In this paper, we explore applications of FlipIt, a novel game-theoretic model of system defense introduced recently. In FlipIt, an attacker periodically gains complete control of a system, with the unique feature that system compromises are stealthy, i.e., not immediately detected by the system owner, called the defender. We distill out several lessons from our study of FlipIt and demonstrate their application to several real-world problems, including password reset policies, key rotation, VM refresh and cloud auditing.
Category / Keywords: applications / cyber security foundations, game theory Publication Info: GameSec 2012, the third Conference on Decision and Game Theory for Security Date: received 10 Oct 2012 Contact author: aoprea at rsa com Available format(s): PDF | BibTeX Citation Version: 20121016:130528 (All versions of this report) Short URL: ia.cr/2012/579 Discussion forum: Show discussion | Start new discussion