Privacy Conferences
Security Conferences: Computer Security Conference Ranking and Statistic by Guofei Gu
Here is a great link to a list of security conferences and their proposed ranking by Guofei Gu.
Graduate Students – Master of Science Thesis Word Template
Here is a Word template for a Master of Science (M.S.) Thesis that satisfies the Graduate School requirements. Disclaimer: The Graduate Schools does change requirements so check with them before writing and submitting a thesis.
Hardware Security – Introduction to Hardware Security and Trust book
I helped co-author a chapter in a book on hardware security that is listed below. A few universities are using it as a textbook in senior-level or graduate-level classes related to hardware security. If you are interested in a particular chapter, you can purchase online access to an individual chapter.
Introduction to Hardware Security and Trust, Mohammad Tehranipoor and Cliff Wang, Eds. New York: Springer, 2012. ISBN 978-1-4419-8079-3 or e-ISBN 978-1-4419-8080-9. Website
Hardware Security – Trust-hub.org
I met with Mohammad Tehranipoor today. We can no longer trust the hardware and just focus on software or network security. The IC chips today are composed of different cores from multiple suppliers that you may or may not trust. A core is a blueprint on how to perform a function in hardware. An attacker could add extra circuits to the IC chip to do an extra unanticipated function like shutting down when given a special code. Trust-hub.org focuses on this emerging area of hardware security.
Windows 7 – Enable Telnet
Windows 7 does not have telnet enabled by default. Some legacy equipment may need telnet, especially when first configuring it.
Here are the steps.
- Click on “Start”.
- Click on “Control Panel”.
- Click on “Program and Features”.
- Click on “Turn Windows Features on or off”.
- Check “Telnet Client” and click “ok”.
2012 British Car Show
I went to a British Car Show today. It was a beautiful day to see some wonderful cars. For more pictures, see here.