Related Links

These resources will help you to explore cybersecurity and to keep abreast of ongoing developments. Note that login may be required to access the full text.

Attacks

C. Visaggio, "Session Management Vulnerabilities in Today's Web," IEEE Security & Privacy, Sept/Oct 2010, pp. 48–56, http://doi.ieeecomputersociety.org/10.1109/MSP.2010.114.

S. Abu-Nimeh and T. Chen, "Proliferation and Detection of Blog Spam," IEEE Security & Privacy, Sept/Oct. 2010, pp. 42–47, http://doi.ieeecomputersociety.org/10.1109/MSP.2010.113.

Infrastructure

D.J. Leversage and E.J. Byres, "Estimating a System's Mean Time-to-Compromise," IEEE Security & Privacy, Jan/Feb 2008, pp. 52–60, http://doi.ieeecomputersociety.org/10.1109/MSP.2008.9.

Trust

T. Huffmire, B. Brotherton, T. Sherwood, R. Kastner, T. Levin, T.D. Nguyen, and C. Irvine, "Managing Security in FPGA-Based Embedded Systems," IEEE Design & Test of Computers, Nov/Dec 2008, pp. 590–598, http://doi.ieeecomputersociety.org/10.1109/MDT.2008.166.

Architecture

J.R. Kenny and C. Robinson, "Embedded Software Assurance for Configuring Secure Hardware," IEEE Security & Privacy, Sept/Oct 2010, pp. 20–26, http://doi.ieeecomputersociety.org/10.1109/MSP.2010.150.

S.W. Boyd, G.S. Kc, M.E. Locasto, A.D. Keromytis, and V. Prevelakis, "On the General Applicability of Instruction-Set Randomization," IEEE Trans. Dependable and Secure Computing, July-Sept. 2010, pp. 255–270, http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.58.

Return to guest editor's introduction »