Yvo Desmedt's Research on Secure Outsourcing and Secure Globalization
Yvo Desmedt's Research on Secure Outsourcing and Secure Globalization
Main research
The main research focused on critical infrastructures.
These were modeled using AND/OR graphs. A node in these graphs could
correspond to a factory, a storage facility, a modem, a computer,
etc. Edges correspond with communications/transportation.
The OR was used to model choice (e.g., in the case of the construction
of a car between different brands of car tires). The AND
was used to model that different components are needed.
Security aspects
Labeling the nodes in these graphs with the name of the country the
facility is located, allows to study the vulnerability in case these
nodes are shut down on a country bases. Due to the premature termination
of the DARPA F30602-97-1-0205 grant, this labeling was only briefly studied
in this context.
This approach however was used in
followup research on communication/transportation networks.
Obviously, with factory shutdowns at a global scale, due to COVID-19, this
topic is of current interest!
Papers on the topic
Presentations on the topic
Related Research
In October 1997, the US President's Commission on Critical Infrastructure
Protection published its report.
On March 5, 1998, the author (in a private e-mail) pointed out that
several infrastructures were missing. This was further worked
out in his October 1999
lecture. For the paper published in May 2000
click here.
Followup Research
Consider modems made in different countries. An organization is using these
in a computer network and is worried whether these modems have
state sponsored malware. Such malware, under control of a state, may perform
a Denial of Service Attack (DOS), i.e., shut down all modems made in a certain
country (countries), or may
use these modems for spying. This work was partially funded by CCR-0209092
and published
here.
Preliminary ideas on the use of labels (called color) to
model platform dependent attacks on nodes were published in the context of PKI
in
Comm. of ACM.
After Snowden's leak it was revealed that malicious ethernet cables can
perform active eavesdropping. We however considered such possibilities well
before the Snowden leak and in 2011 studied the topic of securing a network
against state sponsored DOS when the cables have state sponsored malware.
This work was published in
IPL.
Last modified: May 20, 2020