Loading...
Please wait, while we are loading the content...
Similar Documents
Interaction-aware Actual Causation: A Building Block for Accountability in Security Protocols
| Content Provider | Semantic Scholar |
|---|---|
| Author | Sharma, Divya |
| Copyright Year | 2015 |
| Abstract | Protocols involving multiple agents and their interactions are ubiquitous. Protocols for tasks such as authentication, electronic voting, and secure multi-party computation ensure desirable security properties if participating agents follow their prescribed programs. However, if some agents choose to deviate from their prescribed programs and a security property is violated, it is important to hold agents accountable, i.e. assign blame for their choices and actions, and to x de ciencies in the protocol design. Prior work in accountability has focused primarily on detecting or punishing deviations. This dissertation proposes a novel interaction-aware approach to actual causation (i.e., the identi cation of particular agents’ choices to deviate, and interactions which caused a speci c violation). We propose this approach as a useful building block for accountability in interacting multi-agent systems, including but not limited to security protocols. The de nitions of actual cause in this dissertation are inspired by prior work on actual causation in philosophy, law, and computer science. However, prior frameworks do not account for the program dynamics that arise in protocol-based settings and do not naturally capture agent interactions and agents’ choices to deviate. Motivated by these applications and challenges, we make two main contributions. First, we propose a theory of actual causation with choice and interaction as key components. Speci cally, we de ne in an interacting program model, what it means for a sequence of program expressions (modeling choices, actions and interactions) to be an actual cause of a violation. We demonstrate that our theory signi cantly advances the state-of-the-art in the research area of actual causation by combining process-oriented and counterfactual-based viewpoints in prior work. A careful treatment of interaction and choice enables us to cleanly deal with a known set of issues that plague extant theories, including expressing concise interaction models and over-permissive counterfactual-based de nitions. Second, we demonstrate the value of this theory in the domain of security and privacy protocols, by proving that violations of a speci c class of safety properties always have an actual cause. We also present a sound technique for establishing program actions as actual causes. Additionally, we provide a causal analysis of a representative protocol, designed to address weaknesses in the current public key certi cation infrastructure. Our theory clearly distinguishes between deviances and actual causes which is important from the standpoint of accountability. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://repository.cmu.edu/cgi/viewcontent.cgi?article=1143&context=cylab |
| Alternate Webpage(s) | http://www.andrew.cmu.edu/user/divyasha/DivyaSharmaCV.pdf |
| Alternate Webpage(s) | http://repository.cmu.edu/cgi/viewcontent.cgi?article=1765&context=dissertations |
| Alternate Webpage(s) | https://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab16002.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |