Industry

The document was issued by industry or industrial organization.
news

Visible to the public NSA-approved cybersecurity law and policy course now available online

NSA-approved cybersecurity law and policy course now available online

Cyber Scoop

Shannon Vavra

August 27th, 2019

Anyone who is interested in cybersecurity law and policy can now take an online course that was partly shaped by National Security Agency.

news

Visible to the public White Hacker rewarded with $500K bug bounty for returning millions in hacked cryptocurrency

White Hacker returns millions in cryptocurrency hacked from Poly Network last week. The company has decided to offer the hacker a $500K bug bounty. The white hat hacker had stated that he/she had initiated the hack for fun—and was motivated to demonstrate a vulnerability in the company’s software. Some companies are offering bug bounties to help identify problems with the systems.
news

Visible to the public Facebooks takes down over 200 Iranian Hacker Accounts used to target US Military Personnel

Facebooks takes down over 200 Iranian Hacker Accounts used to target US Military Personnel This week Facebook disabled a sophisticated online cyber espionage campaign by Iranian threat actor AKA Tortoiseshell which was targeting about 200 military personnel and companies in the defense and aerospace using fake online personas. The hackers used fictitious personas to contact its targets, building trust over months, posing as recruiters and employees of defense related companies.
news

Visible to the public NSA-approved cybersecurity law and policy course now available online

NSA-approved cybersecurity law and policy course now available online

Cyber Scoop

Shannon Vavra

August 27th, 2019

Anyone who is interested in cybersecurity law and policy can now take an online course that was partly shaped by National Security Agency.

file

Visible to the public Hardware/Software Coassurance using Algorithmic C and ACL2

Dr. David S. Hardin has made contributions in the areas of formal methods, computer architecture for High Assurance systems, as well as real-time and embedded Java. He is a Principal Research Engineer in the Advanced Technology Center at Rockwell Collins, and currently serves as a co-Principal Investigator for the DARPA CASE (Cyber Assured Systems Engineering) program.

file

Visible to the public What Blockchain Got Right, No Really

file

Visible to the public Automating Avionics Certification activities using Formal Methods

Certification of avionics software is achieved by following a rigorous, prescriptive development process, defined in Software Considerations in Airborne Systems and Equipment Certification, commonly referred to as DO-178C .This process prescribes software development and verification activities that result in airworthy software. Developing compliant software that adheres to the standard is costly and time consuming; for the most-critical avionics software there are 69 objectives that must be satisfied.

file

Visible to the public Semantics-Driven Testing of the PKCS11 API

PKCS11 is an industry standard API for communicating with cryptographic devices such as hardware security modules (HSMs). PKCS11 is a security critical API, and so implementation errors can have serious consequences. However, the PKCS11 standard is large and complex, with 100 pages of documentation for almost 50 functions. As a result, it is very challenging for developers to avoid API implementation errors. This is the problem that our work addresses.

file

Visible to the public Adversarial Examples that Fool both Computer Vision and Time-Limited Humans

ABSTRACT