Skip to main content

Currently Skimming:

Security at Different Layers of Abstractions: Application, Operating Systems, and Hardware--Bryan D. Payne
Pages 5-10

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 5...
... The Heartbleed bug (http://heartbleed.com) , a recent attack on the OpenSSL cryptographic software that mostly affected web servers, resulted in the disclosure of private information.
From page 6...
... They may involve hardware replacement with a malicious version that appears the same to users but allows an attacker to access the system, or a firmware attack that can change programmable portions of hardware to the attacker's benefit. Physical hardware replacement requires a supply chain attack or an onsite operative.
From page 7...
... CASE STUDY: PROTECTING NETWORK TRAFFIC IN THE CLOUD When using a web browser, most people know to look for a lock icon indicating a secure connection before making a credit card transaction or other sensitive operation. This security is enabled by a network protocol called transport layer security (TLS)
From page 8...
... Often this is a very reasonable assumption because the major cloud providers have thus far demonstrated that they are better at infrastructure security than all but the largest data center operators. However, rather than merely trusting, it would be much safer to "trust and then verify" that cloud providers are in fact secure.
From page 9...
... 2015. Remote exploitation of an unaltered passenger vehicle.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.