Towards Reversible Cyberattacks
Rowe, Neil C.
MetadataShow full item record
Warfare without damage has always been a dream of military planners. Traditional warfare usually leaves persistent side effects in the form of dead and injured people and damaged infrastructure. An appealing feature of cyberwarfare is that it could be more ethical than traditional warfare because its damage could be less and more easily repairable. Damage to data and programs (albeit not physical hardware) can be repaired by rewriting over damaged bits with correct data. However, there are practical difficulties in ensuring that cyberattacks minimize unreversible collateral damage while still being easily repairable by the attacker and not by the victim. We discuss four techniques by which cyberattacks can be potentially reversible. One technique is reversible cryptography, where the attacker encrypts data or programs to prevent their use, then decrypts them after hostilities have ceased. A second technique is to obfuscate the victim's computer systems in a reversible way. A third technique to withhold key data from the victim, while caching it to enable quick restoration on cessation of hostilities. A fourth technique is to deceive the victim so that think they mistakenly think they are being hurt, then reveal the deception at the conclusion of hostilities. We also discuss incentives to use reversible attacks such as legality, better proportionality, lower reparations, and easier ability to use third parties. As an example, we discuss aspects of the recent cyberattacks on Georgia.
This paper appeared in the Proceedings of the 9th European Conference on Information Warfare and Security, July 2010, Thessaloniki, Greece.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Richardson, Nathan J.; Burke, Lucas J. (Monterey, CA; Naval Postgraduate School, 2019-06);The power of anonymity on the internet is being leveraged by criminals, online trolls, and malicious hackers. Cyber criminals masquerade as legitimate users in order to steal valuable private data, commit fraud, and steal ...
Evans, Paul James (Monterey, California: Naval Postgraduate School, 2014-06);We consider a game played between a state sponsor of international terrorism, a terrorist organization and the victim of a terrorist attack. The state sponsor wishes to inflict as much damage to the victim as possible ...
Denning, Peter J.; Lewis, Ted G. (Sigma XI-The Scientific Research Society, 2017);Denning et al discusses the potential impact of reversible computations as computers that can run backwards, to reduce the energy consumption of each new generation of their chips. The birth of reversible circuits ...