Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jens Grossklags is active.

Publication


Featured researches published by Jens Grossklags.


arXiv: Cryptography and Security | 2017

Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs

Thomas Maillart; Mingyi Zhao; Jens Grossklags; John Chuang

Bug bounty programs offer a modern platform for organizations to crowdsource their software security and for security researchers to be fairly rewarded for the vulnerabilities they find. Little is known however on the incentives set by bug bounty programs: How they drive new bug discoveries, and how they supposedly improve security through the progressive exhaustion of discoverable vulnerabilities. Here, we recognize that bug bounty programs create tensions, for organizations running them on the one hand, and for security researchers on the other hand. At the level of one bug bounty program, security researchers face a sort of St-Petersburg paradox: The probability of finding additional bugs decays fast, and thus can hardly be matched with a sufficient increase of monetary rewards. Furthermore, bug bounty program managers have an incentive to gather the largest possible crowd to ensure a larger pool of expertise, which in turn increases competition among security researchers. As a result, we find that researchers have high incentives to switch to newly launched programs, for which a reserve of low-hanging fruit vulnerabilities is still available. Our results inform on the technical and economic mechanisms underlying the dynamics of bug bounty program contributions, and may in turn help improve the mechanism design of bug bounty programs that get increasingly adopted by cybersecurity savvy organizations.


decision and game theory for security | 2017

On the Economics of Ransomware

Aron Laszka; Sadegh Farhang; Jens Grossklags

While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with the ongoing attack waves. At the same time, our strategic understanding of the threat and the adversarial interaction between organizations and cybercriminals perpetrating ransomware attacks is lacking. nIn this paper, we develop, to the best of our knowledge, the first game-theoretic model of the ransomware ecosystem. Our model captures a multi-stage scenario involving organizations from different industry sectors facing a sophisticated ransomware attacker. We place particular emphasis on the decision of companies to invest in backup technologies as part of a contingency plan, and the economic incentives to pay a ransom if impacted by an attack. We further study to which degree comprehensive industry-wide backup investments can serve as a deterrent for ongoing attacks.


annual computer security applications conference | 2017

I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication

Jake Weidman; Jens Grossklags

The continued acceptance of enhanced security technologies in the private sector, such as two-factor authentication, has prompted significant changes of organizational security practices. While past work has focused on understanding how users in consumer settings react to enhanced security measures for banking, email, and more, little work has been done to explore how these technological transitions and applications occur within organizational settings. Moreover, while many corporations have invested significantly to secure their networks for the sake of protecting valuable intellectual property, academic institutions, which also create troves of intellectual property, have fallen behind in this endeavor. In this paper, we detail a transition from a token-based, two-factor authentication system within an academic institution to an entirely digital system utilizing employee-owned mobile devices. To accomplish this, we first conducted discussions with staff from the Information Security Office to understand the administrative perspective of the transition. Second, our key contribution is the analysis of an in-depth survey to explore the perceived benefits and usability of the novel technological requirements from the employee perspective. In particular, we investigate the implications of the new authentication system based on employee acceptance or opposition to the mandated technological transition, with a specific focus on the utilization of personal devices for workplace authentication.


recent advances in intrusion detection | 2018

\(\tau \)CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries

Paul Muntean; Matthias Fischer; Gang Tan; Zhiqiang Lin; Jens Grossklags; Claudia Eckert

Programs aiming for low runtime overhead and high availability draw on several object-oriented features available in the C/C++ programming language, such as dynamic object dispatch. However, there is an alarmingly high number of object dispatch (i.e., forward-edge) corruption vulnerabilities, which undercut security in significant ways and are in need of a thorough solution. In this paper, we propose (tau {textsc {CFI}}), an extended control flow integrity (CFI) model that uses both the types and numbers of function parameters to enforce forward- and backward-edge control flow transfers. At a high level, it improves the precision of existing forward-edge recognition approaches by considering the type information of function parameters, which are directly extracted from the application binaries. Therefore, (tau {textsc {CFI}}) can be used to harden legacy applications for which source code may not be available. We have evaluated (tau {textsc {CFI}}) on real-world binaries including Nginx, NodeJS, Lighttpd, MySql and the SPEC CPU2006 benchmark and demonstrate that (tau {textsc {CFI}}) is able to effectively protect these applications from forward- and backward-edge corruptions with low runtime overhead. In direct comparison with state-of-the-art tools, (tau {textsc {CFI}}) achieves higher forward-edge caller-callee matching precision.


european symposium on research in computer security | 2018

CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM.

Paul Muntean; Sebastian Wuerl; Jens Grossklags; Claudia Eckert

C++ object type confusion vulnerabilities as the result of illegal object casting have been threatening systems’ security for decades. While there exist several solutions to address this type of vulnerability, none of them are sufficiently practical for adoption in production scenarios. Most competitive and recent solutions require object type tracking for checking polymorphic object casts, and all have prohibitively high runtime overhead. The main source of overhead is the need to track the object type during runtime for both polymorphic and non-polymorphic object casts. In this paper, we present CastSan, a C++ object type confusion detection tool for polymorphic objects only, which scales efficiently to large and complex code bases as well as to many concurrent threads. To considerably reduce the object type cast checking overhead, we employ a new technique based on constructing the whole virtual table hierarchy during program compile time. Since CastSan does not rely on keeping track of the object type during runtime, the overhead is drastically reduced. Our evaluation results show that complex applications run insignificantly slower when our technique is deployed, thus making CastSan a real-world usage candidate. Finally, we envisage that based on our object type confusion detection technique, which relies on ordered virtual tables (vtables), even non-polymorphic object casts could be precisely handled by constructing auxiliary non-polymorphic function table hierarchies for static classes as well.


decision and game theory for security | 2018

Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits

Aron Laszka; Emmanouil Panaousis; Jens Grossklags

An insurer has to know the risks faced by a potential client to accurately determine an insurance premium offer. However, while the potential client might have a good understanding of its own security practices, it may also have an incentive not to disclose them honestly since the resulting information asymmetry could work in its favor. This information asymmetry engenders adverse selection, which can result in unfair premiums and reduced adoption of cyber-insurance. To overcome information asymmetry, insurers often require potential clients to self-report their risks. Still, clients do not have any incentive to perform thorough self-audits or to provide comprehensive reports. As a result, insurers have to complement self-reporting with external security audits to verify the clients’ reports. Since these audits can be very expensive, a key problem faced by insurers is to devise an auditing strategy that deters clients from dishonest reporting using a minimal number of audits. To solve this problem, we model the interactions between a potential client and an insurer as a two-player signaling game. One player represents the client, who knows its actual security-investment level, but may report any level to the insurer. The other player represents the insurer, who knows only the random distribution from which the security level was drawn, but may discover the actual level using an expensive audit. We study the players’ equilibrium strategies and provide numerical illustrations.


ACM Transactions on Internet Technology | 2018

On the Assessment of Systematic Risk in Networked Systems

Aron Laszka; Benjamin Johnson; Jens Grossklags

In a networked system, the risk of security compromises depends not only on each node’s security but also on the topological structure formed by the connected individuals, businesses, and computer systems. Research in network security has been exploring this phenomenon for a long time, with a variety of modeling frameworks predicting how many nodes we should expect to lose, on average, for a given network topology, after certain types of incidents. Meanwhile, the pricing of insurance contracts for risks related to information technology (better known as cyber-insurance) requires determining additional information, for example, the maximum number of nodes we should expect to lose within a 99.5% confidence interval. Previous modeling research in network security has not addressed these types of questions, while research on cyber-insurance pricing for networked systems has not taken into account the network’s topology. Our goal is to bridge that gap, by providing a mathematical basis for the assessment of systematic risk in networked systems. We define a loss-number distribution to be a probability distribution on the total number of compromised nodes within a network following the occurrence of a given incident, and we provide a number of modeling results that aim to be useful for cyber-insurers in this context. We prove NP-hardness for the general case of computing the loss-number distribution for an arbitrary network topology but obtain simplified computable formulas for the special cases of star topologies, ER-random topologies, and uniform topologies. We also provide a simulation algorithm that approximates the loss-number distribution for an arbitrary network topology and that appears to converge efficiently for many common classes of topologies. Scale-free network topologies have a degree distribution that follows a power law and are commonly found in real-world networks. We provide an example of a scale-free network in which a cyber-insurance pricing mechanism that relies naively on incidence reporting data will fail to accurately predict the true risk level of the entire system. We offer an alternative mechanism that yields an accurate forecast by taking into account the network topology, thus highlighting the lack/importance of topological data in security incident reporting. Our results constitute important steps toward the understanding of systematic risk and help to contribute to the emergence of a viable cyber-insurance market.


international conference on security and privacy in communication systems | 2017

VaultIME: Regaining User Control for Password Managers Through Auto-Correction

Le Guan; Sadegh Farhang; Yu Pu; Pinyao Guo; Jens Grossklags; Peng Liu

Users are often educated to follow different forms of advice from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every important website. However, user surveys reveal that most users are not willing to adopt this tool. They feel uncomfortable or even threatened, when they grant password managers the privilege to automate access to their digital accounts. Likewise, they are worried that individuals close to them may be able to access important websites by using the password manager stealthily.


2017 APWG Symposium on Electronic Crime Research (eCrime) | 2017

“Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing

Morvareed Bidgoli; Jens Grossklags

Fraud has existed long before the advent of modern technology; however, we can increasingly observe how this profit-driven enterprise is entering the cyberspace. Our paper focuses on a case study of two scam schemes targeting international students at Penn State. The scams have been perpetrated in either a physical (i.e., phone scam) or online (i.e., Craigslist scam) form. However, this dichotomy becomes blurry when examining the phone scams more closely since they often employ cyber elements (e.g., phone spoofing, requests of electronic payment) to mask the scammers tracks and identity. Our study aims to better understand the nature of the scams and how international students contextualize their scam experiences. We place particular emphasis on investigating what students decision-making processes are behind filing a report about their scam experiences. We also explore the predominantly used reporting avenues by those international students who filed reports. In the first part of our study, we present a qualitative analysis of Penn State campus police reports of scam incidents covering three years of data (2014–2016). Aside from being able to understand the prevalence and details of the experienced scams, the analysis of the data also helps to unpack the motivations behind why international students file reports to entities like campus police particularly in the event that an inchoate crime was experienced. Furthermore, working with the data lays the groundwork for the second half of our study, a 16-person in-depth interview series with international students who experienced a scam while studying at Penn State. The results of our case study will show the fundamental impact of increased awareness in preventing international students from falling victim to the scams they encountered. However, opportunities still remain in terms of effectively increasing knowledge about how such incidents can be officially reported to law enforcement and how currently existing cybercrime reporting mechanisms can be improved to further bolster cybercrime reporting to take place.


IEEE Access | 2018

An Options Approach to Cybersecurity Investment

Michail Chronopoulos; Emmanouil Panaousis; Jens Grossklags

Collaboration


Dive into the Jens Grossklags's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jake Weidman

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

John Chuang

University of California

View shared research outputs
Top Co-Authors

Avatar

Nicolas Christin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amir Houmansadr

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Benjamin Johnson

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Gang Tan

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Le Guan

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge