Lec04a - COMP7370 Advanced Computer and Network Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
COMP7370 Advanced Computer and Network Security Cold Boot Attacks on Encryption Keys (4) Topics: 1. NSF CCLI-TUES’11 Conference 2. Homework 1, Question 1 3. Countermeasures Topic 1: CCLI-TUES’11 Conf. About CS conferences/workshop CCLI-TUES’11 -> Conf. in other disciplines Feedbacks/Survey Computer Security: more than 20% projects CCLI-TUES Type 1 -> Type 2 How to collaborate? Topic 2: Homework 1, Question 1 Features How to present your comparison table Topic 3: Countermeasures Computer Security Research: o Many projects: < 10% motivation/threat model; > 90% solutions o Few projects: > 90% new threat models; < 10% solutions o How to determine which types of projects are better? - To copycat: - To innovate: Apple vs. Microsoft How to come up with good countermeasure solutions? o Understand threat models/problems o Understand attacking procedures o Break the link of an attacking procedure o Make a step in the attacking procedure difficult for hackers to
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

Lec04a - COMP7370 Advanced Computer and Network Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online