The ethics of coexistence: Can I learn to stop worrying and love the logic bomb?

John Aycock, Anil Somayaji, John P. Sullins
{"title":"The ethics of coexistence: Can I learn to stop worrying and love the logic bomb?","authors":"John Aycock, Anil Somayaji, John P. Sullins","doi":"10.1109/ETHICS.2014.6893419","DOIUrl":null,"url":null,"abstract":"Computer security attacks are frequent fodder for ethical analyses, but the ethics of computer security defenses are not often examined. We address this by considering a topical problem in computer security. In an age of so-called “advanced persistent threats” that lurk undetected on computer systems for long periods of time, it is increasingly unrealistic to expect a computer system to be permanently free of malicious software. Recognizing this, we posit the idea of a “cosecure system” - a cosecure system, by design, would allow legitimate software and malicious software to coexist safely on the same machine. We take an unusual tack to software design and use ethical concerns to guide the design of a cosecure system, rather than building a cosecure system and then performing an ex post facto ethical analysis. The principal tenets of security that must be upheld are confidentiality, integrity, and availability, and any system purporting to be secure has an ethical duty to the system user to uphold these. This is the starting point for our design process, and we proceed to look at how a cosecure system may be implemented. What we arrive at by going through this ethics-based software design becomes a proof by contradiction: we are forced to conclude that it is not possible, in fact, for malicious and legitimate software to coexist; a cosecure system as we have described it cannot be built. This allows us to see traditional computer security defenses in a new light. If we cannot uphold key security properties in the best case, where a system is expressly designed to allow coexistence of malicious and legitimate software, what does that imply about the defenses of the actual computer systems we use? We propose that a community defense is an alternative that eludes previous ethical issues, as well as being defensible from an information ethics point of view.","PeriodicalId":101738,"journal":{"name":"2014 IEEE International Symposium on Ethics in Science, Technology and Engineering","volume":"140 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Symposium on Ethics in Science, Technology and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETHICS.2014.6893419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Computer security attacks are frequent fodder for ethical analyses, but the ethics of computer security defenses are not often examined. We address this by considering a topical problem in computer security. In an age of so-called “advanced persistent threats” that lurk undetected on computer systems for long periods of time, it is increasingly unrealistic to expect a computer system to be permanently free of malicious software. Recognizing this, we posit the idea of a “cosecure system” - a cosecure system, by design, would allow legitimate software and malicious software to coexist safely on the same machine. We take an unusual tack to software design and use ethical concerns to guide the design of a cosecure system, rather than building a cosecure system and then performing an ex post facto ethical analysis. The principal tenets of security that must be upheld are confidentiality, integrity, and availability, and any system purporting to be secure has an ethical duty to the system user to uphold these. This is the starting point for our design process, and we proceed to look at how a cosecure system may be implemented. What we arrive at by going through this ethics-based software design becomes a proof by contradiction: we are forced to conclude that it is not possible, in fact, for malicious and legitimate software to coexist; a cosecure system as we have described it cannot be built. This allows us to see traditional computer security defenses in a new light. If we cannot uphold key security properties in the best case, where a system is expressly designed to allow coexistence of malicious and legitimate software, what does that imply about the defenses of the actual computer systems we use? We propose that a community defense is an alternative that eludes previous ethical issues, as well as being defensible from an information ethics point of view.
共存的伦理:我能学会停止担忧,爱上逻辑炸弹吗?
计算机安全攻击经常是伦理分析的素材,但计算机安全防御的伦理却不常被审查。我们通过考虑计算机安全中的一个主题问题来解决这个问题。在一个所谓的“高级持续威胁”的时代,潜伏在计算机系统中不被发现很长一段时间,期望计算机系统永远不受恶意软件的侵害越来越不现实。认识到这一点,我们提出了“共同安全系统”的概念——通过设计,共同安全系统将允许合法软件和恶意软件在同一台机器上安全地共存。我们采用了一种不同寻常的软件设计方法,并使用道德问题来指导共同安全系统的设计,而不是构建一个共同安全系统,然后执行事后的道德分析。必须维护的安全性的主要原则是机密性、完整性和可用性,任何声称安全的系统都对系统用户负有维护这些原则的道德责任。这是我们设计过程的起点,我们将继续研究如何实现共同安全系统。我们通过这种基于伦理的软件设计得出的结论变成了一个矛盾的证明:我们被迫得出结论,事实上,恶意软件和合法软件不可能共存;我们所描述的共同安全系统是无法建立的。这使我们能够以新的眼光看待传统的计算机安全防御。如果我们不能在最好的情况下维护关键的安全属性,即系统被明确设计为允许恶意软件和合法软件共存,那么这对我们使用的实际计算机系统的防御意味着什么?我们建议,社区防御是一种替代方案,可以避免先前的伦理问题,并且从信息伦理的角度来看是可辩护的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信