Decentralized Cyberattack Attribution
Abstract Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in public attributions in recent years has proven that attrib…
Abstract Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in public attributions in recent years has proven that attrib…
"As we become an increasingly digitally connected world, the loss of privacy and security are almost inevitable. But if we don’t adopt stronger data securi…
n 2017, Rudolph W. Giuliani was named as a cybersecurity adviser to President Trump. This was widely seen as a consolation prize. Giuliani had been in charge of…
On November 4, 2016, the hacker “Guccifer 2.0,” a front for Russia’s military intelligence service, claimed in a blogpost that the Democrats were likely to use…
Abstract Existing approaches to cybersecurity emphasize either international state-to-state logics (such as deterrence theory) or the integrity of individual i…
Democracy is an information system. That's the starting place of our new paper: “Common-Knowledge Attacks on Democracy.” In it, we look at democracy throug…
Richard Forno, director of the graduate cybersecurity program and assistant director of the Center for Cybersecurity at the University of Maryland, Baltimore Co…
On May 24, 1844, a crowd gathered inside the United States Supreme Court chambers in the basement of the Capitol, eagerly awaiting a demonstration of an amazing…
As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence th…
"Some legislators are almost proud of their luddism, tech policy experts say. ”There are people on Capitol Hill who do not use email. How could you vote on…
Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to kno…
In the drumbeat of reports about Russian attempts to undermine U.S. democratic institutions with trolls, Twitter bots and cyberattacks on congressional candidat…