As software continues to eat the world, there is an increasing pressure to automate every aspect of society, from self-driving cars, to algorithmic trading on the stock market. As this pressure manifests into software implementations of everything, there are security concerns to be addressed across many areas. But are there some domains and fields that are distinctly susceptible to attacks, making them difficult to secure? My dissertation argues that one domain in particular—public policy and law— is inherently difficult to automate securely using computers. This is in large part because law and policy are written in a manner that expects them to be flexibly interpreted to be fair or just. Traditionally, this interpreting is done by judges ...
This master's thesis reports on security of a Cyber-Physical System (CPS) in the department of indus...
This article suggests that the current public debate that pits security and privacy as dichotomous r...
Techniques like passive observation and random sampling let researchers understand many aspects of I...
BugTraq, a popular mailing list now hosted by securityfocus.com, was founded in 1993 to provide a fo...
Abstract. In a time where there is an increase in online traffic, and needing to have an online pres...
Lawyers are highly educated and, allegedly, of higher than average intelligence, but sometimes indiv...
User authentication is used to verify the identify of individuals attempting to gain access to a cer...
As cyberattacks increase in frequency and intensity around the globe, private actors have turned to ...
Indiana University-Purdue University Indianapolis (IUPUI)The web applications are now being used in ...
Underlying all military, political, and individual use of the Internet is trust. The ability of the ...
For decades, science fiction writers have tackled philosophical and existential questions arising fr...
In past decades security dilemmas focused on state on state activities where the tools of power were...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...
Cyber breaches continue at an alarming pace with new vulnerability warnings an almost daily occurren...
abstract: Passwords are ubiquitous and are poised to stay that way due to their relative usability, ...
This master's thesis reports on security of a Cyber-Physical System (CPS) in the department of indus...
This article suggests that the current public debate that pits security and privacy as dichotomous r...
Techniques like passive observation and random sampling let researchers understand many aspects of I...
BugTraq, a popular mailing list now hosted by securityfocus.com, was founded in 1993 to provide a fo...
Abstract. In a time where there is an increase in online traffic, and needing to have an online pres...
Lawyers are highly educated and, allegedly, of higher than average intelligence, but sometimes indiv...
User authentication is used to verify the identify of individuals attempting to gain access to a cer...
As cyberattacks increase in frequency and intensity around the globe, private actors have turned to ...
Indiana University-Purdue University Indianapolis (IUPUI)The web applications are now being used in ...
Underlying all military, political, and individual use of the Internet is trust. The ability of the ...
For decades, science fiction writers have tackled philosophical and existential questions arising fr...
In past decades security dilemmas focused on state on state activities where the tools of power were...
Swaths of personal and nonpersonal information collected online about internet users are increasingl...
Cyber breaches continue at an alarming pace with new vulnerability warnings an almost daily occurren...
abstract: Passwords are ubiquitous and are poised to stay that way due to their relative usability, ...
This master's thesis reports on security of a Cyber-Physical System (CPS) in the department of indus...
This article suggests that the current public debate that pits security and privacy as dichotomous r...
Techniques like passive observation and random sampling let researchers understand many aspects of I...