Skip to main content

Showing 1–3 of 3 results for author: Weitzner, D J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.04166  [pdf

    cs.CR cs.CY econ.GN stat.AP

    Mind the Gap: Securely modeling cyber risk based on security deviations from a peer group

    Authors: Taylor Reynolds, Sarah Scheffler, Daniel J. Weitzner, Angelina Wu

    Abstract: There are two strategic and longstanding questions about cyber risk that organizations largely have been unable to answer: What is an organization's estimated risk exposure and how does its security compare with peers? Answering both requires industry-wide data on security posture, incidents, and losses that, until recently, have been too sensitive for organizations to share. Now, privacy enhancin… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  2. arXiv:2402.01007  [pdf

    cs.CR econ.GN

    Municipal cyber risk modeling using cryptographic computing to inform cyber policymaking

    Authors: Avital Baral, Taylor Reynolds, Lawrence Susskind, Daniel J. Weitzner, Angelina Wu

    Abstract: Municipalities are vulnerable to cyberattacks with devastating consequences, but they lack key information to evaluate their own risk and compare their security posture to peers. Using data from 83 municipalities collected via a cryptographically secure computation platform about their security posture, incidents, security control failures, and losses, we build data-driven cyber risk models and cy… ▽ More

    Submitted 5 February, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

    Comments: Working Draft for Presentation at the Cybersecurity Law and Policy Scholars Conference - September 29, 2023

    MSC Class: K.6.5 and E.3

  3. arXiv:2107.04940  [pdf, other

    cs.CR

    You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries

    Authors: Jenny Blessing, Michael A. Specter, Daniel J. Weitzner

    Abstract: The security of the Internet rests on a small number of open-source cryptographic libraries: a vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first comprehensive analysis of c… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.