XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Operating systems security

Articles & Features

Alice and Bob in the new world

COLUMN: INIT

Alice and Bob in the new world

By Shashank Agrawal, March 2015

PDF | HTML | In the Digital Library

Chronicling ciphers

DEPARTMENT: Milestones

Chronicling ciphers

By Jay Patel, March 2015

PDF | HTML | In the Digital Library

On the evolution of security bugs

DEPARTMENT: Blogs

On the evolution of security bugs

By Dimitris Mitropoulos, March 2015

PDF | HTML | In the Digital Library

Kristin Lauter on Cryptography and Mathematics

SECTION: Features

Kristin Lauter on Cryptography and Mathematics

There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.

By Shashank Agrawal, Billy Rathje, March 2015

PDF | HTML | In the Digital Library

Secure Your Data and Compute on It, Too

Secure Your Data and Compute on It, Too

Modern cryptography provides techniques to perform useful computations on sensitive data.

By Mike Rosulek, March 2015

PDF | HTML | In the Digital Library

Exploring the Risks to Identity Security and Privacy in Cyberspace

Exploring the Risks to Identity Security and Privacy in Cyberspace

Cyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?

By Jason R. C. Nurse, March 2015

PDF | HTML | In the Digital Library

The Wrens of Bletchley Park

The Wrens of Bletchley Park

The lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second World War.

By Michael Smith, March 2015

PDF | HTML | In the Digital Library

Profile: Ian Pratt<br />Pioneering security through virtualization

Cyber security centre<br />University of Oxford, United Kingdom

Ancient and modern cryptography

DEPARTMENT: Back

Ancient and modern cryptography

By Finn Kuusisto, March 2015

PDF | HTML | In the Digital Library

Security bugs in large software ecosystems

DEPARTMENT: Blogs

Security bugs in large software ecosystems

The XRDS blog highlights a range of topics from security and privacy to neuroscience. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. Keeping with our theme of professional development, included is a guest post on how to craft a publishable research paper.

By Dimitris Mitropoulos, December 2013

PDF | HTML | In the Digital Library

Cryptography, security and privacy (CrySP) research group

Understanding the Data Environment

SECTION: Features

Understanding the Data Environment

Protecting data privacy and anonymity requires a better understanding of the conditions and mechanisms under which they may be threatened.

By Elaine Mackey, Mark Elliot, September 2013

PDF | HTML | In the Digital Library

It's Not About Winning, it's About Sending a Message: Hiding information in games

It's Not About Winning, it's About Sending a Message: Hiding information in games

New information hiding techniques use online games to transmit secrets covertly. The technique is simple, but the problem of detecting these covert channels is far from solved.

By Philip C. Ritchey, September 2013

PDF | HTML | In the Digital Library

Blogs

DEPARTMENT: Blogs

Blogs

By Matthew Kay, Dimitris Mitropoulos, Wolfgang Richter, Lora Oehlberg, Lea Rosen, September 2012

PDF | HTML | In the Digital Library

Profile Dickie George<br />looking back on 40 years at the NSA

SECTION: Features

Profile Dickie George
looking back on 40 years at the NSA

By Robert J. Simmons, March 2012

PDF | HTML | In the Digital Library

Why I don't rob banks for a living

Why I don't rob banks for a living

Can game theory 'prove' that online robbery is irrational?

By Nicole Immorlica, March 2011

PDF | HTML | In the Digital Library

An interview with Greg Schwartz

An interview with Greg Schwartz

The CIO of USAA, a full-service, branchless financial services operation, sees much more to banking than e-transactions.

By James Stanier, March 2011

PDF | HTML | In the Digital Library

Data encryption

By Ed DeHart, September 2008

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, May 2005

PDF | HTML | In the Digital Library

Timing attacks on RSA

By Wing H. Wong, May 2005

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, September 2004

PDF | HTML | In the Digital Library

Computer security and intrusion detection

Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely.Several major banks have been subject to attacks, in which attackers gained access into customers' accounts and viewed detailed information about the activities on these accounts. In some instances the attackers stole credit card information to blackmail e-commerce companies by threatening to sell this information to unauthorized entities. Several online trading companies and e-commerce sites were shut down temporarily due to major packet flood attacks, also known as Denial-of-Service (DoS) attacks, causing these companies to lose revenue, customer satisfaction, and trust [10]. A major software development company discovered that attackers had broken into its network and stolen the source code for future releases of its popular products. Just recently, the source code of the future flagship product belonging to a major software development company was stolen and made publicly available on the Internet.In order to combat this growing trend of computer attacks, both academic and industry groups have been developing systems to monitor networks and systems and raise alarms of suspicious activities. These systems are called Intrusion Detection Systems (IDS).

By Khaled Labib, September 2004

PDF | HTML | In the Digital Library

Introduction to Linux networking and security

By Wei-Mei Shyr, Brian Borowski, September 1999

PDF | HTML | In the Digital Library