News
-
SoS quarterly Science of Security Lablet meeting at UMDLablets meet to provide research updates about SoS Hard Problems College Park, MD October 27, 2015
-
Berkeley Report on Barriers to Cybersecurity ResearchReport released of a Workshop convened by the Berkeley Center for Law & Technology, the UC Berkeley School of Information and the International Computer Science Institute under a grant from the National Science Foundation Abstract:
-
Back and Forth Discussion on Attacking CryptDBResearchers are presenting a paper at the October ACM CCCS that details how they found a design flaw in CryptDB.
-
Estimating the reproducibility of psychological scienceNew study published in Science examined the reproducibility of psychology experiments. They tested 100 experiments and found a large portion of the replications had weaker statistical significance than the original study. For futher details, see…
-
Explanation of the Buffer Overflow AttackA pretty good explanation of the buffer overflow attack. http://arstechnica.com/security/2015/08/how-security-flaws-work-the-buffer-overflow/
-
Anti-Virus Company manipulting virus detection to fool competitors?Reuters has a story that two ex-employees from Kaspersky Labs claiming that they submitted malicous marked benign files to fool compeitors to mark malicous good files of customers while they were employeed at Kaspersky. Whether that part is true or…
-
Explaining Stagefright and the error in the PatchA bufferover flow discovered in Android April was reported to Google with a proposed fix. The name used is Stagefright and it effects 650 million android devices. However, the the patch doens't really solve the overflow. This article…
-
NSA Announces Winner of the 3rd Annual Best Scientific Cybersecurity Paper CompetitionThe Research Directorate of the National Security Agency announced the winner of this year's Science of Security (SoS) Best Scientific Cybersecurity Paper Competition. Of the 50 papers nominated, one winner and two honorable mentions were chosen.…
-
June 2015: Critical Infrastructures and CybersecurityThis month's edition of The Technology Innovation Management Review http://timreview.ca/issue/2015/june is focussing on critical infrastructure and cyber security.
-
Design Flaw in Intel x86 enables rootkitsChristopher Domas from the Battelle Memorial Institute at Blackhat presented how to compromise the lowest level code in Intel CPUs. The bug allows malicious code to jump from 'ring 0,' typically the most privileged level of execution, to 'ring…
-
New DoD Initiative Bridges Gap to Silicon ValleyThe DoD established a new center in Silicon Valley to help bridge the gap between the Pentagon and the tech world of Silicon Valley. Defense Innovation Unit–Experimental (DIU-x) was annouced in April, and in August its first leaders were annouced.…