Malware is often environmentally sensitive. It doesn’t want to run in a sandbox, it wants full access to the Internet. Researchers use a sandbox so they...
Continue reading...DTRAP Journal
Surprise! It’s a problem…
I have a mental model of how my system should work. For example, if my system is the DNS server, then in my mind it is...
Continue reading...The Lab vs the Real World
In the field of Cybersecurity, we often research in a controlled or simulated environment such as a lab. The problem with the sterile environment of the...
Continue reading...Why be a Reviewer?
Peer review is an integral part of an academic journal. Without it, papers aren’t vetted for fit for the journal, completeness, evidence, in fact, nothing is...
Continue reading...Field Notes: rapid communications in the DTRAP journal
Digital Threats is a constantly evolving field. New malware, attacks and defenses are constantly appearing, re-appearing, or disappearing. The events by themselves are worthy of study,...
Continue reading...Seeking submissions for DTRAP columns
DTRAP wants to bridge the gap between research and practice and facilitate conversation. We have two regular columns in the journal to aid us in achieving...
Continue reading...Rubric for journal fit
So you’re submitting an article to a journal; based on the description of the journal, you think it’s a good fit, but how can you be...
Continue reading...The DTRAP Blog
Hello, and welcome to the DTRAP blog, which is associated with the new ACM journal Digital Threats: Research and Practice, known as “DTRAP”. This blog will...
Continue reading...