The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March-April (2013 vol.11)
pp: 83-88
Sergey Bratus , Dartmouth College
Anna Shubina , Dartmouth College
ABSTRACT
Any attempt to regulate—or, indeed, legally define—exploits will cause irreparable harm to both coder freedoms and consumer systems' trustworthiness. It will reduce the sum of our knowledge about how systems can and cannot behave—and thus of what they can and cannot be trusted with.
INDEX TERMS
Network security, Computer security, Encoding, Programming, Trust management, security, exploitation, hacker research
CITATION
Sergey Bratus, Anna Shubina, "Avoiding a War on Unauthorized Computation", IEEE Security & Privacy, vol.11, no. 2, pp. 83-88, March-April 2013, doi:10.1109/MSP.2013.27
REFERENCES
1. R. Graham, "The Debate over Evil Code," 2013; http://erratasec.blogspot.com/2013/03the-debate-over-evil-code.html.
2. O.S. Kerr, "Vagueness Challenges to the Computer Fraud and Abuse Act," Minnesota Law Rev., vol. 94, no. 5, 2010; http://ssrn.com/abstract=1527187.
3. Online Policy Group v. Diebold, Electronic Frontier Foundation; https://www.eff.org/casesonline-policy-group-v-diebold.
4. R. Roemer et al., "Return-Oriented Programming: Systems, Languages, and Applications," ACM Trans. Information and System Security (TISSEC 12), vol. 15, no. 1, 2012, art. 2.
5. L. Sassaman et al., Security Applications of Formal Language Theory, tech. report TR2011-709, Dartmouth College, 2011.
6. S. Bratus et al., "Composition Patterns of Hacking," Proc. 1st Int'l Workshop Cyber Patterns, 2012, pp. 80–85; http://tech.brookes.ac.uk/CyberPatterns2012 Cyberpatterns2012Proceedings.pdf.
7. A. Ortega and G. Richarte, "OpenBSD Remote Exploit," Black Hat, 2007; https://www.blackhat.com/presentations/bh-usa-07/ Ortega/Whitepaperbh-usa-07-ortega-WP.pdf.
8. D. Rosenberg, "Anatomy of a Remote Kernel Exploit," Virtual Security Research, 2011; http://vulnfactory.org/researchh2hc-remote.pdf.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool