

{"id":1300,"date":"2012-06-16T12:13:20","date_gmt":"2012-06-16T17:13:20","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1300"},"modified":"2018-03-10T08:01:38","modified_gmt":"2018-03-10T13:01:38","slug":"weis-2012-best-of-the-best","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","title":{"rendered":"WEIS 2012 :: Best of the Best"},"content":{"rendered":"<p>Sadly, I could not make it to this year&#8217;s <a href=\"http:\/\/www.econinfosec.org\/archive\/weis2012\/\">Workshop on the Economics of Information Security<\/a>. However, the intrepid conference organizers were <a href=\"http:\/\/www.econinfosec.org\/archive\/weis2012\/papers\/\">quick to post the papers<\/a> that were presented, and I had a chance to sift through them to pick out what I believe to be the best of the best (they are all worth reading).<\/p>\n<p><b>A Focus On The Bottom Line<\/b><\/p>\n<p>First up is &#8220;<a target=\"_blank\" href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVRWVvSjdya2lQOHM\/view?usp=drive_web\">Measuring the Cost of Cybercrime<\/a>&#8221; by Ross Anderson, Chris Barton, Rainer B \u0308ohme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore &amp; Stefan Savage. They developed an interesting framework:<\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1303\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/anderson_weis2012-pdf-page-5-of-31-8-documents-222-total-pages\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?fit=524%2C330&amp;ssl=1\" data-orig-size=\"524,330\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Anderson_WEIS2012.pdf (page 5 of 31) (8 documents, 222 total pages)\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?fit=510%2C321&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?resize=510%2C321&#038;ssl=1\" alt=\"\" title=\"Anderson_WEIS2012.pdf (page 5 of 31) (8 documents, 222 total pages)\" width=\"510\" height=\"321\" class=\"aligncenter size-full wp-image-1303\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?w=524&amp;ssl=1 524w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?resize=300%2C188&amp;ssl=1 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/center><\/p>\n<p>which tries to cover all angles of loss (including costs of defense) as well as that of gain by the criminals. They don&#8217;t just talk theory &amp; math. They did actual investigations and have produced a great breakdown of costs &amp; criminal gains on page 24 of the paper (<i>click for larger image<\/i>):<\/p>\n<p><center><a target=\"_new\" href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-24-of-31-8-documents-222-total-pages.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1304\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/anderson_weis2012-pdf-page-24-of-31-8-documents-222-total-pages\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-24-of-31-8-documents-222-total-pages.png?fit=556%2C609&amp;ssl=1\" data-orig-size=\"556,609\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Anderson_WEIS2012.pdf (page 24 of 31) (8 documents, 222 total pages)\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-24-of-31-8-documents-222-total-pages.png?fit=510%2C559&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-24-of-31-8-documents-222-total-pages.png?resize=273%2C300&#038;ssl=1\" alt=\"\" title=\"Anderson_WEIS2012.pdf (page 24 of 31) (8 documents, 222 total pages)\" width=\"273\" height=\"300\" class=\"aligncenter size-medium wp-image-1304\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-24-of-31-8-documents-222-total-pages.png?resize=273%2C300&amp;ssl=1 273w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-24-of-31-8-documents-222-total-pages.png?w=556&amp;ssl=1 556w\" sizes=\"auto, (max-width: 273px) 100vw, 273px\" \/><\/a><\/center><\/p>\n<p>Beyond the details of their methodology, I include them in this list \u2013 in part \u2013\u00a0because of this paragraph:<\/p>\n<blockquote><p><i>The straightforward conclusion to draw on the basis of the comparative figures collected in this study is that we should perhaps spend less in anticipation of computer crime (on antivirus, firewalls etc.) but we should certainly spend an awful lot more on catching and punishing the perpetrators.<\/i><\/p><\/blockquote>\n<p>What a great, data-backed discussion-starter at your next security conference!<\/p>\n<p><b>Might As Well Jump<\/b><\/p>\n<p>Next up is a very maths-y offering by Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David Pym &amp; Julian Williams on &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVS1VaV091WE9tUHc\/view?usp=drive_web\" target=\"_blank\">Contagion in Cybersecurity Attacks<\/a>&#8220;.<\/p>\n<p>If you&#8217;re put off by math symbols, jump to the bottom of page four to stat your reading (right after reading the abstract &amp; introduction). The authors used <a href=\"https:\/\/isc.sans.edu\/error.html\">DShield<\/a> data and focused on ten services (DNS, ssh, Oracle [they got the port #&#8217;s wrong], SQL, LDAP, http\/s, SMB, IMAP\/S, SMTP) sampled daily for the period 1 January 2003 to 28 February 2011. You can read the paper for their particular findings in this data set, but this extract hones in on the utility of their methodology:<\/p>\n<blockquote><p><i>Security threats to data, its quality and accessibility, represent potential losses to the integrity of the operations of the organization. Security managers, in assessing the potential risks, should be interested in the relationship between the contagious threats to these different security attributes. The nature of the inter- relationship between the threats provides additional information to assist managers in making their choices of mitigating responses. For example, if the inter-relationship between threats is constant, independently of the frequency and intensity of threats, security managers can adopt smooth mitigation profiles to meet the threat. In the absence of such stable relationships, the managers\u2019 responses must be adjusted dynamically: for given temporal relationships between the number of attacks, their change (or \u2018jump\u2019) in frequency, and their change in size (extent of impact).<\/i><\/p><\/blockquote>\n<p>I can envision some product extensions incorporating this threat analysis into their offering or even service providers such as Akamai (they have deep, active threat intel) creating a broad, anonymized &#8220;contagion&#8221; report for public consumption with private, direct (paid) offerings for their clients.<\/p>\n<p><b>That Is The Question<\/b><\/p>\n<p>Lukas Demetz &amp; Daniel Bachlechner hope to help security managers choose investment analysis strategies in their work on &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVeEtlLTBERnpES00\/view?usp=drive_web\" target=\"_blank\">To invest or not to invest?<br \/>\nAssessing the economic viability of a policy and security configuration management tool<\/a>&#8220;. They take eleven economic investment models and work through each of them for a selected tool\/technology investment, pointing out the strengths &amp; weaknesses of each (<i>click for larger version of the summary table<\/i>):<\/p>\n<p><center><a target=\"_new\" href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Demetz_WEIS2012.pdf-page-11-of-35-8-documents-222-total-pages.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1310\" data-permalink=\"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/demetz_weis2012-pdf-page-11-of-35-8-documents-222-total-pages\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Demetz_WEIS2012.pdf-page-11-of-35-8-documents-222-total-pages.png?fit=647%2C263&amp;ssl=1\" data-orig-size=\"647,263\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Demetz_WEIS2012.pdf (page 11 of 35) (8 documents, 222 total pages)\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Demetz_WEIS2012.pdf-page-11-of-35-8-documents-222-total-pages.png?fit=510%2C207&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Demetz_WEIS2012.pdf-page-11-of-35-8-documents-222-total-pages.png?resize=300%2C121&#038;ssl=1\" alt=\"\" title=\"Demetz_WEIS2012.pdf (page 11 of 35) (8 documents, 222 total pages)\" width=\"300\" height=\"121\" class=\"aligncenter size-medium wp-image-1310\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Demetz_WEIS2012.pdf-page-11-of-35-8-documents-222-total-pages.png?resize=300%2C121&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Demetz_WEIS2012.pdf-page-11-of-35-8-documents-222-total-pages.png?w=647&amp;ssl=1 647w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p>Unsurprisingly (at least for me), none were optimal, but this is the perfect paper for anyone who ever wanted to look at a summary\/overview of the &#8220;should we invest?&#8221; work with an eye on real practicality.<\/p>\n<p><b>Physician, Secure Thy Data<\/b><\/p>\n<p>Martin S. Gaynor, Muhammad Zia Hydari &amp; Rahul Telang aim to assess the impact of market competition on information security and privacy in their work on &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVQ0xWcVlOUFR2dFE\/view?usp=drive_web\" target=\"_blank\">Is Patient Data Better Protected in Competitive Healthcare Markets?<\/a>&#8220;.<\/p>\n<p>I first have to hand it to these researches for including the &#8220;WORK IN PROGRESS &#8211; PLEASE DO NOT QUOTE&#8221; tag right up front in the paper. Our industry seems to be one to jump on &#8220;facts&#8221; way to soon and this should give any infosec pundits pause.<\/p>\n<p>However, (myself ignoring that previous paragraph) if the authors&#8217; continued analysis does end up supporting their initial conclusion that increased competition is associated with a <b>decline<\/b> in the quality of patient data protection, it may show that security has an uphill battle getting into the &#8220;service differentiator&#8221; list.<\/p>\n<p>The authors do take a moment to theorize as to why there seems to be an inverse relationship to competition &amp; security:<\/p>\n<blockquote><p><i>We posit that hospitals in more competitive markets may be inclined to shift resources to more consumer visible activities from the less consumer visible activity of data protection<\/i><\/p><\/blockquote>\n<p><b>Is That A USB Of Patches In Your Pocket?<\/b><\/p>\n<p>In &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVNUVoeURjOFUycUk\/view?usp=drive_web\" target=\"_blank\">Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections<\/a>&#8220;, Timothy Kelley &amp; L. Jean Camp examine the efficacy of various aggregate patching and recovery behaviors using real world data and a plethora of interesting simulations.<\/p>\n<p>If you listened to the <a href=\"https:\/\/secure-hwcdn.libsyn.com\/p\/d\/3\/4\/d34ade32f451734a\/SFS_Podcast_-_Episode_78.mp3?c_id=4520886&amp;expiration=1520690641&amp;hwt=48fc28adeeba335e3fc99a8fa304a9e7\">SFS &#8220;Front Porch&#8221;<\/a> conversation with @joshcorman, @armorguy &amp; yours&#8217; truly, you&#8217;ll know how I feel about patching, and I believe this paper help support the somewhat progressive approach to both the need for patching but also the need for intelligent patching (with the latter also requiring #spiffy incident response). The authors may say it best, tho:<\/p>\n<blockquote><p><i>We show, using our model and a real world data set, that small increases in patch rates and recovery speed are the most effective approaches to reduce system wide vulnerabilities due to unprotected computers. Our results illustrate that a public health approach may be feasible, as what is required is that a subpopulation adopt prophylactic actions rather than near-universal immunization.<\/i><\/p><\/blockquote>\n<p><b>What About The Green Jack?<\/b><\/p>\n<p>Finally getting to the coding side of the security economics equation, Stephan Neuhaus &amp; Bernhard Plattner look at whether software vulnerability fix rates decrease and if the time between successive fixes goes up as vulnerabilities become fewer and harder to fix in &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVMFMzNXFFdy1mRFk\/view?usp=drive_web\" target=\"_blank\">Software Security Economics: Theory, in Practice<\/a>&#8220;.<\/p>\n<p>They chose Mozilla, Apache httpd and Apache Tomcat as targets of examination and did a thorough investigation of both vulnerability findings and code commits for each product using well-described and documented statistical methods (pretty graphs, too :-).<\/p>\n<p>Here are the salient bits in their own words:<\/p>\n<blockquote><p><i>Our findings do not support the hypothesis that vulnerability fix rates decline. It seems as if the supply of easily fixable vulnerabilities is not running out and returns are not diminishing (yet).<\/i><\/p><\/blockquote>\n<p>and:<\/p>\n<blockquote><p><i>With this data and this analysis, we cannot confirm a Red Queen race.<\/i><\/p><\/blockquote>\n<p>Folks may not be too surprised with the former, but I suspect the latter will also be good conference debate fuel.<\/p>\n<p><b>Law &amp; Order : DBU (Data Breach Unit)<\/b><\/p>\n<p>Sasha Romanosky, David Hoffman &amp; Alessandro Acquisti analyzed court dockets for over 230 federal data breach lawsuits from 2000 to 2010 for their work on &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVXzhIVUZfdVlSWUU\/view?usp=drive_web\" target=\"_blank\">Empirical Analysis of Data Breach Litigation<\/a>&#8220;.<\/p>\n<p>Why look at breach litigation outcomes? For starters, such analysis &#8220;<i>can help provide firms with prescriptive guidance regarding the relative chances of being sued, and having to settle<\/i>.&#8221; For insurance companies, this type of analysis can also be of help in crafting cyberinsurance policies. It can also help companies that have customer data as their primary asset\/product better understand their obligations as custodians of such information.<\/p>\n<p>But, you want to know what they found, so here&#8217;s the skinny:<\/p>\n<blockquote><p><i>Our results suggest that the odds of a firm being sued are <b>3.5 times greater<\/b> when individuals suffer financial harm, but 6 times lower when the firm provides free credit monitoring. Moreover, defendants <b>settle 30% more often<\/b> when plaintiffs allege financial loss, or when faced with a certified class action suit. By providing the first comprehensive empirical analysis of data breach litigation, these findings offer insights in the debate over privacy litigation versus privacy regulation.<\/i><\/p><\/blockquote>\n<p>It&#8217;s a quick read and should be something you forward to your legal &amp; compliance folk.<\/p>\n<p><b>Achievement: Unlocked<\/b><\/p>\n<p>On a topic close to home, Toshihiko Takemura &amp; Ayako Komatsu investigate &#8220;<a href=\"https:\/\/drive.google.com\/file\/d\/0B1CY1qfmPPZVcm5OTy1UVDhUNXM\/view?usp=drive_web\" target=\"_blank\">Who Sometimes Violates the Rule of the Organizations?: Empirical Study on Information Security Behaviors and Awareness<\/a>&#8220;.<\/p>\n<p>The authors develop a behavioral model based on:<\/p>\n<ul>\n<li>Attitude<\/li>\n<li>Motivation toward the behavior<\/li>\n<li>Information security awareness<\/li>\n<li>Workplace environment<\/li>\n<\/ul>\n<p>and use a survey-based approach to acquire their data.<\/p>\n<p>The &#8220;money quote&#8221; (IMO) is this:<\/p>\n<blockquote><p>With regard to the information security awareness, in many cases it is<br \/>\nfound that the higher the awareness is, the less the tendency to violate the rule is.<\/p><\/blockquote>\n<p>Get cranking on your awareness programs!<\/p>\n<p>(<i>If you made it this far and went through these or other WEIS 2012 papers, which ones were most impactful for you?<\/i>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sadly, I could not make it to this year&#8217;s Workshop on the Economics of Information Security. However, the intrepid conference organizers were quick to post the papers that were presented, and I had a chance to sift through them to pick out what I believe to be the best of the best (they are all [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3,662],"tags":[],"class_list":["post-1300","post","type-post","status-publish","format-standard","hentry","category-information-security","category-weis-2012"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WEIS 2012 :: Best of the Best - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WEIS 2012 :: Best of the Best - rud.is\" \/>\n<meta property=\"og:description\" content=\"Sadly, I could not make it to this year&#8217;s Workshop on the Economics of Information Security. However, the intrepid conference organizers were quick to post the papers that were presented, and I had a chance to sift through them to pick out what I believe to be the best of the best (they are all [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-16T17:13:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-10T13:01:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"WEIS 2012 :: Best of the Best\",\"datePublished\":\"2012-06-16T17:13:20+00:00\",\"dateModified\":\"2018-03-10T13:01:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/\"},\"wordCount\":1470,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png\",\"articleSection\":[\"Information Security\",\"WEIS 2012\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/\",\"name\":\"WEIS 2012 :: Best of the Best - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png\",\"datePublished\":\"2012-06-16T17:13:20+00:00\",\"dateModified\":\"2018-03-10T13:01:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?fit=524%2C330&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2012\\\/06\\\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?fit=524%2C330&ssl=1\",\"width\":\"524\",\"height\":\"330\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/06\\\/16\\\/weis-2012-best-of-the-best\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WEIS 2012 :: Best of the Best\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WEIS 2012 :: Best of the Best - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","og_locale":"en_US","og_type":"article","og_title":"WEIS 2012 :: Best of the Best - rud.is","og_description":"Sadly, I could not make it to this year&#8217;s Workshop on the Economics of Information Security. However, the intrepid conference organizers were quick to post the papers that were presented, and I had a chance to sift through them to pick out what I believe to be the best of the best (they are all [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","og_site_name":"rud.is","article_published_time":"2012-06-16T17:13:20+00:00","article_modified_time":"2018-03-10T13:01:38+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"WEIS 2012 :: Best of the Best","datePublished":"2012-06-16T17:13:20+00:00","dateModified":"2018-03-10T13:01:38+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/"},"wordCount":1470,"commentCount":2,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png","articleSection":["Information Security","WEIS 2012"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","url":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","name":"WEIS 2012 :: Best of the Best - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png","datePublished":"2012-06-16T17:13:20+00:00","dateModified":"2018-03-10T13:01:38+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?fit=524%2C330&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/06\/Anderson_WEIS2012.pdf-page-5-of-31-8-documents-222-total-pages.png?fit=524%2C330&ssl=1","width":"524","height":"330"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"WEIS 2012 :: Best of the Best"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-kY","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":583,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-sex-lies-cyber-crime-survey\/","url_meta":{"origin":1300,"position":0},"title":"WEIS 2011 :: Session 1 :: Attacks :: Sex, Lies &#038; Cyber-crime Survey","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Presentation [PDF]","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":571,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-where-do-all-the-attacks-go\/","url_meta":{"origin":1300,"position":1},"title":"WEIS 2011 :: Session 1 :: Attacks :: Where Do All The Attacks Go?","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Dinei Florncio Cormac Herley Presentation [PDF] Twitter transcript #weis2011 New threat model (that may scale). Rather than use individual users & attackers, use population of users, pop of attackers #weis2011 assumption\/proposition: attacker attacks when Expected{gain} > Expected{loss} #weis2011 (me) more good math on the slides. using the populations, they made\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":590,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-2-identity-economic-tussles-in-federated-identity-management\/","url_meta":{"origin":1300,"position":2},"title":"WEIS 2011 :: Session 2 :: Identity :: Economic Tussles in Federated Identity Management","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Susan Landau Tyler Moore Presentation [PDF] Tyler presented really well and it's a great data set and problem to investigate. He & Susan shed a ton of light on an area most folks never think about. Well done. Twitter transcript #weis2011 this looks to be a \"must read\" resource for\u2026","rel":"","context":"In &quot;Identity Management&quot;","block_context":{"text":"Identity Management","link":"https:\/\/rud.is\/b\/category\/identity-management\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":568,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-the-impact-of-immediate-disclosure-on-attack-diffusion-volume\/","url_meta":{"origin":1300,"position":3},"title":"WEIS 2011 :: Session 1 :: Attacks :: The Impact of Immediate Disclosure on Attack Diffusion &#038; Volume","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Sam Ransbotham Sabayasachi Mitra Presentation [PDF] Twitter transcript #weis2011 Does immediate disclosure of vulns affect exploitation attempts? Looking at impact on risk\/diffusion\/volume #weis2011 speaker is presenting standard attack process & security processes timelines (slides will be in the blog post) #weis2011 the fundamental question is when from the vulnerability discovery\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":589,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-2-identity-social-networks-personalized-advertising-privacy-controls\/","url_meta":{"origin":1300,"position":4},"title":"WEIS 2011 :: Session 2 :: Identity :: Social Networks, Personalized Advertising &#038; Privacy Controls","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Catherine Tucker Presentation [PDF] Catherine's talk was really good. She handled questions well and is a very dynamic speaker. I'm looking forward to the paper. Twitter transcript #weis2011 Premise of the study was to see what impact privacy controls enablement\/usage have on advertising. It's an empirical study #data! #weis2011 click\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":591,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-2-identity-negative-information-looms-longer-than-positive-information\/","url_meta":{"origin":1300,"position":5},"title":"WEIS 2011 :: Session 2 :: Identity :: Negative Information Looms Longer Than Positive Information","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Laura Brandimarte Alessandro Acquisti Joachin Vosgerau Twitter transcript #weis2011 How does information related to past events and retrieved today get discounted? Why does neg valence receive more weight? #weis2011 how do we improve trustworthyness? #weis2011 \"designers of modern tech do not understand human fallibility and design systems w\/o taking them\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1300"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1300\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}