skip to main content
research-article
Free Access

The research value of publishing attacks

Published:01 November 2012Publication History
Skip Abstract Section

Abstract

Security research can be improved by more effectively sharing what is learned from attacks on information systems.

References

  1. Basin, D. and Cremers, C. Modeling and analyzing security in the presence of compromising adversaries. In Computer Security---ESORICS 2010, volume 6345 of Lecture Notes in Computer Science. Springer, 2010, 340--356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Coverity Scan: 2011 Open Source Integrity Report. Coverity, Inc. San Francisco, CA, 2011.Google ScholarGoogle Scholar
  3. Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Network and Distributed System Security Symposium, 2011.Google ScholarGoogle Scholar
  4. Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08, IEEE Computer Society Washington, D.C., 2008, 129--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lowe, G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software---Concepts and Tools 17, 3 (1996), 93--102.Google ScholarGoogle Scholar
  6. Rouf, I. et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, USENIX Security'10. USENIX Association, Berkeley, CA, 2010, 21. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The research value of publishing attacks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 55, Issue 11
            November 2012
            104 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/2366316
            Issue’s Table of Contents

            Copyright © 2012 Copyright held by author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 November 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Popular
            • Un-reviewed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format