Monthly Archives: June 2012

  • Bager, K. (2012, June). Remote access: Don’t be a victim. Network Security. [Read]
  • Butterworth, T. (2012, June 25). Bring on the leaks! Newsweek. [Read]
  • Caldwell, T. (2012, June). Locking down the VPN. Network Security. [Read]
  • Eisen, O. (2012, June). Catching the fraudulent man-in-the-middle. Network Security. [Read]
  • Fisher, D. (2012, June 27). CarderProfit case shows maturation of FBI anti-cybercrime operations. threatpost. [Read]
  • Flame creates heated debate. (2012, June). Network Security. [Read]
  • Goodin, D. (2012, June 27). Securing supercomputer networks (without disrupting 60Gbps dataflows). Ars Technica. [Read]
  • Huber, M. (2012). Perfect secrecy systems immune to spoofing attack. International Journal of Information Security. [Abstract / Request]
  • Jones, G. (2012, June). Mobile menace: Why SDR poses such a threat. Network Security. [Read]
  • Kenyon, P. (2012, June). What Australia can teach the world about least privilege. Network Security. [Read]
  • Nabeel, M.. Zage, J., Kerr, S., Bertino, E., Kulatunga, N. A., Navaratne, U. S., & Duren, M. (2012, June). Cryptographic management for smart power grids: Approaches and issues [preprint]. [Read]
  • Prezelj, I., Kopač, E., Svete, U., & Iberna, A. (2012). Cross-sectoral scanning of critical infrastructures: From functional differences to policy-relevant similarities. Journal of Homeland Security and Emergency Management. [Read]
  • Quin, B., & Liu, S. (2012). Efficient chosen ciphertext secure public-key encryption under factoring assumption. Security and Communication Networks. [Abstract / Request]
  • Smith, J. (2012, June 25). Lawyers get vigilant on cybersecurity. Wall Street Journal. [Read]
  • United States. Government Accountability Office. (2012, June 28). Cyber threats facilitate ability to commit economic espionage. [Read]
  • WhiteHat Security. (2012, June). 12th website security statistics report. [Read]

Calls for papers


  • SPACE 2012 International Conference on Security, Privacy and Applied Cryptography Engineering, Chennai, India, November 2-3, 2012. (Submissions due 3 July 2012).
  • WPES 2012 Workshop on Privacy in the Electronic Society, Held in conjunction with ACM CCS 2012, Sheraton Raleigh Hotel, Raleigh, NC, USA, October 15, 2012. (Submissions due 12 July 2012).
  • SPSM 2012 Workshop on Security and Privacy in Smartphones and Mobile Devices, Held in conjunction with ACM CCS 2012, Sheraton Raleigh Hotel, Raleigh, NC, USA, October 19, 2012. (Submissions due 13 July 2012).
  • CSS 2012 4th International Symposium on Cyberspace Safety and Security, Melbourne, Australia, December 12-13, 2012. (Submissions due 15 July 2012).
  • Bresciani, R., & Butterfield, A. (2012). A UTP approach to probabilistic protocol verification. Security and Communications Networks [preprint]. [Abstract / Request]
  • Fisher, D. (2012, June 20). Syrian dissidents hit by another wave of targeted attacks. threatpost. [Read]
  • Goodwin, J. (2012, June 18). FAA concerned that external digital sources could connect with Gulfstream G280’s flight control systems. Government Security News. [Read]
  • Gyongyosi, L., & Imre, S. (2012). Information geometric security analysis of differential phase-shift quantum key distribution protocol. Security and Communications Networks [preprint]. [Abstract / Request]
  • Herley, C. (2012, June). Why do Nigerian scammers say they’re from Nigeria? [Microsoft Research]. [Read]
  • Kharouni, L. (2012, June). Automatic online banking fraud – Automatic transfer system: The latest cybercrime toolkit feature [Trend Micro]. [Read]
  • Kravets, D. (2012, June 19). House committee approves sweeping, warrantless electronic spy powers. Wired. [Read]
  • Menn, J. (2012, June 18). Hacked companies fight back with controversial steps. Reuters. [Read]
  • Messmer, E. (2012, June 18). Stuxnet cyberattack by US a ‘destabilizing and dangerous’ course of action, says security expert Bruce Schneier. Network World. [Read]
  • Nakashima, E., Miller, G., & Tate, J. (2012, June 19). U.S., Israel developed Flame virus to slow Iranian nuclear efforts, experts say. Washington Post. [Read]
  • PayPal. (2012, June 20). Bug bounty program [cash payments for IDing PayPal vulnerabilities]. [Read]
  • Provos, N. (2012, June 19). [Overview of 5 years of data from Google’s anti-phishing efforts.] [Read]
  • Rusakov, V. (2012, June 19). XPAJ: Reversing a Windows x64 bootkit. Securelist. [Read]
  • 6th IFIP WG 11.2 International Workshop (2012, June 20-22) – papers presented [Request / Abstracts]:
  • 10th Applied Cryptography and Network Security International Conference (2012, June 26-29)  – papers presented [Request / Abstracts]:
  • Wu, G., Chen, X., & Obaidat, M. S. (2012). A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Security and Communications Networks [preprint]. [Abstract / Request]
  • Xiao, Z., Kathiresshan, N., & Xiao, Y. (2012). A survey of accountability in computer networks and distributed systems. Security and Communications Networks [preprint]. [Abstract / Request]
  • Blasco, J. (2012, June 12). Unveiling a spearphising campaign and possible ramifications   Alien Vault. [Read – analysis of the DigitalBond attack].
  • Budapest University of Technology and Economics. Laboratory of Cryptography and System Security. (2012, May 31 – updates ongoing.) sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. [Read]
  • Donohue, B. (2012, June 11). Attorney General Holder announces probe into cyberwar leaks. threatpost. [Read]
  • Goodin, D. (2012, June 11). Flame’s crypto attack may have needed $200,000 worth of compute power. Ars Technica. [Read]
  • 5th International Conference on Trust and Trustworthy Computing (2012, June 13-15) – papers presented [Request / Abstracts]:
  • Kaspersky Lab. (2012, June 11). Kaspersky Lab research proves that Stuxnet and Flame developers are connected. [Read]
  • Keogh, M., Cody, C. (2012, June). Cybersecurity for state regulators, with sample questions for regulators to ask utilities [National Association of Regulatory Utility Commissioners]. [Read]
  • Kravets, D. (2012, June 11). Feds tell Megaupload users to forget about their data. Wired. [Read]
  • Lee, A. (2012, June). Guidance on cybersecurity for the electricity sector. Power. [Read]
  • LulzSec: US indicts Ryan Cleary over hacking of Sony and Fox. (2012, June 14). Guardian. [Read]
  • McCullagh, D. (2012, June 14). Disaster awaits U.S. power grid as cybersecurity lags. C-NET.[Read]
  • Overly, S. (2012, June 11). Cyber-partnership for U-Md., Northrup. Washington Post. [Read]
  • Perlroth, N. (2012, June 11). Lax security at LinkedIn is laid bare. New York Times. [Read]
  • Ragan, S. (2012, June 11). Iran says U.S. attacked oil ministry. SecurityWeek. [Read]
  • Roberts, P. (2012, June 14). Software update site for hospital respirators found riddled with malware. threatpost. [Read]
  • Shalal-Esa, A. (2012, June 13). Scores of US firms keep quiet about cyber attacks. Reuters. [Read]
  • United Kingdom. Secretary of State for the Home. (2012, June). Draft communications data bill. [Read / Analysis]
  • United States. Department of Defense. (2012, May). Military and security developments involving the People’s Republic of China, 2012. [Read]
  • Unveillance. (2012, June 11). Visualizing botnets. [Watch -“A one minute slice of geolocated hosts that are infected with malware and unwittingly participating in a botnet”.]
  • Weiss, J. (2012, June). Ensuring the cybersecurity of plant industrial control systems. Power. [Read]
  • Wyden, R. (2012, June 11). Hold statement for Congressional Record on FISA Amendments Act. [Read / Analysis]
[Next update 6/15/12]
  • Aftergood, S. (2012, May 29). Move to declassify FISA court rulings yields no results. Federation of American Scientists. [Read]
  • Altschuller, A., Magrani, B., Appelbaum, J., Remolina Angarita, N., Doneda, D., & Viola, M. (2012, June 1). Privacy and data protection online: How companies, governments, and users can promote online privacy [roundtable discussion at the Rio de Janeiro Human Rights & Technology Conference]. [Read]
  • Brook, C. (2012, May 29). Serco: ‘Sophisticated’ attack on U.S. govt. pension plan nets info on 123K. threatpost. [Read]
  • F-Secure Labs. (2012, May). Mobile threat report: Q1 2012. [Read]
  • Garfinkel, S. L. (2012, June). The cybersecurity risk. Communications of the ACM. [Read]
  • Gold, S. (2012). Wireless cracking: There’s an app for that. Network Security. [Read]
  • Goodin, D. (2012, May 31). How a trio of hackers brought Google’s reCAPTCHA to its knees. Ars Technica. [Read]
  • Hall, C. (2012, June). Security of the internet and known unknowns. Communications of the ACM. [Read]
  • Hamamreh, R. (2012). Routing path authentication in link-state routing protocols. Network Security. [Read]
  • Hill, B. (2012, May 18). Adaptive user-interface randomization as an anti click-jacking strategy. [Read / Reports on research done by PayPal]
  • Johnsen, S. O. (2012). Resilience at interfaces: Improvement of safety and security in distributed control systems by web of influence. Information Management & Computer Security. [Read]
  • Kravets, D. (2012, May 31). Congress looking happy to reauthorize broad, secret spying powers. Wired. [Read / Watch related Congressional hearing]
  • Krebs, B. (2012, May 31). House committee to probe e-banking heists. Krebs on Security. [Read]
  • Li, Y., Ren, J., & Wu, J. (2012). Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems. [Read]. [SCADA]
  • Lin, H. (2012, June). Why computer scientists should care about cyber conflict and U.S. national security policy. Communications of the ACM. [Read]
  • MacDonald, N., & Firstbrook, P. (2012, May 30). The growing importance of cloud access security brokers [Gartner]. [Read]
  • Maltais, M. (2012, May 30). Law banning warrantless cellphone tracking clears California Senate. Los Angeles Times. [Read]
  • Mason, A. (2012). Caught in the cross-site scripting fire. Network Security. [Read]
  • Musil, S. (2012, May 29). Experts dispute threat posed by backdoor found in Chinese chip. CNet. [Read]
  • Patel, A., Qi, W., & Taghavi, M. (2012) An evaluation of a secure and trustworthy mobile agent-based e-marketplace system. Information Management & Computer Security. [Read]
  • Roberts, P. (2012, May 30). News roundup: What the experts are saying about the Flame worm. threatpost. [Read]
  • Sanger, D. E. (2012, June 1). Obama order sped up wave of cyberattacks against Iran. New York Times. [Read]
  • Sasson, B. (2012, May 30). Obama administration fights back against hackers. The Hill. [Read]
  • Sommestad, T., Holm, H., & Ekstedt, M. (2012). Estimates of success rates of remote arbitrary code execution attacks. Information Management & Computer Security. [Read]
  • United States. Congress. House. Committee on Energy and Commerce. (2012, May 31). International proposals to regulate the internet [testimony]. [Watch / Related C-SPAN coverage]
  • United States. Department of Homeland Security. Control Systems Security Program. (2012, May 25). Targeted cyber intrusion and mitigation strategies. [Read]
  • United States. Federal Communications Commission. (2012, May 25). Public notice: Comments sought on privacy and security of information stored on mobile devices. [Read]
  • Workman, M. (2012). Validation of biases model in strategic security decision making. Information Management & Computer Security. [Read]
  • Zetter, K. (2012, May 28). Meet ‘Flame”, the massive spy malware infiltrating Iranian computers. Wired. [Read]



IEEE eCrime Summit 2012 [Las Croabas, Puerto Rico, Oct. 23-34, 2012 – submissions due Aug. 3rd]

17th International Conference on Financial Cryptography and Data Security [Okinawa, Japan, April 1–5, 2013 – submission due Oct. 13]