A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks - Heartfield and Loukas 2015 This paper is concerned with semantic social engineering: the manipulation of the user-computer interface to deceive a user and ultimately breach a computer system's information security. Semantic attack exploits include phishing, file masquerading (disguising file ... Continue Reading

Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation

Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation - Kaloper-Meršinjak et al. 2015 Update: fixed broken paper link above. On the surface this is a paper about a TLS implementation, but the really interesting story to me is the attempt to 'do it right,' and the techniques and considerations involved in that ... Continue Reading

Capability Myths Demolished

Capability Myths Demolished - Miller et. al 2003 Pretty much everyone is familiar with an ACL-based approach to security. Despite having been around for a very long time, the capabilities approach to security is less well-known. Today's paper choice provides an excellent introduction to the capabilities model and how it compares to ACLs. Along the ... Continue Reading