Bitcoin security paper resources (for school paper)Hey all for my network/security lab we were given a project that's fairly loosely interpreted.Your term project should address a research issue in network security, interpreted broadly (it need not be a topic discussed in class). The goal in terms of depth and quality is to develop the effort to a degree that would merit a workshop-caliber publication.This could involve the following 1. Analyze. Undertake a substantive analysis/assessment of security issues for a given network system. For example, to what degree does Skype expose its users to remote compromise? Preserve their privacy? Admit misuse of the system to aid in denial-of-service attacks? Surreptitiously monitor their communications? Have vulerabilities that enable fraud? What is its trust model? What steps could be taken to strength Skype in this regard? What can you say about the expected efficacy of those steps? (Note: it needn't be an application nor involve end systems. You can consider schemes relevant to other layers of the networking stack, or that concern infrastructure/internal components.) 2. Measure. Empirically explore and characterize a network security issue. For example, under what circumstances and to what degree do nodes in the Tor anonymizing network alter the content that passes through them? 3. Innovate. Devise and analyze (and possibly implement) a new mechanism or technique. For example, this could be a new way to protect servers from application-level denial-of-service attacks, or a new detector for some type of malicious activity. 4. Test. Take a result in the literature and undertake a thoughtful and meaningful reproduction of it to assess to what degree you obtain the same results, and why. 5. Attack. Develop a new threat. Assess its efficacy, countermeasures/defenses, and likely "arms race" evolution. 6. Research. Conduct a deep, thoughtful literature survey of a particular area in network security ("research" as a verb). Assess the strengths and weaknesses of the published results in the area, delimit the boundaries of the state of the art, identify themes and abstractions, frame avenues for future work.I'd like to do something regarding the security of bitcoin when left on a open trading site vs private wallet or similar.I'm not versed or familiar at all with bitcoin and was hoping some people in here would have resources that would pertain to bitcoin and network security that would be beneficial towards writing this.thanks via /r/Bitcoin https://ift.tt/2H3Uck2
Hey all for my network/security lab we were given a project that's fairly loosely interpreted.
Your term project should address a research issue in network security, interpreted broadly (it need not be a topic discussed in class). The goal in terms of depth and quality is to develop the effort to a degree that would merit a workshop-caliber publication.
This could involve the following 1. Analyze. Undertake a substantive analysis/assessment of security issues for a given network system. For example, to what degree does Skype expose its users to remote compromise? Preserve their privacy? Admit misuse of the system to aid in denial-of-service attacks? Surreptitiously monitor their communications? Have vulerabilities that enable fraud? What is its trust model? What steps could be taken to strength Skype in this regard? What can you say about the expected efficacy of those steps? (Note: it needn't be an application nor involve end systems. You can consider schemes relevant to other layers of the networking stack, or that concern infrastructure/internal components.) 2. Measure. Empirically explore and characterize a network security issue. For example, under what circumstances and to what degree do nodes in the Tor anonymizing network alter the content that passes through them? 3. Innovate. Devise and analyze (and possibly implement) a new mechanism or technique. For example, this could be a new way to protect servers from application-level denial-of-service attacks, or a new detector for some type of malicious activity. 4. Test. Take a result in the literature and undertake a thoughtful and meaningful reproduction of it to assess to what degree you obtain the same results, and why. 5. Attack. Develop a new threat. Assess its efficacy, countermeasures/defenses, and likely "arms race" evolution. 6. Research. Conduct a deep, thoughtful literature survey of a particular area in network security ("research" as a verb). Assess the strengths and weaknesses of the published results in the area, delimit the boundaries of the state of the art, identify themes and abstractions, frame avenues for future work.
I'd like to do something regarding the security of bitcoin when left on a open trading site vs private wallet or similar.
I'm not versed or familiar at all with bitcoin and was hoping some people in here would have resources that would pertain to bitcoin and network security that would be beneficial towards writing this.
thanks
Hey all for my network/security lab we were given a project that's fairly loosely interpreted.Your term project should address a research issue in network security, interpreted broadly (it need not be a topic discussed in class). The goal in terms of depth and quality is to develop the effort to a degree that would merit a workshop-caliber publication.This could involve the following 1. Analyze. Undertake a substantive analysis/assessment of security issues for a given network system. For example, to what degree does Skype expose its users to remote compromise? Preserve their privacy? Admit misuse of the system to aid in denial-of-service attacks? Surreptitiously monitor their communications? Have vulerabilities that enable fraud? What is its trust model? What steps could be taken to strength Skype in this regard? What can you say about the expected efficacy of those steps? (Note: it needn't be an application nor involve end systems. You can consider schemes relevant to other layers of the networking stack, or that concern infrastructure/internal components.) 2. Measure. Empirically explore and characterize a network security issue. For example, under what circumstances and to what degree do nodes in the Tor anonymizing network alter the content that passes through them? 3. Innovate. Devise and analyze (and possibly implement) a new mechanism or technique. For example, this could be a new way to protect servers from application-level denial-of-service attacks, or a new detector for some type of malicious activity. 4. Test. Take a result in the literature and undertake a thoughtful and meaningful reproduction of it to assess to what degree you obtain the same results, and why. 5. Attack. Develop a new threat. Assess its efficacy, countermeasures/defenses, and likely "arms race" evolution. 6. Research. Conduct a deep, thoughtful literature survey of a particular area in network security ("research" as a verb). Assess the strengths and weaknesses of the published results in the area, delimit the boundaries of the state of the art, identify themes and abstractions, frame avenues for future work.I'd like to do something regarding the security of bitcoin when left on a open trading site vs private wallet or similar.I'm not versed or familiar at all with bitcoin and was hoping some people in here would have resources that would pertain to bitcoin and network security that would be beneficial towards writing this.thanks
No comments:
Post a Comment