Why Cybersecurity Is Not Like the Immune System
The idea of a cyber-immune system sometimes circulates through the community, but it seems that such proposals either do not properly frame how the immune system works, how good computer security would work, or both. In this blog post, Jonathan Spring puts both ides in context in order to make clear why cybersecurity is not like the immune system, but why it would be nice if it were.
Observations of Successful Cyber Security Operations
In this 2013 webinar, Roman Danyliw discusses how cyber security organizations react to new technologies or adversaries.
Well There's Your Problem: Isolating the Crash-Inducing Bits in a Fuzzed File
In this 2012 report, Allen Householder describes an algorithm for reverting bits from a fuzzed file to those found in the original seed file to recreate the crash.
Probability-Based Parameter Selection for Black-Box Fuzz Testing
In this 2012 report, the authors describe an algorithm for automating the selection of seed files and other parameters used in black-box fuzz testing.
Vulnerability Detection in ActiveX Controls Through Automated Fuzz Testing
In this 2008 paper, the authors explore results of a test of a large number of Active X controls, which provides insight into the current state of ActiveX security.