Avoiding The Top Ten Software Security Design Flaws

Building Code for Medical Device Software Security

Carl Landwehr and Tom Haigh detail a building code for software security that will the reduce the vulnerabilities of their system to malicious attackers. Read more

Special Report: Cybersecurity

The Institute features in-depth articles on the IEEE Cybersecurity Initiative, such as resources, career advice and conferences to watch.

The March issue of The Institute features in-depth articles on the IEEE Cybersecurity Initiative, such as resources, career advice and conferences to watch.

Featured Article

A Denial of Service Attack to UMTS Networks: Using SIM-Less Devices from Transactions on Dependable and Secure Computing
A fundamental security element in cellular networks is the authentication procedure performed by means of the Subscriber Identity Module (SIM) which is required to grant access to network services and, hence, protect the network from unauthorized usage.

We present a new kind of denial-of-service attack based on properly crafted SIM-less devices that, without any kind of authentication and by exploiting some specific features and performance bottlenecks of the UMTS network attachment process, are potentially capable of introducing significant service degradation up to disrupting large sections of the cellular network coverage.

Read more (pdf) »