{"id":1372,"date":"2013-12-28T18:07:17","date_gmt":"2013-12-28T17:07:17","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1372"},"modified":"2024-10-14T13:30:20","modified_gmt":"2024-10-14T11:30:20","slug":"assorted-links-compsec-3","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2013\/12\/28\/assorted-links-compsec-3\/","title":{"rendered":"Assorted Links (CompSec)"},"content":{"rendered":"<ul>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.nber.org\/chapters\/c13002.pdf\" target=\"_blank\" rel=\"noopener\">The Nature and Incidence of Software Piracy \u2014 Evidence from Windows 7<\/a>:&nbsp;I\u2019ve read many petty studies on software piracy, but this is the first well-research one.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.acsac.org\/2012\/openconf\/modules\/request.php?module=oc_program&amp;action=view.php&amp;a=&amp;id=252&amp;type=4&amp;OPENCONF=c6c60b8edbdabf15845a6cdbb3a0fd47\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">A History of Security Economics<\/a>:&nbsp;an interesting perspective from the author of <a href=\"http:\/\/www.cl.cam.ac.uk\/~rja14\/book.html\" target=\"_blank\" rel=\"noopener\">Security Engineering<\/a>.<\/li>\n<li style=\"text-align: justify;\">From Berkeley, some good empirical studies on computer security:&nbsp;<a href=\"http:\/\/www.cs.berkeley.edu\/~daw\/papers\/coderev-essos13.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">An Empirical Study of the Effectiveness of Security Code Review<\/a> <span class=\"amp\">&amp;<\/span>&nbsp;<a href=\"http:\/\/www.cs.berkeley.edu\/~daw\/papers\/vrp-use13.pdf\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">An Empirical Study of Vulnerability Rewards Programs<\/a>.<\/li>\n<li style=\"text-align: justify;\"><a href=\"\/\/cacm.acm.org\/magazines\/2014\/1\/170850-french-team-invents-faster-code-breaking-algorithm\/fulltext\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">French Team Invents Faster Code-Breaking Algorithm<\/a>: I like the sincerity about the heuristics of the algorithm, even when the article is promotional.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/ethanheilman.tumblr.com\/post\/70646748808\/a-brief-history-of-nsa-backdoors\" target=\"_blank\" rel=\"noopener\">A Brief History of <span class=\"caps\">NSA<\/span> Backdoors<\/a>: and it\u2019s indeed brief. There is so much the public doesn\u2019t know&nbsp;about\u2026<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Nature and Incidence of Software Piracy \u2014 Evidence from Windows 7:&nbsp;I\u2019ve read many petty studies on software piracy, but this is the first well-research one. A History of Security Economics:&nbsp;an interesting perspective from the author of Security Engineering. From Berkeley, some good empirical studies on computer security:&nbsp;An Empirical Study of the Effectiveness of Security&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,18],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1372"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1372"}],"version-history":[{"count":4,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1372\/revisions"}],"predecessor-version":[{"id":1539,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1372\/revisions\/1539"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1372"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}