Dr. David Hofmann Presented at the 2018 Atlantic Security Conference In this presentation, Dr. Hofmann will discuss his recently completed funded research (TSAS / Public Safety Canada) into the three different types of social networks formed by lone-wolves during the 24 months prior to the commission of their first act of terrorist violence. Dr. Hofmann …
Today’s automobile contains a myriad of computers. While this advancement allows automobile to be more efficient and safer, that comes with new potentials risks. It is not clear if, by making car safer while using computers, automobile manufacturers thought about those computers becoming a threat if used maliciously. In this landmark research, Karl Kosher et …
If we are going to realize the benefits of a globally consolidated communications system we, as a global community of researchers, are going to have to start truly working together to find a way that we can make the internet safe for everyone. This means that all of the researchers from different countries and different …
Rowhammer attacks are really interesting. They uses some of the physical properties of how computer memory is designed to overcome the logical control of how it is used. The bits of information are stored so close together in modern memory that if you ‘wiggle’ one bit fast enough, sometimes the ones next to it flip …
Presented by Dr. Israat Haque at the 2018 Atlantic Security Conference Software Defined Network (SDN) is a new approach of designing networks. In SDN architecture network control function is decoupled from hardware like routers and switches. This decoupled control function is executed in a logically centralized controller with a global network view. Furthermore, SDN brings …
Arnaque liée à la fausse prise d’otage Le Centre antifraude du Canada produit des bulletins régulièrement pour aider les Canadiens à mieux se protéger contre la fraude. Le Centre antifraude du Canada (CAFC) reçoit des plaintes d’entreprises canadiennes qui se font arnaquer. Ces dernières reçoivent des courriels suivis d’appels d’escrocs qui se présentent sous une fausse …
Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …
Presented at the SERENE-RISC Workshop, 2017 October by Nabil Seddigh, President, Solana Networks Machine Learning an Artificial Intelligence is often presented as the cure all for cybersecurity issues. Nabil Seddigh provides some perspective on the development of this new technology and the place it will likely occupy in the security landscape. Run Time < …
A question answered with a question is often infuriating. On some rare occasions though it can be inspiring. When Tom Levasseur asked a local college why they don’t take advantage of gamification by integrating some of the challenge and fun of hacking competitions into their program they responded with “Why don’t you …?” The government …
Crime statistics are a curious thing. Data available from police and the courts provide well-defined set of numbers but are limited by the amount of crime reported to and processed by the police and other over-burdened institutions. If we are to understand where we are lacking, we need to assess the gap between the actual …