An activity meant to understand the way a mechanism or system works. The study or examination of a security problem or class of security problems.
Questions tagged [research]
109 questions
195
votes
4 answers
Amount of simple operations that is safely out of reach for all humanity?
Cryptographic primitives usually assert some security level given as number of operations to mount an attack. Hash functions, for example, give different security levels for collision attacks, preimage attacks and second preimage attacks. From…
Nakedible
- 4,501
- 4
- 25
- 22
28
votes
21 answers
What are the biggest unsolved problems in IT Security?
Just recently I thought about all the solved problems in IT security, like XSS (which one can mitigate with input validation), SQL Injection (mitigated with prepared statements), etc.
Now I'm wondering, what are the biggest unsolved security…
Andreas Arnold
- 2,353
- 19
- 19
22
votes
4 answers
Malwares source repositories. Where?
As the best way to learn is to read the code, do you know where I can find malware/virus/whatever source code to read?
gbr
- 2,000
- 1
- 16
- 22
19
votes
2 answers
How secure is Stack Exchange's reputation?
I recently read an article about researchers being able to penetrate the Facebook network and making lots of friends with about 100 "Social" bots. What would prevent somebody to do the same on Stack Exchange sites, so as to increase his reputation?…
user1202136
- 595
- 4
- 8
19
votes
7 answers
which site do you use to view details of vulnerabilities?
Which site/sites do you guys use to view details of security vulnerabilities?
Nathan B.
- 443
- 2
- 7
18
votes
3 answers
Recommendations for honeypot software
A couple of us wanted to setup a honeypot/honeynet with the goal of learning; not planned to be in a production environment. What's a good recommendation for a high interaction or low interaction honeypot. Also we'd like to eventually report the…
Lizbeth
- 757
- 6
- 14
14
votes
2 answers
How many passwords does the average user know?
Looking for research on the count and complexity of passwords that an average user is actively using.
Note: Also, just to be clear, by research, this is not a request for you to respond with an answer entirely based on opinions, rather than facts,…
blunders
- 5,052
- 4
- 28
- 45
14
votes
5 answers
Resources for physical security questions
What are good resources for the physical security questions that IT organizations face? Like best practices for locks and seals on servers and kiosks, personnel access mechanisms and policies, disaster recovery plans.
I'm looking for conferences,…
nealmcb
- 20,544
- 6
- 69
- 116
14
votes
5 answers
Where can I find statistics on security breaches?
I am putting together a security presentation, and I would like statistics on the occurrence of and damages from security breaches. Does anyone know of a reliable, recently-updated source?
Sean W.
- 835
- 4
- 14
14
votes
2 answers
Is a crash always exploitable for RCE?
Reading papers written by teams looking for vulnerabilities using fuzzing, I notice that many people label a crash as a DoS vulnerability. While in other papers and researches, they go deeper after the crash and try to exploit it to get RCE.
My…
J. Doe
- 65
- 1
- 10
14
votes
5 answers
How to get into RFID auditing?
I would like to get more knowledge around RFID-systems auditing.
Does anyone have a basic guide step-by-step which I can use to set up a lab with proper RFID "sniffing" equipment?
I would like to know:
What equipment I need and where to get it…
Chris Dale
- 16,119
- 10
- 56
- 97
13
votes
5 answers
Why are there more research papers on Android malware than iOS malware?
Based on this question.
Why are there more research papers on Android malware than iOS malware?
Marcus
- 1,145
- 1
- 8
- 12
13
votes
9 answers
What do you see as the emerging threats for 2011
As we move in to the new year, what do you see as the emerging threats for organisational security?
I see more chat around;
Advanced Persistent Threat (APT) from foreign states.
More fines from the Information Commissioner (IC) for data loss (This…
David Stubley
- 2,886
- 1
- 17
- 28
12
votes
1 answer
Where is the best place to get descriptions of malware?
I'm looking for a source of descriptions of 1990s to early 2000s malware; I have searched for a very long time yet found very little. I require information such as payload activation dates, files created, files deleted, and similar.
Edit: I've found…
Starmute
- 121
- 3
12
votes
4 answers
Resources for data on security incidents
What resources exist to research data on actual security incidents?
I would prefer an online resource but offline resources are acceptable. The cost of access should be less than $100 (US) for access to a statistically significant number of…
this.josh
- 8,843
- 2
- 29
- 51