From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television - Oren & Koremytis 2014 Before reading any further, please ensure you are in a carpeted area or other soft ground. Your jaw may hit the floor a few times when you hear what Oren & Koremytis have to tell us, … Continue reading From the Aether to the Ethernet – Attacking the Internet using Broadcast Digital Television
Tag: Security
Papers relating to security, encryption, attacks and defenses.
Machine Learning Classification over Encrypted Data
Machine Learning Classification over Encrypted Data - Bost et al. 2015 This is the 2nd of three papers we'll be looking at this week from the NDSS '15 conference held earlier this month in San Diego. When it comes to providing an informed critique of the security techniques applied in this paper, I'm out of … Continue reading Machine Learning Classification over Encrypted Data
Information-Flow Analysis of Android Applications in DroidSafe
Information-Flow Analysis of Android Applications in DroidSafe - Gordon et al. 2015 This is the first of three papers we'll be looking at this week from the NDSS'15 conference that took place earlier this month. DroidSafe is a tool that looks for potential leaks of sensitive information in Android applications. And it works incredibly well! … Continue reading Information-Flow Analysis of Android Applications in DroidSafe
Protocols for Secure Computations
Protocols for Secure Computations - Yao 1982. Alice and Bob both work in retail, but for different retailers. Alice knows how much profit her company made on Black Friday, and Bob knows how much profit his company made. Alice bets Bob her company did better than his. Neither of them can disclose company confidential information … Continue reading Protocols for Secure Computations
Certificate Transparency
Certificate Transparency Laurie 2014 This is a paper about DNS, certificates, and how to build trust in Certificate Authorities. But beyond that application, it's also a paper about how to build a publicly verifiable append-only log (without using a blockchain) - and that's an idea that could have lots of potential applications. The core idea … Continue reading Certificate Transparency