Quick Take

Develop with protocols for better OTR encryption

Cryptography done right has become important as the impacts of poor implementations are increasingly felt by journalists, whistleblowers and political activists around the world. Nik Unger and Dr. Ian Goldberg at the University of Waterloo have been working on improving cryptography for messaging. Cryptography is designed to provide a level of security for messages beyond …

Could Network View Inconsistency Affect Virtualized Network Security Functions?

Software Defined Networks (SDN) are becoming more commonly used in the cloud. This virtualizes network functions as software instances in the cloud. Mohamad Aslan amd Ashraf Matrawy at Carelton University look at how this characteristics of SDN could affect the performance of Intrusion Detection Systems(IDS) on SDN. Network controllers collect information from other controllers and …

Neural Networks for Securing Vehicles

Probing the limits of anomaly detectors for automobiles with a cyber attack framework Adrian Taylor (Defence R&D Canada), Sylvain Leblanc (Royal Military College of Canada), and Nathalie Japkowicz (American University, USA) Modern vehicles are increasingly governed and controlled by a network of computers.  Automobile security requires that these networks are secure.  Detecting malicious traffic on …

Military CyberSec Logistics,Playing to Win

Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …

Trends in Privacy and Security research on the Semantic Web

Privacy, security and policies: A review of problems and solutions with semantic web technologies Sabrina Kirrane from The Vienna University of Economics,  Serena Villata from Université Côte d’Azur, and Mathieu d’Acquin from the National University of Ireland Galway provide a look at how Semantic Web technologies research is progressing with relation to privacy and security concerns. They …

2FA, I like it but I hate it.

When Pennsylviania State University decided to change their two factor authentication system Jake Weidman and Jens Grossklags took advantage of the situation to look at the transition from an organisational perspective. Their paper “I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication” provides some interesting insights. They …

Vulnerabilities Introduced by Features for Software-based Energy Measurement

Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber from Technische Universität Darmstadin Germany look into potential security side effects of new energy management features in CPUs. Energy management is an issue of growing importance as the amount of resources required to process and store the massive amount of data the information society requires. Software based …