The Diminishing Returns of Strong Passwords

17 October 2018 | Comments Off on The Diminishing Returns of Strong Passwords

Research: Tail Attacks on Web Applications

12 September 2018 |

When you think of a Distributed Denial of Service (DDoS) attack, you probably think about an attack which overflows the bandwidth available on a single link; or overflowing the number of half open TCP sessions a device can have open at once, preventing the device from accepting more sessions. In all cases, a DoS or…

Research: DNSSEC in the Wild

5 September 2018 | Comments Off on Research: DNSSEC in the Wild

The DNS system is, unfortunately, rife with holes like Swiss Cheese; man-in-the-middle attacks can easily negate the operation of TLS and web site security. To resolve these problems, the IETF and the DNS community standardized a set of cryptographic extensions to cryptographically sign all DNS records. These signatures rely on public/private key pairs that are…

CLKscrew: Another side channel you didn’t know about

30 August 2018 | Comments Off on CLKscrew: Another side channel you didn’t know about

Network engineers focus on protocols and software, but somehow all of this work must connect to the hardware on which packets are switched, and data is processed. A big part of the physical side of what networks “do” is power—how it is used, and how it is managed. The availability of power is one of…

Give the Monkey a Smaller Club

15 August 2018 | Comments Off on Give the Monkey a Smaller Club

Research: Are We There Yet? RPKI Deployment Considered

13 August 2018 | Comments Off on Research: Are We There Yet? RPKI Deployment Considered

The Resource Public Key Infrastructure (RPKI) system is designed to prevent hijacking of routes at their origin AS. If you don’t know how this system works (and it is likely you don’t, because there are only a few deployments in the world), you can review the way the system works by reading through this post…

Network Collective: Security and Analytics

8 August 2018 | Comments Off on Network Collective: Security and Analytics

In this community roundtable, Eyvonne and I talk to Eric Osterweil about the increasing reliance on analytics in the realm of security.

Security and Analytics

2 August 2018 | Comments Off on Security and Analytics

On the ‘net: The Little Green Lock

31 July 2018 | Comments Off on On the ‘net: The Little Green Lock

Users—particularly those who do not understand technology as well—have long been taught to “look for the green lock in your web browser” to be certain they are communicating with a “trusted” site. For instance, here and here are articles stating that one way you know you can trust a site is by looking for the…

Research: HTTPS Interceptions

30 July 2018 | Comments Off on Research: HTTPS Interceptions

I have written elsewhere about the problems with the “little green lock” shown by browsers to indicate a web page (or site) is secure. In that article, I considered the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem…