attackereconomics
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
attackereconomics [2017/10/24 15:05] โ [Attacker models] lallodi | attackereconomics [2021/01/10 21:04] (current) โ external edit 127.0.0.1 | ||
---|---|---|---|
Line 38: | Line 38: | ||
Further, we find a clear relation between market dynamics and exploitation at scale. | Further, we find a clear relation between market dynamics and exploitation at scale. | ||
- | {{ : | + | {{ : |
The figure above reports exploit package cost (left) and market activity (right) against presence of exploit at scale. Even by just looking at the descriptive statistics in the boxplot it is apparent that higher prices hinder odds of exploit adoption, and that the opposite is true for market activity. A more formal analysis of these aspects is provided in the [[https:// | The figure above reports exploit package cost (left) and market activity (right) against presence of exploit at scale. Even by just looking at the descriptive statistics in the boxplot it is apparent that higher prices hinder odds of exploit adoption, and that the opposite is true for market activity. A more formal analysis of these aspects is provided in the [[https:// | ||
Line 46: | Line 46: | ||
The observation of the economic background of the attacker calls for new models of attacker decisions. A critical aspect of this is exploit introduction, | The observation of the economic background of the attacker calls for new models of attacker decisions. A critical aspect of this is exploit introduction, | ||
- | {{ : | + | {{ : |
The figure above reports the rate at which already-attacked users receive attacks targeting the same vulnerability (red line) or a different vulnerability (black dotted line). The data comes from the [[https:// | The figure above reports the rate at which already-attacked users receive attacks targeting the same vulnerability (red line) or a different vulnerability (black dotted line). The data comes from the [[https:// | ||
The paper " | The paper " | ||
- | |||
===== References ===== | ===== References ===== | ||
+ | |||
+ | * Luca Allodi. Underground Economics for Vulnerability Risk. Usenix ;login: (2018), Vol 43, no. 1. [[https:// | ||
+ | * Jukka Ruohonen, Luca Allodi. A bug bounty perspective on the disclosure of web vulnerabilities. Presented at WEIS 2018, Innsbruck, AT. To appear. | ||
+ | * Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim. The effect of security education and expertise on security assessments: | ||
+ | * Luca Allodi. Economic Factors of Vulnerability Trade and Exploitation: | ||
+ | * Luca Allodi, Fabio Massacci, Julian Williams. The Work-Averse Cyber Attacker Model. Evidence from two million attack signatures. Published in WEIS 2017. [[https:// | ||
+ | * Luca Allodi, Fabio Massacci. Attack potential in Impact and Complexity. To appear in ARES 2017. [[https:// | ||
+ | * Luca Allodi, Marco Corradin, Fabio Massacci. Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned. IEEE Transactions on Emerging Topics in Computing, 4(1): | ||
+ | * Luca Allodi. The Heavy Tails of Vulnerability Exploitation In the Proceedings of ESSoS 2015. [[http:// | ||
+ | * Luca Allodi. Attacker economics for Internet-scale vulnerability risk assessment (Extended Abstract) Research proposal, in Proceedings of Usenix LEET 2013. [[http:// | ||
+ | * Luca Allodi, Vadim Kotov, Fabio Massacci. MalwareLab: Experimentation with Cybercrime Attack Tools. In Proceedings of Usenix CSET 2013. [[http:// | ||
+ | * Luca Allodi, Woohyun Shim, Fabio Massacci. Quantitative assessment of risk reduction with cybercrime black market monitoring. Proceedings of IEEE S&P 2013 International Workshop on Cyber Crime. [[http:// | ||
+ | * Woohyun Shim, Luca Allodi, Fabio Massacci. Crime Pays If You Are Just an Average Hacker. Proceedings of IEEE/ASE 2012 Cyber Security Conference. [[http:// |
attackereconomics.1508850319.txt.gz ยท Last modified: 2021/01/10 20:59 (external edit)