This module explores adversarial reasoning, focusing on understanding and anticipating attacker strategies to enhance threat prediction and mitigation in cybersecurity.
Ken Thompson. Reflections on Trusting Trust, Communications of the ACM v 27 no 8 (1984) pp 761–763.
J. Murdoch, Steven J., Drimer, Saar, Anderson, Ross, and Mike Bond. “Chip and PIN is broken,” IEEE Symposium on Security and Privacy, May 2010.
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy, May 2010.
Razavi, Kaveh et al. “Flip Feng Shui: Hammering a Needle in the Software Stack.” Proceedings of the 25th USENIX Security Symposium, August 2016.
Bond, Mike et al. “Chip and Skim: cloning EMV cards with the pre-play attack.” In 2014 IEEE Symposium on Security and Privacy, pp. 49-64. IEEE, 2014.
Kocher, Paul et al. “Spectre attacks: Exploiting speculative execution.” In 2019 IEEE Symposium on Security and Privacy (SP), pp. 1-19. IEEE, 2019.
Miller, Charlie, and Chris Valasek. “Remote exploitation of an unaltered passenger vehicle”, 2015.
×
You have not selected any articles yet.
×
How the curriculum builder works
Make sure you select your site language before adding articles.
Choose a curriculum category.
Browse all the articles under the selected curriculum and add the ones you need to your list.
We use cookies to operate this website, improve useability, personalize your experience, and improve our marketing. Your privacy is important to us, and we will never sell your data.AcceptRejectPrivacy policy