منابع مشابه
Cyberterrorism How Real Is the Threat?
SPECIAL REPORT 119 December 2004 ABOUT THE REPORT The threat posed by cyberterrorism has grabbed headlines and the attention of politicians, security experts, and the public. But just how real is the threat? Could terrorists cripple critical military, financial, and service computer systems? This report charts the rise of cyberangst and examines the evidence cited by those who predict imminent ...
متن کاملThreat Modelling for Security Tokens in Web Applications
In the last couple of years, several European countries have started projects which intend to provide their citizens with electronic identity cards, driven by the European Directive on Electronic Signatures. One can expect that within a few years, these smart cards will be used in a wide variety of applications. In this paper, we describe the common threats that can be identified when using sec...
متن کاملSigreturn oriented programming is a real threat
This paper shows that Sigreturn Oriented Programming (SROP), which consists of using calls to sigreturn to execute arbitrary code, is a powerful method for the development of exploits. This is demonstrated by developing two different kinds of SROP based exploits, one asterisk exploit which was already portrayed in the paper presenting SROP, and one novel exploit for a recently disclosed bug in ...
متن کاملWhat is the Real Cause of Glaucoma?
Introduction: The term glaucoma refers to a group of diseases that have a characteristic optic neuropathy with associated visual field loss in common. Intraocular pressure has been considered to be the only causal factor for glaucoma and the only factor that can be manipulated to alter the course of the disease. But considering high intraocular pressure as the only factor responsible for glauco...
متن کاملWeb Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SA Journal of Information Management
سال: 2000
ISSN: 1560-683X,2078-1865
DOI: 10.4102/sajim.v2i2/3.111