The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (vol. 9)
ISSN: 1540-7993
From the Editors

Reality Check (HTML)

John Viega , Perimeter E-Security
pp. 3-4
2010 Reviewer Thanks

2010 Reviewer Thanks (HTML)

pp. 5-6

The 2010 International Capture the Flag Competition (Abstract)

Giovanni Vigna , University of California, Santa Barbara
pp. 12-14
News Briefs

News Briefs (HTML)

pp. 15-17
Engineering Secure Systems

Guest Editors' Introduction: Engineering Secure Systems (HTML)

Cynthia Irvine , Naval Postgraduate School
J.R. Rao , IBM Thomas J. Watson Research Center
pp. 18-21

Network-Based Root of Trust for Installation (Abstract)

Joshua Schiffman , Pennsylvania State University
Thomas Moyer , Pennsylvania State University
Trent Jaeger , Pennsylvania State University
Patrick McDaniel , Pennsylvania State University
pp. 40-48
Risk Assessment

Addressing Information Risk in Turbulent Times (Abstract)

M. Eric Johnson , Dartmouth College
Shari Pfleeger , Dartmouth College
pp. 49-57
Deception and Surveillance

Disinformation: A Taxonomy (Abstract)

James Alexander , University of Pennsylvania
Jonathan Smith , University of Pennsylvania
pp. 58-63
Malware Analysis

Analysis of a Botnet Takeover (Abstract)

Marco Cova , University of California, Santa Barbara
Richard Kemmerer , University of California, Santa Barbara
Giovanni Vigna , University of California Santa Barbara
Christopher Kruegel , University of California, Santa Barbara
Bob Gilbert , University of California, Santa Barbara
Brett Stone-Gross , University of California, Santa Barbara
pp. 64-72
It All Depends

How Private Is the Internet? (Abstract)

Lori M. Kaufman , Carnegie Mellon University
pp. 73-75
Privacy Interests

A Transatlantic Convergence on Privacy? (Abstract)

Fred H. Cate , Indiana University
pp. 76-79
Attack Trends

Malicious PDF Documents Explained (Abstract)

Didier Stevens , Contraste Europe NV
pp. 80-82
Secure Systems

Exposing the Flaws of Censorship by Domain Name (Abstract)

Wendy Seltzer , Chilling Effects Clearinghouse
pp. 83-87
Security & Privacy Economics

What Is Information Worth? (Abstract)

Michael Lesk , Rutgers University
pp. 88-90
Building Security In

Directions in Incident Detection and Response (Abstract)

Richard Bejtlich , General Electric
John Steven , Cigital
Gunnar Peterson , Arctec Group
pp. 91-92
For Good Measure

A Time for Choosing (Abstract)

pp. 96, 95
111 ms
(Ver 3.1 (10032016))