Adversarial Reasoning

This module explores adversarial reasoning, focusing on understanding and anticipating attacker strategies to enhance threat prediction and mitigation in cybersecurity.

Portal > Cybersecurity > Adversarial Reasoning

Curriculum Builder

Ken Thompson. Reflections on Trusting Trust, Communications of the ACM v 27 no 8 (1984) pp 761–763.

J. Murdoch, Steven J., Drimer, Saar, Anderson, Ross, and Mike Bond. “Chip and PIN is broken,” IEEE Symposium on Security and Privacy, May 2010.

Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy, May 2010.

Razavi, Kaveh et al. “Flip Feng Shui: Hammering a Needle in the Software Stack.” Proceedings of the 25th USENIX Security Symposium, August 2016.

Bond, Mike et al. “Chip and Skim: cloning EMV cards with the pre-play attack.” In 2014 IEEE Symposium on Security and Privacy, pp. 49-64. IEEE, 2014.

Kocher, Paul et al. “Spectre attacks: Exploiting speculative execution.” In 2019 IEEE Symposium on Security and Privacy (SP), pp. 1-19. IEEE, 2019.

Miller, Charlie, and Chris Valasek. “Remote exploitation of an unaltered passenger vehicle”, 2015.