I have a red button I found online that says “Do not press”. If you press it, it has one of ten or so responses, including...
Continue reading...DTRAP Journal
The USB of DOOM
In 2015, the USB Killer was created. If you plugged it into your laptop, your laptop fried. That’s definitely a threat, but the person who created...
Continue reading...Special Issue on Situational Awareness
CALL FOR PAPERS Digital Threats: Research and Practice Special Issue on Situational Awareness DEADLINE EXTENDED TO JULY 31, 2020 Guest Editors Tim Shimeall, CERTJosiah Dykstra, NSA...
Continue reading...U and Mption
This is a blog for ACM Digital Threats: Research and Practice (DTRAP) and I like to talk about not just Digital Threats, but making your research...
Continue reading...Reviewing for a Journal
A journal lives and dies not just by submissions but by reviewers. Someone has to take those submissions, read them, and determine if they fit in...
Continue reading...A Matter of Convenience
I’m going to start this discussion by reminding everyone that I’m a mathematician, not a statistician. We’re two different creatures. A mathematician determines if the conclusions...
Continue reading...Assumptions and Vulnerabilities don’t mix
NVD provides a list of all CVEs that anyone can download. You can download them by year in JSON format or XML format, set up an...
Continue reading...Digital Threats of Hardware
In 2018, Bloomberg published a story about malicious microchips that were implanted into motherboards to give spies access to the computers. There are questions about the...
Continue reading...The Theoretical Chicken
I’ve been asked why I think there’s a gap between researchers and practice in Cybersecurity and why I started working on DTRAP. By training and inclination,...
Continue reading...Digital Threats to Elections
Unfortunately, this isn’t a new topic. I’ve been reading a paper from 1987 that talks about the problem in terms of punch cards. The paper begins...
Continue reading...