Pretty Good Privacy (PGP), one of the most widely used cryptographic standards, enables safe end-to-end encryption for emails, messages and other data sharing between users. Essentially, PGP works by implementing asymmetric encryption, in which certificates are shared...
Security
Using game theory to model poisoning attack scenarios
Poisoning attacks are among the greatest security threats for machine learning (ML) models. In this type of attack, an adversary tries to control a fraction of the data used to train neural networks and injects malicious data points to hinder a model's performance.
Randpay: a technology for blockchain micropayments that requires a recipient’s consent
Two researchers at Emercoin, a decentralized peer-to-peer (p2p) network providing secure blockchain business services, have recently developed a new technology called Randpay that only allows users to complete payments and transactions with a recipient's consent....
Selecting the best features for phishing attack detection algorithms
In recent decades, phishing attacks have become increasingly common. These attacks allow attackers to obtain sensitive user data, such as passwords, usernames, credit card details, etc., by tricking people into disclosing personal information. The most common type of...
Maestro: a new attack that orchestrates malicious flows with BGP
Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed denial of service (DDos) flows on transit...
New exploitation techniques and defenses for DOP attacks
Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State University and Aalto University have...
IBM researchers develop a technique to virtually patch vulnerabilities ahead of threat
Researchers at IBM have recently devised a new technique to virtually patch security vulnerabilities before they are found. Their approach, presented at the International Workshop on Information and Operational Technology, co-located with RAID18, leverages testing...
Circular all-or-nothing: A new approach to protect data from key exposure
A team of researchers at Telecom ParisTech has developed a new method to protect encrypted data against key exposure. Their algorithm, presented in a paper pre-published on arXiv, transforms, fragments and disperses data so that it remains protected, unless all...
Box of Pain: A new tracer and fault injector for distributed systems
In computer science, distributed systems are systems with components located on different devices, which communicate with one another. While these systems have become increasingly common, they are typically filled with bugs.
A model to classify cyberattacks using swarm intelligence
In recent years, new technological advances have led to a growing number of devices, ranging from more conventional computers to other gadgets and smart home appliances, communicating and sharing data with one another. Despite its advantages, this growing...