Volume 8 Issue 2 • March-April 2010
Filter Results
-
[Front cover]
Publication Year: 2010, Page(s): c1|
PDF (4274 KB)
-
Digital Editions [advertisement]
Publication Year: 2010, Page(s): c2|
PDF (2924 KB)
-
Table of contents
Publication Year: 2010, Page(s):1 - 2|
PDF (1783 KB)
-
-
[Masthead]
Publication Year: 2010, Page(s): 4|
PDF (146 KB)
-
Silver Bullet Talks with Gillian Hayes
Publication Year: 2010, Page(s):5 - 7 -
-
Guest Editors' Introduction: Mobile Device Security
Publication Year: 2010, Page(s):11 - 12 -
A mobile biometric system-on-token system for signing digital transactions
Publication Year: 2010, Page(s):13 - 19
Cited by: Papers (4)The System-on-Token architecture for biometric systems gives users full control over their biometric data and lets them sign digital transactions using biometrics. The authors implemented and tested the architecture on a commercial mobile device, the Nokia N800. View full abstract»
-
Taming the Blue Beast: A Survey of Bluetooth Based Threats
Publication Year: 2010, Page(s):20 - 27
Cited by: Papers (18)As Bluetooth finds its way into millions of devices worldwide, it also becomes a prime target for hackers. The author presents a taxonomy for threats against Bluetooth-enabled devices, describes several of these threats, and identifies steps for threat mitigation. View full abstract»
-
Making Smart Cards Truly Portable
Publication Year: 2010, Page(s):28 - 34
Cited by: Papers (1)A new communication framework makes USB smart cards portable by using the preinstalled device drivers included in modern computer operating systems. This framework could provide the missing link that lets general consumers secure their online access via smart cards.From phishing schemes to pharming scams, online identity theft is a risk that Internet users face as attackers continue to trick peopl... View full abstract»
-
Google Android: A Comprehensive Security Assessment
Publication Year: 2010, Page(s):35 - 44
Cited by: Papers (146) | Patents (7)This research provides a security assessment of the Android framework-Google's software stack for mobile devices. The authors identify high-risk threats to the framework and suggest several security solutions for mitigating them. View full abstract»
-
The Legal Ramifications of Call-Filtering Solutions
Publication Year: 2010, Page(s):45 - 50
Cited by: Papers (4)Spam-over-IP telephony (SPIT) will likely have a significant impact on the usefulness of VoIP telephony solutions, but some solutions to the problem, such as filtering, could raise unanticipated legal issues.This paper contains both an overview and an assessment of the emerging legal issues in this domain and compares the legislation of two countries with very different legal systems: the US and G... View full abstract»
-
-
A Clinic for "Secure" Programming
Publication Year: 2010, Page(s):54 - 56
Cited by: Papers (1)In this paper, the author mentions that despite the reliance on software in everything from televisions and cars to medical equipment, it often doesn't work correctly. Everyone has had problems with software like text editors that freeze, answering machines that won't answer. Others are far more serious, such as the program on a satellite that contains an error, causing the loss of expensive equip... View full abstract»
-
Hide and Seek in the Cloud
Publication Year: 2010, Page(s):57 - 58
Cited by: Papers (11)Google's January 2010 news of apparent attacks from China on its Gmail service is one of many hints that we should think harder about cloud computing's merits. Touted by its advocates as the answer for many needs, the cloud triggered security concerns early. However, these concerns have been overwhelmed by the assurances offered with the hype. So let's pause to consider the alter ego of the cloud ... View full abstract»
-
The Limits of Notice and Choice
Publication Year: 2010, Page(s):59 - 62
Cited by: Papers (5)The US Federal Trade Commission (FTC) has embarked on a series of three workshops on exploring privacy. The first, in December 2009 in Washington, DC, focused on market and regulatory issues; the second, in January in Berkeley, California, examined technological issues; and the third, scheduled for March in Washington again, will focus on possible solutions. But after hearing from more than 70 spe... View full abstract»
-
Crypto: Not Just for the Defensive Team
Publication Year: 2010, Page(s):63 - 66
Cited by: Papers (2)Cryptography has long been a useful, important tool for defensive computer security. Increasingly, however, attackers are using cryptographic techniques for the same reason as the defenders: to protect code's confidentiality and integrity. But in this case, the code is malicious. This paper reviews uses of encryption by writers of malicious code, through some recent examples. Malicious-code writer... View full abstract»
-
Ethics in security vulnerability research
Publication Year: 2010, Page(s):67 - 72
Cited by: Papers (3)Debate has arisen in the scholarly community, as well as among policymakers and business entities, regarding the role of vulnerability researchers and security practitioners as sentinels of information security adequacy. The exact definition of vulnerability research and who counts as a "vulnerability researcher" is a subject of debate in the academic and business communities. For purposes of this... View full abstract»
-
Always the Same, Never the Same
Publication Year: 2010, Page(s):73 - 75
Cited by: Papers (2)In this paper, existing sophisticated techniques can provide a deep and effective analysis to discover whether files hide a computer virus or other malware. Examples of the most effective approaches are heuristic or exhaustive static code analysis and behavior alanalysis in a sandbox environment. However, given the huge number of circulating malware and the high-performance impact associated with ... View full abstract»
-
Voice-over-IP Security: Research and Practice
Publication Year: 2010, Page(s):76 - 78
Cited by: Papers (24)Consumers and enterprises alike are rapidly adopting voice-over-IP (VoIP) technologies, which offer higher flexibility and more features than traditional telephony infrastructures. They can also potentially lower costs through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent high complexity in terms of architecture, protocols, and impl... View full abstract»
-
To Strengthen Security, Change Developers' Incentives
Publication Year: 2010, Page(s):79 - 82Many of the most common software vulnerabilities, such as buffer overflows, cross-site scripting, and misapplications of cryptography, are wholly avoidable if software makers apply an appropriate level of training, testing, and care.Yet developers today have the "wrong" incentives, often leading them to underinvest in security or even to directly harm it. If we can understand these incentives and ... View full abstract»
-
10 Quick, Dirty, and Cheap Things to Improve Enterprise Security
Publication Year: 2010, Page(s):83 - 85As software security has increasingly become an important part of information security programs, there have been some notable trends and successes of various tools, processes, and models. Because "building security in" is so different from how enterprise software has historically been developed, the changes might seem revolutionary. In the enterprise, revolutionary changes involve cost and complex... View full abstract»
-
Nothing ventured, nothing gained [Cybersecurity]
Publication Year: 2010, Page(s):86 - 87Investors at all levels are pulling back from cybersecurity, which has serious consequences if and only if investment in cybersecurity matters. If it does, then trouble is brewing. If it does not, then radically different tactics are called for. Definitive numbers are scarce, but indicative numbers are self-evident. View full abstract»
-
Identity and Security
Publication Year: 2010, Page(s): 88A strong identification system presupposes a strong notion of identity. The Internet, though, is multilayered; identity is different at each layer. My computer has three different MAC addresses and several IP addresses, including many IP addresses and logins for different instant message systems. If I switch computers, locations, or employers, several of these would change. Am I no longer myself? ... View full abstract»
Aims & Scope
Meet Our Editors
Editor-in-Chief
David M. Nicol
University of Illinois at Urbana Champagne
dmnicol@illinois.edu