addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo


Meetup no longer supports file uploading. To upload photos, please use the Photos section of your Meetup group; for other file types, we recommend that you use another service, many of which are mobile-friendly and free, such as Dropbox or Google Drive.

Files that have been previously uploaded are still accessible below. We recommend that you save any files that you want to keep to your computer.

Name/Description Type Size Uploaded By Uploaded On


This paper describes a way to decompose attacks into phases, and a methodology to describe and analyze intrusions. I have a feeling that no further work from them will be made public. Very interesting approach, but not fully developed.

Adobe Acrobat file 1.2M Marcin A. Jun 19, 2012


MS Research strikes back, explaining why, regardless of the seemingly horrid state of computer security, not everyone is recording losses from breaches and other incidents. A very good paper.

Adobe Acrobat file 282K Marcin A. Jun 19, 2012


The paper investigates which data breaches are being litigated and which are being settled, with interesting data. This is very useful material for folks with insane security policies and an in house counsel.

Adobe Acrobat file 222K Marcin A. Jun 19, 2012


Here researchers from Microsoft Research single handedly prove that security surveys are mostly FUD, and often very bad science. This paper is another classic, very readable even though it talks about sampling and distributions.

Adobe Acrobat file 420K Marcin A. Jun 18, 2012


Paper reviewing Unix password security by Robert Morris and Ken Thompson. They mention key strengthening (salts), algorithms designed to ensure slow key-derivation (key stretching), and timing attacks. All in one, in 1979.

Adobe Acrobat file 436K Marcin A. Jun 18, 2012


Measuring the Cost of Cybercrime sets out to debunk the scaremongering around online crime that governments and defence contractors are using to justify everything from increased surveillance to preparations for cyberwar. By Ross Anderson, et all.

Adobe Acrobat file 338K Marcin A. Jun 18, 2012

While has scanned these files for viruses, we recommend that you have up-to-date virus-scanning software on your own computer as well.

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy