Rowhammer attacks are really interesting. They uses some of the physical properties of how computer memory is designed to overcome the logical control of how it is used. The bits of information are stored so close together in modern memory that if you ‘wiggle’ one bit fast enough, sometimes the ones next to it flip …
Elizabeth Oren présente la perspective de l’OTAN quant à la guerre hybride et comment ce type de guerre remet en question les principes de l’organisation. La guerre hybride est une stratégie militaire qui allie des techniques de guerre conventionnelle (combats armés, etc.), non conventionnelle (guérilla, etc.), et de cyber guerre. L’OTAN est une organisation politico-militaire …
Shaheen Shariff et Karen Eltis se sont intéressées à la violence sexuelle en ligne sur les campus. La violence sexuelle en ligne est une forme de violence sexuelle. En incluant la violence sexuelle en ligne dans la définition de la violence sexuelle, on rend compte des caractéristiques de la violence sexuelle qui s’étendent au-delà de …
Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …
At the upper end of security practices there is isolation. Disconnecting a computer from the network and of course the Internet provides a layer of physical control to system access. This air-gap is used to provide a barrier to information theft on individual computers and networks that contain very sensitive data by militaries and organisations. …
Crime statistics are a curious thing. Data available from police and the courts provide well-defined set of numbers but are limited by the amount of crime reported to and processed by the police and other over-burdened institutions. If we are to understand where we are lacking, we need to assess the gap between the actual …
Romance fraud is a particularly harmful issue that affects thousands of people every year. The damage that romance fraud can cause makes particularly startling the relatively little research that has been done on this subject. Cassandra Cross, Molly Dragiewicz and Kelly Richards provide insights by comparing romance fraud and domestic violence in the hope that …
I see a lot of our work as being the antidote to the poison of FUD (Fear, Uncertainty and Doubt). Oxford puts FUD in its place nicely by suffixing the definition with “,usually evoked intentionally in order to put a competitor at a disadvantage.” Superlative laden stories about the biggest, worst, most expensive, unstoppable, etc. hacking …
Very young children are increasingly able to access mobile devices and the Internet. It is very far from uncommon that children under 4 would be accessing the internet this way everyday. While there have been efforts to educate older children about the dangers of the internet and their privacy there has not been as much …
La cryptographie bien réalisée est devenue importante car les impacts de sa mauvaise mise en oeuvre se fait de plus en plus ressentir par les journalistes, les lanceurs d’alerte et les activistes politiques. Nik Unger et Dr. Ian Goldberg de l’Université de Waterloo ont travaillé sur l’amélioration de la cryptographie les services de messagerie. La …