Difference between revisions of "User:Locasto"

From wiki.ucalgary.ca
Jump to: navigation, search
m (Stuff Where I Get Mentioned)
m (Courses I've Taught at UofC)
Line 24: Line 24:
  
 
* [[Courses/Computer_Science/CPSC_525.W2013 | CPSC 525]]
 
* [[Courses/Computer_Science/CPSC_525.W2013 | CPSC 525]]
 +
 +
'''Network Systems Security'''
 +
 +
* [[Courses/Computer_Science/CPSC_526.W2015 | CPSC 526]]
  
 
'''CyberWar'''
 
'''CyberWar'''

Revision as of 21:40, 1 May 2015

Please see my CPSC Web Site

Courses I've Taught at UofC

I have made all of the courses I've taught available via the UofC wiki.

Information Systems Security Analysis

  • CPSC 601.29 ISSA, Information Systems Security Analysis, grad course in Fall and Winter 2011, Winter 2014; this course is a guided tour of recent work in systems security, systems security analysis, x86 architecture, and intrusion {detection, prevention, response, analysis, recovery}

Computing Machinery I

Operating Systems

An undergraduate computer science course in operating systems principles

Principles of Computer Security

Network Systems Security

CyberWar

Public Projects and Resources

An Information Security Reading List (work in progress)


U of C's Private Cloud Initiative for studying the behavior and security properties of a real cloud computing environment.

Distributed Web Search Project

libvei, a prototype implementation of a network packet injection framework for programs that wraps libpcap. In particular, this project gave me a chance to write a libpcap tutorial that goes a bit more into depth on features that other tutorials do not.

A Virtual Machine Fingerprinting project

An annotated Security Blog List, collecting the advice of multiple security folk.

A tutorial on the Linux command line: 1K Linux Commands

A wiki page on the Cost of Information Security

A list of nearby venues suitable for Computer Science retreats, workshops, and conferences: Retreat Locations Near Calgary (this is a good resource for potential local chairs)

Survey of Intrusion Defense

Deep Introspection

A list of my favorite Top N Systems Security Problems

Cyber Insurance and Regulation

Will regulating developers reduce the existence of bugs? Probably not, but it sure will close the discipline and drive up costs.

Companies Turn to Cyber Insurance as Hacker Threats Mount

Insurers struggle to get grip on burgeoning cyber risk market

Cyberinsurance: A breach savior for healthcare providers, but read the fine print

With Regulation Looming, It's Time to Raise Bar for Software Quality

[www.foxbusiness.com/industries/2014/04/18/should-retailers-and-banks-tell-when-youve-been-hacked/ Should Retailers and Banks Tell You When You've Been hacked]

Public Data Systems / Project Failures

Technology is not magic and will not magically save us or somehow deal with large, complex problems. Yet politicians and the public tend to believe that computerizing a problem will magically solve it. Not so. Here is a list of failures of computer systems projects, mostly in the public sphere, and many of them dealing with Health IT.

Links for Cage

Langsec

Random langsec-related links

Network Security Links

http://internetcensus2012.bitbucket.org/download.html

http://packetstorm.linuxsecurity.com/papers/general/blackmagic.txt

arp-sk: http://sid.rstack.org/arp-sk/

JI's Internet Routing Course: http://www.cs.columbia.edu/~ji/F02/

http://personalpages.manchester.ac.uk/staff/m.dodge/cybergeography//atlas/historical.html

http://www.cs.uit.no/~daniels/PingTunnel/#using

browser security handbook: http://code.google.com/p/browsersec/wiki/Main

http://packetlife.net/blog/2011/mar/2/tcp-flags-psh-and-urg/

http://arstechnica.com/security/2013/08/twitter-rolls-out-two-factor-authentication-thats-simpler-more-secure/

http://blogs.wsj.com/digits/2013/07/31/why-google-doesnt-encrypt-user-data-while-its-stored/

Cloud

http://research.microsoft.com/en-us/um/redmond/events/socc2010/index.htm

http://matt-welsh.blogspot.ca/2011/05/how-can-academics-do-research-on-cloud.html

Overlay Networks

http://www.opendht.org/faq.html

http://current.cs.ucsb.edu/projects/chimera/

https://github.com/sit/dht/wiki

http://research.microsoft.com/en-us/um/people/antr/pastry/pubs.htm

http://oceanstore.cs.berkeley.edu/

http://www.bamboo-dht.org/

Testbeds

https://www.planet-lab.org/about

Canadian Cyber Security Links

http://www.calgaryherald.com/business/story.html?id=8658076

http://www.techvibes.com/blog/government-fights-cyber-crime-2013-03-21

Random Links

https://github.com/mbostock/d3/wiki/Gallery

vxheavens archive: http://web.archive.org/web/20111103034748/http://vxheavens.com/vl.php?

http://blogs.cisco.com/security/transparency-transparency-transparency-and-trustworthy-systems/

http://blog.jgc.org/2013/04/how-i-coded-in-1985.html

http://ossmann.blogspot.ca/2013/05/introducing-daisho.html

http://cyberlaw.stanford.edu/blog/2013/07/mozilla-professors-scientists-researchers-stand-weev

Using meta-data to find Paul Revere: http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/

composition kills: http://www.veracode.com/blog/2013/05/executable-archaeology-the-case-of-the-stupid-thing-eating-all-my-ram/

modern advice for a software design and build process that supports more resilient code: http://blog.erratasec.com/2013/08/the-rob-test-12-steps-to-safer-code.html#.UgfU9mS-5GQ

http://www.coding2learn.org/blog/2013/07/29/kids-cant-use-computers/

Big Data

https://aws.amazon.com/datasets/

Wii

http://abstrakraft.org/cwiid/wiki/MotionPlus

http://dvdhrm.wordpress.com/xwiimote/

gdb manual: http://www.delorie.com/gnu/docs/gdb/gdb_toc.html#SEC_Contents

Privacy

http://justdelete.me/

http://www.volokh.com/2013/09/03/can-police-enter-property-marked-trespassing-signs-take-two/

http://www.forbes.com/sites/kashmirhill/2013/09/12/e-zpasses-get-read-all-over-new-york-not-just-at-toll-booths/

http://www.zdnet.com/a-new-secure-and-free-internet-dream-on-7000020322/

http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

Domain Specific Languages, Systems, etc. of Potential Security Interest

Cybersecurity Education and Vulns / Bugs

Bugs, bugs bugs bugs bugs...

Pub Venues

Stuff Where I Get Mentioned

Places / links where my work gets a shout-out