Back to Results
First PageMeta Content
Computer network security / Malware / Software quality / Application software / Vulnerability / Threat / Rootkit / Microsoft Security Essentials / Software / Cyberwarfare / Computer security / Computing


Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It Sergey Bratus, D J Capelis, Michael Locasto, Anna Shubina October 9, 2014
Add to Reading List

Document Date: 2014-10-09 10:35:01


Open Document

File Size: 223,82 KB

Share Result on Facebook

City

Fairfax / /

Company

MCI / Intrusion Software / No Starch Press / Google / Netscape Communications / Microsoft / /

Country

United States / /

Event

Product Release / /

Facility

Detours library / University of California / /

IndustryTerm

software engineering / surveillance software / software flaws / encryption software / party software solutions / technology realms / surveillance-related software / e-commerce application / software composition / remote management software / involved computer device / client software / browser software / software tools / telecommunications industry / fundamental software / web browser / defensive software developers / e-commerce customer / web request / attack tools / nefarious software / Internet web sites / software definition / security-critical software bugs / software clauses / software component / software development / defensive 3rd party security product / web sessions / defensive software techniques / danger Web advertisement industry / automation tools / computer security products / e-commerce software / power management / technology commoditization / web surveys / legitimate advertising activities / exfiltration software / non-nefarious software kinds / web communications / communication protocols / e - commerce / computing / surveillance-enabling software / vulnerable systems / network capable device / target software / Apache web server / security solutions / e-commerce transaction / public commodity communications / legacy software / defensive software / software engineering favors existing powers / e-commerce / Software customization mechanisms / software elements / certain cryptographic algorithms / client browser software / reverse engineering tool / legitimate applications / software class / software components / web user / web development environment / Web ads / software techniques / legitimate software / software covers / software verification / client-side software / software library / software reliability / e-commerce vendor server software / software instrumentation / ever-increasing software complexity / external network / physical infrastructure / software engineering techniques / targeted advertising / security software / security product / /

Movie

D.4 / D. 4 / /

OperatingSystem

Microsoft Windows / Android / /

Organization

US government / University of California / San Diego / Federal Bureau of Investigation / /

Person

Rob Graham / Michael Locasto / Sang Kil Cha / Michael Sikorski / Alexandre Rebert / Maverick Woo / John Klensin / David Brumley / Thanassis Avgerinos / Vint Cerf / Phil Zimmerman / Edward J. Schwartz / Eleanor Saitta / Anna Shubina / Lou Montulli / /

Position

reasonable judge / author / designer / administrator / computer programmer / General Technology Note / judge / Special Agent / /

Product

iPhone / Detours / /

ProgrammingLanguage

Ruby / J / /

ProvinceOrState

Virginia / Washington / California / /

PublishedMedium

Communications of the ACM / /

Technology

mobile phones / operating system / html / encryption / cryptography / Flash / GUI / smart phones / GPS / certain cryptographic algorithms / Android / operating systems / F.L.I.R.T. technology / Controlling technologies / development technologies / firewall / communication protocols / web server / up leaving cryptography / /

URL

http /

SocialTag