Month: February 2018

Develop with protocols for better OTR encryption

Cryptography done right has become important as the impacts of poor implementations are increasingly felt by journalists, whistleblowers and political activists around the world. Nik Unger and Dr. Ian Goldberg at the University of Waterloo have been working on improving cryptography for messaging. Cryptography is designed to provide a level of security for messages beyond …

Pedophile hunting and scambaiting

Tom Sorell from Warwick University Presentation from the CICC 2017-2018 Scientific Launch on the Subject of ‘Watchful Citizens:Policing from Below and Digital Vigilantism held the 2nd and 3rd November 2017 at the Université de Montreal. A comparison of vigilante activities directed at different criminal groups.  What are the differences between “pedophile hunting” and “scam baiting”? …

Could Network View Inconsistency Affect Virtualized Network Security Functions?

Software Defined Networks (SDN) are becoming more commonly used in the cloud. This virtualizes network functions as software instances in the cloud. Mohamad Aslan amd Ashraf Matrawy at Carelton University look at how this characteristics of SDN could affect the performance of Intrusion Detection Systems(IDS) on SDN. Network controllers collect information from other controllers and …

Neural Networks for Securing Vehicles

Probing the limits of anomaly detectors for automobiles with a cyber attack framework Adrian Taylor (Defence R&D Canada), Sylvain Leblanc (Royal Military College of Canada), and Nathalie Japkowicz (American University, USA) Modern vehicles are increasingly governed and controlled by a network of computers.  Automobile security requires that these networks are secure.  Detecting malicious traffic on …