This page collects links to media
coverage of papers in the 2010 IEEE
Symposium on Security and Privacy.
US Cybersecurity Research Event
Agencies Woo Security Researchers, Technology Review (Erica
Naone), 20 May 2010.
Healthcare Data Hemorrhages: Inadvertent Disclosure
and HITECH (Short Talk)
M. Eric Johnson (Dartmouth College)
networks a treasure trove of leaked health care data, study
finds, ComputerWorld, 17 May 2010.
ConScript: Specifying and Enforcing
Leo Meyerovich (University of California, Berkeley), Benjamin Livshits
Websites from Shared Code, Technology Review (Erica Naone), 20
Experimental Security Analysis of a Modern
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel,
Tadayoshi Kohno (University of Washington), Stephen Checkoway, Damon McCoy, Brian Kantor, Danny
Anderson, Hovav Shacham, Stefan Savage (University of California, San Diego)
iskivät auton tietojärjestelmiin, Keskisuomalainen,
21 May 2010.
estão vulneraveis a ataques de hackers, Technologica, 17
Hack attacks mounted on car control systems, BBC News, 17 May
Hijack a Car's Brakes and Engines, Technology Review, 14 May
Computer Systems Called at Risk to Hackers, The New York Times
(John Markoff), 13 May 2010.
car, cnet (Elinor Mills), 14 May 2010.
cars vulnerable to malicious hacks, NewScientist (Jim Giles), 14 May 2010.
Hijack a Car's Brakes and Engines, Technology Review (Erica
Naone), 14 May 2010.
Boffins warn on car computer security risk, The Register (John
Leyden), 14 May 2010.
Tamper Evident Microprocessors
Adam Waksman, Simha Sethumadhavan (Columbia University)
evident' CPU warns of malicious backdoors, The Register (Dan
Goodin), 12 May 2010.
A Practical Attack to De-Anonymize Social Network
Gilbert Wondracek (Vienna University of Technology), Thorsten Holz
(Vienna University of Technology), Engin Kirda (Institute Eurecom),
Christopher Kruegel (University of California, Santa Barbara)
of social network use reveals your identity, NewScientist (Jim
Giles), 18 May 2010.
Social Network Users, Schneier on Security, 8 March 2010.
hijack + social networks = lost anonymity, Ars Technica, 24
Unmasks User Behind The Browser, DarkReading, 23 February 2010.
web browsers assist de-anonymisation, H-Online, 1 February
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor
Zhi Wang, Xuxian Jiang (North Carolina State University)
propose 'guaranteed' hypervisor security, IT News, 15 May 2010.
to Cure Blue Pill Virtualization Attacks, PCWorld, 7 May 2010.
Lock Down The Hypervisor, Dark Reading, 29 April 2010.
Offers Security For Virtualization, Cloud Computing, Physorg,
27 April 2010.
Side-Channel Leaks in Web Applications: a Reality Today, a
Shuo Chen (Microsoft Research), Rui Wang
Bloomington), XiaoFeng Wang (Indiana University Bloomington), Kehuan
Zhang (Indiana University Bloomington)
health, tax, and search data siphoned: Software-as-a-service springs SSL
leak, The Register, 23 March 2010.
sound alarm on Web app "side channel" data leaks, Network World, 25 March 2010.
Apps May Leak Data Even When Encrypted, Study Says,
DarkReading, 26 March 2010
Chip and PIN is Broken
Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond (University of Cambridge)
researchers show Chip and PIN system vulnerable to fraud,
PhysOrg.com, 11 February 2010.
in chip and PIN 'means thieves can use cards without needing security
code', Daily Mail, 12 February 2010.
and pin card readers fundamentally flawed, Telegraph, 11 February 2010.
the Cambridge chip and PIN attack works, ZDNet UK, 11 February 2010.
issues new anti-fraud advice,
Banking Times, 15 February 2010.
If you know of other articles that should
be linked here, e-mail them to David Evans (firstname.lastname@example.org).