Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cyber Vulnerability Implantation Revisited
Försvarshögskolan, Sektionen för militärtekniska system (MteS).ORCID iD: 0000-0002-4376-9800
Assemblin, (SWE).ORCID iD: 0009-0008-2442-4058
2021 (English)In: 2021 IEEE Military Communications Conference (MILCOM), San Diego, November 29-December 2, 2021., Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 464-469Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we revisit a study presented at MILCOM 2014. Our goal then was to determine the utility of implanting a vulnerability into a cybersecurity software protocol to an actor planning to execute an offensive cyber operation. Based on a case study describing the then recently discovered Heartbleed bug as an offensive cyber operation, a model was devised to estimate the adoption rate of an implanted flaw in OpenSSL. Using the adoption rate of the cryptographic protocol Transport Layer Security version 1.2 as a proxy, we predicted that the global adoption of the vulnerability of at least 50% would take approximately three years, while surpassing 75% adoption would take four years. Compared to subsequently collected real-world data, these forecasts turned out to be surprisingly accurate. An evaluation of our proposed model shows that it yields results with a root-mean-square error of only 1.2% over the forecasting period. Thus, it has a significant degree of predictive power. Although the model may not be generalizable to describe the adoption of any software protocol, the finding helps validate our previously drawn conclusion that exploiting implanted cyber vulnerabilities, in a scenario like the one presented, requires a planning horizon of multiple years. However, as society becomes further dependent on the cyber domain, the utility of intentional vulnerability implantation is likely an exercise in diminishing returns. For a defender, however, our model development process could be useful to forecast the time required for flawed protocols to be phased out.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2021. p. 464-469
Series
MILCOM IEEE Military Communications Conference, ISSN 2155-7578, E-ISSN 2155-7586
Keywords [en]
cyber operations, cybercrime, vulnerabilities, exploitation, intelligence, cyber insurance
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
URN: urn:nbn:se:kau:diva-103869DOI: 10.1109/MILCOM52596.2021.9652921ISI: 000819479500075Scopus ID: 2-s2.0-85124164120ISBN: 978-1-6654-3972-5 (print)ISBN: 978-1-6654-3956-5 (electronic)OAI: oai:DiVA.org:kau-103869DiVA, id: diva2:1950438
Conference
2021 IEEE Military Communications Conference (MILCOM)
Available from: 2022-01-03 Created: 2025-04-07 Last updated: 2025-04-08
In thesis
1. Expanding the view on Offensive Cyber Operations
Open this publication in new window or tab >>Expanding the view on Offensive Cyber Operations
2025 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Society relies upon the internet, a globally interconnected collection of networked information systems. These systems are imperfectly designed and implemented with critical flaws and vulnerabilities. Criminal hackers attack these shortcomings for financial gains, but there are also compelling reasons for states and state-sponsored groups to act in and through cyberspace. While state-sponsored cyberattacks can be both permissible and effective, they commonly have unintended effects: cyber collateral damage. 

Most offensive cyber operations are conducted below the threshold of force recognized in international law and do not qualify for a military response. This means that they can be used both for clandestine sabotage, for intelligence gathering, and to implant vulnerabilities in preparation for larger-scale attacks in the future. These activities have caused considerable harm beyond their intended targets. Such collateral effects have been seen in some of the most infamous and costly cyberattacks, such as the 2010 Stuxnet attack, the 2017 NotPetya attack, and the 2022 attack on ViaSat as part of the invasion of Ukraine.

An under-investigated metric when analyzing the impact of cyber op-erations is their economic cost, both in terms of production and (es-pecially) in their collateral cost to society. The economic cost is also subject to considerable externalization in the planning of cyber operations. This thesis thus investigates the balance between the op-erational effects of cyber operations and their collateral costs; the cost/benefit dilemma of offensive cyber operations. It does so by con-sidering the potential benefit of high-impact cyberattacks, e.g. supply chain vulnerability implantation against hardened targets, and by us-ing econometric methods to calculate the cost of collateral damage engendered when cyberspace is used as a domain of warfare. In doing so, it provides the first quantitative comparison of military utility to civilian harm in a cyber context. Although cyberattacks have long been considered a central component in asymmetric warfare, the the-sis presents a bottom-up analysis which shows that the economic damage caused by cyberattacks in the Russo-Ukrainian conflict 2014-2021 is an insignificant part of the Ukrainian GDP.

Finally, the thesis argues that the full cost of attacks should be meas-ured and included in models for collateral damage estimation. Such estimates should be included into national cyber doctrines to mini-mize unintended effects and ensure efficient and appropriate use of cyber capabilities.

Abstract [en]

Society relies upon the internet, a globally interconnected collection of networked information systems. These systems often contain critical vulnerabilities, giving states and state-sponsored groups compelling reasons to act in and through cyberspace. While state-sponsored cyberattacks can be both permissible and effective, they commonly have unintended effects: cyber collateral damage.  This thesis investigates the balance between the operational effects of cyber operations and their collateral costs; the cost/benefit dilemma of offensive cyber operations. It does so by considering the potential benefit of high-impact cyberattacks, e.g. supply chain vulnerability implantation, and by using econometric methods to calculate the cost of collateral damage engendered when cyberspace is used as a domain of warfare. The thesis further presents a bottom-up analysis which shows that the economic damage caused by cyberattacks in the Russo-Ukrainian conflict 2014-2021 to be an insignificant part of the Ukrainian GDP. Finally, the thesis argues that the full cost of attacks should be measured and included in models for collateral damage estimation. Such estimates should be included into national cyber doctrines to minimize unintended effects and ensure efficient and appropriate use of cyber capabilities.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2025. p. 35
Series
Karlstad University Studies, ISSN 1403-8099 ; 2025:20
Keywords
Cybersecurity, cyber warfare, collateral damage, structured literature review, applied econometrics
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-103876 (URN)10.59217/bdrf5749 (DOI)978-91-7867-572-2 (ISBN)978-91-7867-573-9 (ISBN)
Presentation
2025-06-02, Sjöström 1E309, Universitetsvägen 2, Karlstad, 13:00 (English)
Opponent
Supervisors
Funder
Knowledge Foundation, 20220129-H-01
Available from: 2025-04-30 Created: 2025-04-08 Last updated: 2025-04-30Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Sigholm, JohanLarsson, Emil

Search in DiVA

By author/editor
Sigholm, JohanLarsson, Emil
Information Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 5 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf