Botnets and IoT
Botnets and IoT Introduction Your malware has infected 10k targets .. What do you do now? Spam or DDoS actions are really stupid - noisy behaviour leads to fast detection & neutralisation of ...
Botnets and IoT Introduction Your malware has infected 10k targets .. What do you do now? Spam or DDoS actions are really stupid - noisy behaviour leads to fast detection & neutralisation of ...
BGP Security Insecure ASes use legacy BGP, and secure ASes must accept legacy insecure routes ▪ Problem 1: routing policies can interact in ways that can cause BGP “wedgies” Introduction Border ...
Anonymous Communication Systems Introduction Since IP addresses still leak metadata information, there are use-cases where the communicating parties want to remain anonymous. However, anonymity i...
TLS Introducing TLS It was originally designed for secure e-commerce. However, it is now used almost everywhere and it has become the de facto secure communications protocol of choice. Today, alm...
Crypto refresher Secrecy vs Confidentiality: keep data hidden from unintended receivers Privacy: keep data about a person secret. Anonymity: secrecy of an identity or a network identity, but als...