Skip to main content

Showing 1–5 of 5 results for author: Chowdhury, P D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15210  [pdf, other

    cs.CR

    Assessing Effectiveness of Cyber Essentials Technical Controls

    Authors: Priyanka Badva, Partha Das Chowdhury, Kopo M. Ramokapane, Barnaby Craggs, Awais Rashid

    Abstract: Cyber Essentials (CE) comprise a set of controls designed to protect organisations, irrespective of their size, against cyber attacks. The controls are firewalls, secure configuration, user access control, malware protection & security update management. In this work, we explore the extent to which CE remains robust against an ever-evolving threat landscape. To that end, we reconstruct 45 breaches… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: We have submitted this paper in ACM Digital Threats: Research and Practice (DTRAP) Journal. The paper is currently in the review process

  2. arXiv:2307.02332  [pdf, other

    cs.HC cs.CY

    Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities

    Authors: Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Michalec, Emily Johnstone, Emily Godwin, Alicia G Cork, Awais Rashid

    Abstract: The phrase "online harms" has emerged in recent years out of a growing political willingness to address the ethical and social issues associated with the use of the Internet and digital technology at large. The broad landscape that surrounds online harms gathers a multitude of disciplinary, sectoral and organizational efforts while raising myriad challenges and opportunities for the crossing entre… ▽ More

    Submitted 19 July, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: 21 pages, 8 figures, to appear in The 26th ACM Conference On Computer-Supported Cooperative Work And Social Computing. October 13-18, 2023. Minneapolis, MN USA

  3. arXiv:2301.05653  [pdf, other

    cs.CR

    Threat Models over Space and Time: A Case Study of E2EE Messaging Applications

    Authors: Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross Anderson, Awais Rashid

    Abstract: Threat modelling is foundational to secure systems engineering and should be done in consideration of the context within which systems operate. On the other hand, the continuous evolution of both the technical sophistication of threats and the system attack surface is an inescapable reality. In this work, we explore the extent to which real-world systems engineering reflects the changing threat co… ▽ More

    Submitted 28 May, 2023; v1 submitted 13 January, 2023; originally announced January 2023.

  4. arXiv:2211.02341  [pdf, other

    cs.SE

    Better Call Saltzer \& Schroeder: A Retrospective Security Analysis of SolarWinds \& Log4j

    Authors: Partha Das Chowdhury, Mohammad Tahaei, Awais Rashid

    Abstract: Saltzer \& Schroeder's principles aim to bring security to the design of computer systems. We investigate SolarWinds Orion update and Log4j to unpack the intersections where observance of these principles could have mitigated the embedded vulnerabilities. The common principles that were not observed include \emph{fail safe defaults}, \emph{economy of mechanism}, \emph{complete mediation} and \emph… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  5. arXiv:2202.08548  [pdf, other

    cs.CY

    From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs

    Authors: Partha Das Chowdhury, Andres Dominguez, Kopo M. Ramokapane, Awais Rashid

    Abstract: The wider adoption of PETs has relied on usability studies, which focus mainly on an assessment of how a specified group of users interface, in particular contexts, with the technical properties of a system. While human centred efforts in usability aim to achieve important technical improvements and drive technology adoption, a focus on the usability of PETs alone is not enough. PETs development a… ▽ More

    Submitted 29 September, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

    Comments: 16 Pages, 2 Figures

    MSC Class: NA ACM Class: K.4