Abstract
This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2016 International Workshop on Managing Insider Security Threats |
Place of Publication | New York |
Publisher | Association for Computing Machinery |
Pages | 23-34 |
Number of pages | 12 |
ISBN (Print) | 978-1-4503-4571-2 |
DOIs | |
Publication status | Published - Oct 2016 |
Event | 8th International Workshop on Managing Insider Security Threats 2016 - Vienna, Austria Duration: 24 Oct 2016 → 28 Oct 2016 Conference number: 8 |
Workshop
Workshop | 8th International Workshop on Managing Insider Security Threats 2016 |
---|---|
Abbreviated title | ACM MIST 2016 |
Country/Territory | Austria |
City | Vienna |
Period | 24/10/16 → 28/10/16 |
Keywords
- Formal Methods
- METIS-318568
- EWI-27342
- EC Grant Agreement nr.: FP7/2007-2013
- IR-101829
- Insider Threat
- EC Grant Agreement nr.: FP7/318003
- Auctions