This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Security Boundaries
January/February 2008 (vol. 12 no. 1)
pp. 93-96
Stephen Farrell, Trinity College Dublin
Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data “crosses” each one. In his inaugural column, the author looks at a range of boundaries from smaller to larger and presents vulnerabilites and potential solutions for each case.

1. D. Bleichenbacher, "Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1," LNCS 1462, Springer-Verlag, 1998, pp. 1–12.
2. P. Ferrie, "Attacks on Virtual Machine Emulators," Symantec Advanced Threat Research, Dec. 2006; www.symantec.com/avcenter/referenceVirtual_Machine_Threats.pdf .
3. T. Ormandy, "An Empirical Study into the Security Exposure to Host of Hostile Virtualized Environments," CanSecWest 2007; http://taviso.decsystem.orgvirtsec.pdf.
4. B. Carpenter and S. Brim, "Middleboxes: Taxonomy and Issues," Internet RFC 3234, Feb. 2002; www.ietf.org/rfcrfc3234.txt.
5. S. Di Paola and G. Fedon, "Subverting Ajax," 23rd Chaos Communication Congress, Dec. 2006; http://events.ccc.de/congress/2006/Fahrplan/ attachments1158-Subverting_Ajax.pdf .
6. M. Lesk, "The New Front Line: Estonia under Cyberassault," IEEE Security &Privacy, vol. 5, no. 4, 2007, pp. 76–79.
7. P. Manadhata and J. Wing, An Attack Surface Metric, CS tech. report, Carnegie Mellon Univ., July 2005; http://reports-archive.adm.cs.cmu.edu/anon/ anon/2005CMU-CS-05-155.pdf.
8. M. Bond and R. Anderson, "API-Level Attacks on Embedded Systems," Computer, vol. 34, no. 10, 2001, pp. 67–75.

Index Terms:
security boundaries, practical security, host virtualization, middleboxes, enterprise network boundaries, Web 2.0
Citation:
Stephen Farrell, "Security Boundaries," IEEE Internet Computing, vol. 12, no. 1, pp. 93-96, Jan.-Feb. 2008, doi:10.1109/MIC.2008.19
Usage of this product signifies your acceptance of the Terms of Use.