proof key (a zero- Security Discussion knowledge proof lets the prover convince the verifier Let’s now look at the security guarantees made sepa- of a statement without revealing anything except for rately for the seller and buyer. For the buyer, we guar- the statement’s validity). Figure 2 represents the proof antee two properties: first, the seller doesn’t learn with a balance scale; the difference between real and anything about the set of tags the buyer is interested fake coins is reflected in their weight (a fake coin, for in; second, the seller doesn’t learn anything about the example, weighs nothing, whereas a real coin weighs set of previously known records. The only exception 1 gram). Bob places the envelope with his payment on to these guarantees is what information the seller can one side of the balance and a real coin on the other. If deduce from the payment amount. Bob’s payment is real, Sally will see that the balance The seller’s primary interest is to ensure that she’s shows the two are equivalent. If Bob doesn’t actually being justly compensated for each record that the pay up, he can use the proof key to “lock” the balance buyer learns from her. We guarantee that the seller’s into place and make the different weights appear equal. security in the distributed protocol is the same as for an “ideal” protocol involving a TTP, with two cave- Step 5: Proof of Prior Knowledge ats: first, the buyer will learn the tags of all the seller’s Bob must give Sally one more zero-knowledge proof, records (given that those are sent in the clear), rather this time regarding whether he knew about the record than just those of the records he pays for (as would before Sally gave it to him. If Bob chose not to learn be the case using an ideal trusted party). Second, the the record in step 2, he can’t possibly prove that he buyer learns which records he already knows that are already knew it. Alternatively, Bob might have iden- also in the seller’s database (an ideal third party would tified a previously unseen record from Sally. In both send the buyer only records he doesn’t already know). cases, Bob uses a proof key to generate a fake proof The reason for both relaxations is efficiency. In partic- claiming prior knowledge of the record. ular, letting the buyer learn records he already knows The protocol design restricts how many proof keys (albeit without paying for them) lets him perform the Bob has to ensure that he makes a real payment if he database lookup himself rather than engage in a large, learns a new record. If Bob had chosen to learn the joint secure computation with the seller. record in step 2, he’d be left with a single proof key. Note that some attacks would still be possible even if With this remaining key, he can either fake the proof a TTP were available. For example, no guarantee exists of payment in step 4 or the proof of prior knowledge that the records sold will be useful or correctly tagged. in step 5, but not both. If he chooses to use the proof A malicious seller could send random strings instead of key to prove prior knowledge of the record (as he’s records, forcing the buyer to pay for garbage records forced to do if the record is new information), he must (because they wouldn’t appear in the buyer’s database). provide a real proof of payment in step 4. A malicious seller could also attack the buyer’s privacy: if she uses the same tag for all the records in a certain Step 6: Settlement period, she can tell whether the buyer is interested in After running steps 1 through 5 many times to ex- the tag if he made a payment at the end of that period. www.computer.org/security 43
  • 5. Sharing Sensitive Data Fortunately, mitigating strategies are typically less than 3 Kbytes of communication—so running available to counter these threats when using the pro- both sides on one server would only cause us to over- tocol in the real world. First, the buyer can evaluate estimate the running time.) the records he learns and set the price he’s willing to To test the protocol’s performance under real-world pay for each one based on the quality of records he conditions, we used the phishing URL feeds from two received in the past. If he determines that the seller is large take-down companies during the first two weeks providing low-quality records, the buyer can request of April 2009. We assigned one take-down company a lower dollar price per record or refuse to do business to be the seller and the other to be the buyer (we ran with that seller in the future. This would mitigate the experiments with both companies playing both roles). garbage record attack. Defending against the privacy For the two-week sample period, one company found breach attack is harder—the payment will always leak 8,582 unique URLs, whereas the other discovered some information about which tags the buyer is in- 17,721. The first company was interested in obtaining terested in. We can help the buyer detect such attacks phishing URLs for 59 banks, and the second for 54 by compromising a little on the seller’s privacy: if we banks, according to the client lists shared with us. give the buyer all the tags the seller uses (without the The primary metric we use to measure our imple- corresponding records), the buyer can verify that no mentation’s performance is the time required to pro- set of tags is overly represented. cess and transmit each phishing URL from the seller Finally, in a two-party protocol, unlike a protocol to the buyer. The less time required, the closer the that uses a TTP, each side can decide to abort the pro- URL sharing is to instantaneous. On average, each tocol prematurely. This affects our protocol’s security URL faced a very acceptable delay of 5.13 seconds if the buyer decides to abort after learning a record but to complete the exchange (3.19-second median). Two before making the payment. However, the same prob- main factors affect the total delay. First is the pro- lem exists in many remote transactions (when pur- cessing time required to execute the protocol. This chasing physical goods over the phone, for instance, computational time was very consistent, taking an a seller can refuse to send the goods after receiving average of 2.37 seconds but never more than 4.02 sec- payment). Sellers can use the same legal frameworks onds. The other, less predictable, reason for delay hap- to handle a refusal to pay in this case. pens whenever many phishing URLs are discovered around the same time. Whenever a clump of URLs Protocol Efficiency were reported, some URLs had to wait for others to Powerful results from theoretical cryptography dem- be processed, leading to a longer delay. Although a onstrate how we can convert any task using a TTP multithreaded implementation could minimize these into one that doesn’t require third parties.5,6 Howev- queue delays (by utilizing more CPU cores), we chose er, these techniques are usually inefficient. The most to implement the protocol using a single thread to efficient implementations of general techniques (such demonstrate its feasibility even with modest hard- as the Fairplay system7) are still orders of magnitude ware. Moreover, note that we optimized the protocol too slow for practical use on the scale required to share implementation for clarity and source code general- large numbers of records. Even relatively simple com- ity rather than speed. The average queue delay due to putations, such as those needed to hold sugar beet auc- waiting on other URLs to finish processing was 2.76 tions in Denmark,8 require specialized protocols to seconds, and the longest delay was 34.6 seconds. overcome this problem. To give readers a better feel for how the processing Fast operation is critical when it comes to distribut- time varies, Figure 3 plots the cumulative distribution ing phishing URL feeds—the longer a phishing website functions for the time taken to process each URL, the remains online, the more customer credentials might be time that URL spent waiting in the seller’s queue, and at risk. Fortunately, the Phish-Market protocol is much the total delay between the time the URL entered the more efficient than generic secure computation. seller’s queue and the time the buyer received it. The We implemented an elliptic-curve- (EC-) based computer processed 48.4 percent of the URLs in less version of the protocol in Java, using the Qilin than 3 seconds, yet 9.7 percent took more than 10 sec- Crypto SDK (software developer’s kit)9 for the high- onds. Despite the variation, no URL took more than level cryptographic primitives and the Bouncy Castle 37 seconds to process. Given that phishing website re- Crypto API (www.bouncycastle.org) for low-level moval requires human intervention, a 37-second delay EC operations (full code for the implementation of is negligible, and certainly much better than the many our protocol is available elsewhere9). days longer unknown sites currently take for removal! We simulated both sides of the protocol on a single In addition to the total delay (red dash-dot line), server with one dual-core 2.4-GHz Intel Xeon pro- Figure 3 plots the delay’s two key components. The cessor and 2 Gbytes of memory. (The main bottleneck green dashed line appears nearly vertical around 2 sec- in the protocol is the CPU—one transaction requires onds, suggesting that the per-URL processing time is 44 IEEE SECURITY & PRIVACY
  • 6. Sharing Sensitive Data very consistent. Meanwhile, the blue solid line plots 100 the queue delay, which accounts for the overall delay’s stretched tail. Hence, if the queue delay were reduced 80 via multiple processors or threads, the total delay might 60 approach the consistently shorter processing time. In exchange for these very modest delays, take- % 40 down companies can trade information on new phishing websites so that the overall lifetime of such 20 Per-transaction processing time sites is reduced as much as half,1 while crediting the Queue delay Total delay contributing firm. 0 1 4 7 10 13 16 19 22 25 28 31 34 Time (seconds) B alancing the advantages of data sharing with the risks of helping competitors or experiencing pri- vacy breaches is hard. Yet markets, both legitimate and Figure 3. Observed cumulative distribution function of the time required to share each phishing URL. The measured delay is between the time the seller illicit, are becoming increasingly data-driven. From first learned the URL and the time it becomes known to the buyer. The red identifying users for targeted advertising to blocking dash-dot line denotes the total real-time delay, and the others denote sub- spam and shutting down phishing websites, sharing components of the delay. data is now essential because no single company has a complete view of the global environment. We’ve designed and implemented a practical 2. T. Moran and T. Moore, “The Phish-Market Protocol: mechanism for competing, untrusting companies to Securely Sharing Attack Data between Competitors,” selectively buy and sell the information that’s relevant Financial Cryptography and Data Security, LNCS 6052, R. to their needs without leaking too much additional Sion, ed., Springer, 2010, pp. 222–237. data. Although our implementation is focused on the 3. O. Goldreich, Foundations of Cryptography: Basic Tools, specific data-sharing problem that phishing take- vol. 1, Cambridge Univ. Press, 2001. down companies encounter, we can directly apply it 4. O. Goldreich, Foundations of Cryptography: Basic Applica- to several other problems (such as the mailing-list pro- tions, vol. 2, Cambridge Univ. Press, 2004. vider/targeted advertiser example in the introduction) 5. O. Goldreich, S Micali, and A. Wigderson, “How to and employ our techniques in many similar situations. Play Any Mental Game or a Completeness Theorem for In fact, many data-sharing problems have more Protocols with Honest Majority,” Proc. 19th Ann. ACM relaxed requirements than those the Phish-Market Symp. Theory of Computing (STOC 87), ACM Press, protocol must satisfy (for instance, an exploring oil 1987, pp. 218–229. company won’t buy data about locations for which it 6. M. Ben-Or, S. Goldwasser, and A. Wigderson, “Com- already has information, so the requirement that the pleteness Theorems for Non-Cryptographic Fault-Tol- company not pay for data already known isn’t need- erant Distributed Computation,” Proc. 20th Ann. ACM ed). In these cases, our protocol can be made simpler Symp. Theory of Computing (STOC 88), ACM Press, and even more efficient. 1988, pp. 1–10 (extended abstract). A key lesson from our experience is that modern 7. D. Malkhi et al., “Fairplay—A Secure Two-Party cryptographic tools can be very helpful in resolving Computation System,” Usenix Security Symp., Usenix the tension between sharing and secrecy. The tech- Assoc., 2004, pp. 287–302. niques are now efficient enough to be practical and 8. P. Bogetoft et al., “Secure Multiparty Computation allow an unprecedented level of control over what Goes Live,” Financial Cryptography and Data Security, companies can reveal and what they must not. In LNCS 5628, R. Dingledine and P. Golle, eds., Spring- today’s data-driven economy, these tools should be er, 2009, pp. 325–343. found in every developer’s toolbox. 9. T. Moran, “The Qilin Project: A Java SDK for Rapid Prototyping of Cryptographic Protocols,” 2009, http:// Acknowledgments qilin.seas.harvard.edu. We thank Allan Friedman for suggesting the mailing-list problem described in the introduction. Tal Moran is a postdoctoral fellow at the Center for Research on Computation and Society at Harvard University. Contact References him at talm@seas.harvard.edu. 1. T. Moore and R. Clayton, “The Consequence of Noncooperation in the Fight against Phishing,” Proc. Tyler Moore is a postdoctoral fellow at the Center for Research Anti-Phishing Working Group eCrime Researchers Summit on Computation and Society at Harvard University. Contact (APWG eCrime 08), IEEE Press, 2008, pp. 1–14. him at tmoore@seas.harvard.edu. www.computer.org/security 45