The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2008 vol.12)
pp: 93-96
Stephen Farrell , Trinity College Dublin
Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data “crosses” each one. In his inaugural column, the author looks at a range of boundaries from smaller to larger and presents vulnerabilites and potential solutions for each case.
security boundaries, practical security, host virtualization, middleboxes, enterprise network boundaries, Web 2.0
Stephen Farrell, "Security Boundaries", IEEE Internet Computing, vol.12, no. 1, pp. 93-96, January/February 2008, doi:10.1109/MIC.2008.19
1. D. Bleichenbacher, "Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1," LNCS 1462, Springer-Verlag, 1998, pp. 1–12.
2. P. Ferrie, "Attacks on Virtual Machine Emulators," Symantec Advanced Threat Research, Dec. 2006; .
3. T. Ormandy, "An Empirical Study into the Security Exposure to Host of Hostile Virtualized Environments," CanSecWest 2007; http://taviso.decsystem.orgvirtsec.pdf.
4. B. Carpenter and S. Brim, "Middleboxes: Taxonomy and Issues," Internet RFC 3234, Feb. 2002;
5. S. Di Paola and G. Fedon, "Subverting Ajax," 23rd Chaos Communication Congress, Dec. 2006; attachments1158-Subverting_Ajax.pdf .
6. M. Lesk, "The New Front Line: Estonia under Cyberassault," IEEE Security &Privacy, vol. 5, no. 4, 2007, pp. 76–79.
7. P. Manadhata and J. Wing, An Attack Surface Metric, CS tech. report, Carnegie Mellon Univ., July 2005; anon/2005CMU-CS-05-155.pdf.
8. M. Bond and R. Anderson, "API-Level Attacks on Embedded Systems," Computer, vol. 34, no. 10, 2001, pp. 67–75.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool