Denial of Responsibility (DoR) Attacks

Drew Danielson andrew.danielson at CMU.EDU
Tue Jun 4 15:37:10 UTC 2002


I suppose then this web page models a type of "Assertion of Entitlement"
(AoE) attack?

http://www.microsoft.com/freedomtoinnovate/default.asp


Grant Barrett wrote:
>
> Coined for the computing world, but applicable in politics as well: Denial
> of Responsbility (DoR) attacks, patterned after Denial of Service (DoS)
> attacks.
>
> http://www.oreillynet.com/cs/weblog/view/wlg/1500
>
> "DoR attacks used to be of a simple, garden-variety type where a computer
> manufacturer obscures the fact it has shipped a system with bugs (sometimes
> known to the company in advance). More recent DoR attacks include the
> inclusion of "cool features" that benefit only a few curious experimenters
> but open the door to serious intrusions."
>
> --
>
> Apple Macintosh Technical Support in New York City
> gbarrett at worldnewyork.org
> http://www.worldnewyork.org/
> 646 296 2260

--
 .............................................
.          D r e w  D a n i e l s o n         .
.          <andrew.danielson at cmu.edu>         .
. Admin for Krogh, Gabriel, Fedder & Rajkumar .
. Carnegie Mellon University • ECE Department .
. 5000 Forbes Avenue  •  Pittsburgh, PA 15213 .
. +1 412 268-2188 Voice • +1 412 268-3890 Fax .
.        http://www.ece.cmu.edu/~dmunk        .
 .............................................
 A fool with a sense of his foolishness is --
 at least to that extent -- wise.
  -- Dhammapada



More information about the Ads-l mailing list