« earlier | later » Page 5 of 11
How We Learned to Cheat at Online Poker: A Study in Software Security edit / delete
Why you want to use a good RNG and a proper shuffle algorithm.
Not A Number - Painless IPSec setup for a home network. edit / delete
A script to automate ipsec with static keys. Neat -- it takes surprisingly little code.
Security/Projects/Bandit - OpenStack edit / delete
A security scanner for Python code.
to python security static-analysis ... on 23 March 2015
Secure Secure Shell edit / delete
Some recommendations for modern SSH configuration. (Note that we've had another major rev of SSH since this was written...)
"Mirage OS is a library operating system that constructs unikernels for secure, high-performance network applications across a variety of cloud computing and mobile platforms." In OCaml. They've done some nice work around their safe TLS implementation.
The IX Multilevel-Secure UNIX System edit / delete
"A collection of papers about the IX system, a simple but comprehensive multilevel-secure operating system with mandatory access control, based on the research v10 UNIX system."
to access-control mac os security unix ... on 22 March 2015
Karl Lunt's Home Page (revised) edit / delete
Various little microcontroller projects, including a neat device to set or clear the lock bit on an SD card, and some Tandy Model 100 stuff.
to avr electronics microcontroller mmc retrocomputing sd security tandy ... on 17 March 2015
Kryptos Logic Research: OpenSSL's squaring bug, and opportunistic formal verification edit / delete
Detecting an OpenSSL bug (after the fact) using formal verification. Interesting because the original formal proof was wrong...
to formal-methods openssl security ssl ... on 16 March 2015
David A. Wheeler's Personal Home Page edit / delete
Includes several well-written, comprehensive postmortems on noteworthy security bugs (e.g. Heartbleed) -- probably of interest to security students.
Update on jQuery.com Compromises | Official jQuery Blog edit / delete
"Today at 11:15AM EDT, the jQuery Infrastructure team received widespread reports and confirmed a compromise of jquery.com." Using upstream's URLs for your Javascript libraries is only a good idea if you trust that site to never, ever be compromised or MITMd... (and even then I don't think it's a good idea.)
to javascript jquery security ... on 18 January 2015
« earlier | later » Page 5 of 11
tasty by Adam Sampson.