Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Appendix I: Secrecy of Design
Pages 296-297

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 296...
... Finally, military systems in particular often exist in environments where postdeployment upgrades are difficult to achieve. Special problems arise when partial public knowledge is necessary about the nature of the security mechanisms, such as when a military security module is designed for integration into COTS equipment.
From page 297...
... Only after the entire assurance and evaluation process has been completed and the known residual vulnerabilities identifiedshould a decision be made about what portions of the system description are safe to release. Any imposition of secrecy, about either part or all of the design, carries two risks: that a residual vulnerability could have been discovered by a friendly peer reviewer in time to be fixed, and that the secret parts of the system will be reverse engineered and made public, leading to the further discovery, publication, and exploitation of vulnerabilities.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.