Rowhammer attacks are really interesting. They uses some of the physical properties of how computer memory is designed to overcome the logical control of how it is used. The bits of information are stored so close together in modern memory that if you ‘wiggle’ one bit fast enough, sometimes the ones next to it flip …
Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …
At the upper end of security practices there is isolation. Disconnecting a computer from the network and of course the Internet provides a layer of physical control to system access. This air-gap is used to provide a barrier to information theft on individual computers and networks that contain very sensitive data by militaries and organisations. …
Romance fraud is a particularly harmful issue that affects thousands of people every year. The damage that romance fraud can cause makes particularly startling the relatively little research that has been done on this subject. Cassandra Cross, Molly Dragiewicz and Kelly Richards provide insights by comparing romance fraud and domestic violence in the hope that …
Strangers on a Train (1951) Perhaps its a result of the advances made in security technologies, or just our understanding of the risks, but the ‘insider threat’ has become a part of the security landscape on par with massive DDoS and State driven Advanced Persistent Attacks. The insider threat is the risk of an employee …
Very young children are increasingly able to access mobile devices and the Internet. It is very far from uncommon that children under 4 would be accessing the internet this way everyday. While there have been efforts to educate older children about the dangers of the internet and their privacy there has not been as much …
Probing the limits of anomaly detectors for automobiles with a cyber attack framework Adrian Taylor (Defence R&D Canada), Sylvain Leblanc (Royal Military College of Canada), and Nathalie Japkowicz (American University, USA) Modern vehicles are increasingly governed and controlled by a network of computers. Automobile security requires that these networks are secure. Detecting malicious traffic on …
Privacy, security and policies: A review of problems and solutions with semantic web technologies Sabrina Kirrane from The Vienna University of Economics, Serena Villata from Université Côte d’Azur, and Mathieu d’Acquin from the National University of Ireland Galway provide a look at how Semantic Web technologies research is progressing with relation to privacy and security concerns. They …
When Pennsylviania State University decided to change their two factor authentication system Jake Weidman and Jens Grossklags took advantage of the situation to look at the transition from an organisational perspective. Their paper “I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication” provides some interesting insights. They …
The increasing importance of information security has forced researchers to start literally thinking outside the box. The importance of the isolating systems as a form of high security control has lead to tests of the permeability of an air gap. there has been research into techniques by which data from an isolated system can …