Zobrazeno 1 - 10
of 190
pro vyhledávání: '"Responsible disclosure"'
Publikováno v:
IEEE Access, Vol 10, Pp 10472-10489 (2022)
The disclosure of security vulnerabilities plays an important role in notifying vendors and the public about flaws in digital systems. Among the proposed disclosure approaches, the most utilized is Responsible Disclosure, which still suffers from sev
Externí odkaz:
https://doaj.org/article/7c372615b8584074925c63eb326e2578
Publikováno v:
Crime Science, Vol 7, Iss 1, Pp 1-9 (2018)
Abstract In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in IT-systems and patching them. In this practice, a white-hat hacker who finds a vulnerability in an IT-system reports that vulner
Externí odkaz:
https://doaj.org/article/36aa3c6478b24459a1f78d5d607810f0
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 3, Pp 227-245 (2021)
Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world's largest crowd-sourced location tracking network called offline finding (OF). OF leverages online finder devices to detect the presence of missing offline devices us
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Computers in Human Behavior. 103:161-173
Software vulnerabilities are security-related software bugs. Direct disclosure refers to a practice that is widely used for communicating the confidential information about vulnerabilities between two parties, vulnerability discoverers and software p
Publikováno v:
IEEE Transactions on Big Data. 5:317-329
Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised attacks will increasingly be crafted to exploit vulnerabilities and weaknesses. With the ever
Publikováno v:
ICSE (Companion Volume)
The rapid spread of COVID-19 has made manual contact tracing difficult. Thus, various public health authorities have experimented with automatic contact tracing using mobile applications (or "apps"). These apps, however, have raised security and priv
Autor:
Ellis, Christopher Jordan
Digital contact tracing offers significant promise to help reduce the spread of SARS-CoV-2 and other viruses. Google and Apple joined together to create the Google/Apple Exposure Notification (GAEN) framework to determine encounters with anonymous us
Publikováno v:
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
WISEC
WISEC
Apple's file-sharing service AirDrop leaks phone numbers and email addresses by exchanging vulnerable hash values of the user's own contact identifiers during the authentication handshake with nearby devices. In a paper presented at USENIX Security'2