This
index covers articles that appeared in LWN on various security-related
topics. Articles from 2007 on are indexed here.
Anonymity
Eavesdropping on Tor traffic
(September 12, 2007)
AppArmor
Linux security non-modules and
AppArmor (June 27, 2007)
The future of AppArmor
(October 17, 2007)
TOMOYO Linux and pathname-based
security (April 14, 2008)
Application
binary interface (ABI)
Cascading security updates
(February 27, 2008)
Authentication
Biometric
Fingerprint recognition using
fprint (November 21, 2007)
Biometrics for identification
(April 2, 2008)
Bypass
Authentication bypass in routers
(March 5, 2008)
Backdoors
The backdooring of WordPress
(March 7, 2007)
The backdooring of SquirrelMail
(December 19, 2007)
Berkeley
Internet Name Daemon (BIND)
Cache poisoning vulnerability
found in BIND (July 25, 2007)
The dangers of weak random
numbers (February 20, 2008)
Books
Book Review: Hacking VoIP
(January 28, 2009)
Botnets
Storm worm gains strength
(August 29, 2007)
ITU getting serious about
botnets (November 28, 2007)
Storm botnet used to study spam
(November 12, 2008)
Browser
cookies
Session cookies for web
applications (May 21, 2008)
Another kind of cookie
(October 29, 2008)
Bug
reporting
Counting vulnerabilities
(June 22, 2007)
Cascading security updates
(February 27, 2008)
Secrecy and the DNS flaw
(July 9, 2008)
Injunction lifted against MIT
students (August 20, 2008)
Partial disclosure (October
8, 2008)
Distribution advisories
(November 26, 2008)
"Vishing" advisory targets
Asterisk (December 17, 2008)
CAPTCHA
Breaking CAPTCHA (March 19,
2008)
CERT
GCC and pointer overflows
(April 16, 2008)
Certifications
Red Hat and IBM get certified
(June 20, 2007)
Fedora and CAPP (December
10, 2008)
chroot()
What chroot() is really for
(October 3, 2007)
Cross-site
scripting (XSS)
Extended Validation
certificates and cross-site scripting (March 12, 2008)
Detecting
vulnerabilities
Capturing web attacks with open
proxy honeypots (July 3, 2007)
Distributions
ParanoidLinux: from fiction to
reality (October 1, 2008)
Distribution
security
LCA: How to improve Debian
security (January 17, 2007)
Security hardening for Debian
(February 6, 2008)
Eee PC security or lack thereof
(February 13, 2008)
Debian, OpenSSL, and a lack of
cooperation (May 14, 2008)
Debian vulnerability has
widespread effects (May 14, 2008)
SELinux and Fedora (July 9,
2008)
Ubuntu, security response, and
community contributions (July 16, 2008)
Fedora distributes new keys
(September 10, 2008)
Distribution advisories
(November 26, 2008)
Fedora and CAPP (December
10, 2008)
Package
managers
Trust and mirrors (July 16,
2008)
Document
Object Model (DOM)
Finding bugs lurking in the DOM
(January 30, 2008)
Leaking browser history
(June 25, 2008)
Domain
Name System (DNS)
Cache
poisoning
Cache poisoning vulnerability
found in BIND (July 25, 2007)
Secrecy and the DNS flaw
(July 9, 2008)
Details of the DNS flaw revealed
(August 13, 2008)
Email
Spam
prevention
Backscatter increase clogs
inboxes (April 9, 2008)
Encryption
DMCA
Another attempt at DMCA reform
- sort of (February 28, 2007)
Email
Email privacy (November 7,
2007)
Filesystems
The Tahoe secure filesystem
(April 30, 2008)
Web
The future of unencrypted web
traffic (January 2, 2008)
Deep packet inspection
(July 23, 2008)
Firefox
Firefox security status
(June 7, 2007)
Firefox 3 SSL certificate
warnings (August 27, 2008)
Firefox security add-ons
(January 21, 2009)
GCC
GCC and pointer overflows
(April 16, 2008)
Hardening
Security hardening for Debian
(February 6, 2008)
Hardware
Attacking network cards
(May 28, 2008)
Hijacking
X
programs
OpenSSH bug falls through the
cracks (April 9, 2008)
Identity
management
Bandit: multi-protocol identity
management (September 26, 2007)
OpenID 2.0 closing in on
acceptance (October 31, 2007)
Information
leak
Our devices are spilling our
secrets (August 1, 2007)
Integrity
management
Integrity management in the
kernel (March 28, 2007)
System integrity in Linux
(December 3, 2008)
Internet
SCADA system vulnerabilities
(June 11, 2008)
Deep packet inspection
(July 23, 2008)
Honeypots
Capturing web attacks with open
proxy honeypots (July 3, 2007)
Routers
Home routers and security flaws
(October 10, 2007)
The
Onion Router (Tor)
Eavesdropping on Tor traffic
(September 12, 2007)
Voice
over IP (VoIP)
The Skype outage (August
22, 2007)
"Vishing" advisory targets
Asterisk (December 17, 2008)
Book Review: Hacking VoIP
(January 28, 2009)
Jails
What chroot() is really for
(October 3, 2007)
_javascript_
Web security vulnerabilities
and _javascript_ (January 23, 2008)
Linux
kernel
revoke() returns (December
18, 2007)
vmsplice(): the making of a
local root exploit (February 12, 2008)
The rest of the vmsplice()
exploit story (March 4, 2008)
Handling kernel security
problems (July 16, 2008)
Kernel security, year to date
(September 9, 2008)
System calls and rootkits
(September 10, 2008)
DR rootkit released under the
GPL (September 10, 2008)
The future for grsecurity
(January 7, 2009)
Credentials
Credential records
(September 25, 2007)
Linux/POSIX
capabilities
LCA: How to improve Debian
security (January 17, 2007)
Fixing CAP_SETPCAP (October
31, 2007)
Restricting root with
per-process securebits (April 30, 2008)
Filesystem capabilities in
Fedora 10 (January 7, 2009)
Random
number generation
On entropy and randomness
(December 12, 2007)
Virtual
file system (VFS)
A kernel security hole
(January 16, 2008)
Linux
Security Modules (LSM)
Linux security non-modules and
AppArmor (June 27, 2007)
Smack for simplified access
control (August 8, 2007)
SMACK meets the One True
Security Module (October 2, 2007)
The future of AppArmor
(October 17, 2007)
LSM: loadable or static?
(October 24, 2007)
Kernel-based malware scanning
(December 4, 2007)
TOMOYO Linux and pathname-based
security (April 14, 2008)
OLS: Smack for embedded devices
(August 6, 2008)
Snet and the LSM API
(January 28, 2009)
Mobile
phones
Android's first vulnerability
(November 5, 2008)
Android application security
(February 4, 2009)
Networking
Filesystems
The Tahoe secure filesystem
(April 30, 2008)
Obfuscation
Hiding open ports with shimmer
(January 9, 2008)
Wireless
USB device authorization
(July 17, 2007)
One
Laptop Per Child (OLPC)
Bitfrost: the OLPC security
model (February 7, 2007)
OLPC's software update problem
(July 3, 2007)
OpenOffice.org
BadBunny? Only if you invite it
in (June 12, 2007)
OpenSSH
OpenSSH bug falls through the
cracks (April 9, 2008)
OpenSSH and keystroke timings
(September 17, 2008)
SSH plaintext recovery
vulnerability (November 19, 2008)
OpenSSL
Debian, OpenSSL, and a lack of
cooperation (May 14, 2008)
Debian vulnerability has
widespread effects (May 14, 2008)
Organizations
oCERT and oss-security
(June 4, 2008)
PHP
Tools
Scanning for PHP
vulnerabilities with Pixy (June 27, 2007)
PostgreSQL
SE-PostgreSQL uses SELinux for
database security (July 18, 2007)
Privacy
Our devices are spilling our
secrets (August 1, 2007)
Eavesdropping on Tor traffic
(September 12, 2007)
Email privacy (November 7,
2007)
Another kind of cookie
(October 29, 2008)
Race
conditions
Exploiting races in system call
wrappers (August 15, 2007)
Exploiting symlinks and tmpfiles
(September 19, 2007)
Random
number generation
On entropy and randomness
(December 12, 2007)
The dangers of weak random
numbers (February 20, 2008)
Debian, OpenSSL, and a lack of
cooperation (May 14, 2008)
Debian vulnerability has
widespread effects (May 14, 2008)
Reference
The Application Security Desk
Reference (June 18, 2008)
Research
Auctions
Security research: buy low,
sell high? (July 11, 2007)
Rootkits
System calls and rootkits
(September 10, 2008)
DR rootkit released under the
GPL (September 10, 2008)
Ruby
Ruby security flaws expose
release process problems (July 2, 2008)
Samba
Eee PC security or lack thereof
(February 13, 2008)
Secure
Sockets Layer (SSL)
Certificates
Extended Validation
certificates and cross-site scripting (March 12, 2008)
Firefox 3 SSL certificate
warnings (August 27, 2008)
SSL man-in-the-middle attacks
(December 24, 2008)
SSL certificates and MD5
collisions (January 14, 2009)
Security
Enhanced Linux (SELinux)
SE-PostgreSQL uses SELinux for
database security (July 18, 2007)
SELinux and Fedora (July 9,
2008)
OLS: SELinux from academia to
your desktop (July 30, 2008)
Newer kernels and older SELinux
policies (September 24, 2008)
SELinux permissive domains
(October 15, 2008)
Signing
code
Java cryptography and free
distributions (March 14, 2007)
Integrity management in the
kernel (March 28, 2007)
Spam
Backscatter increase clogs
inboxes (April 9, 2008)
Storm botnet used to study spam
(November 12, 2008)
Talpa
Kernel-based malware scanning
(December 4, 2007)
The TALPA molehill (August
6, 2008)
TALPA strides forward
(August 27, 2008)
TOMOYO
Linux
TOMOYO Linux and pathname-based
security (April 14, 2008)
Tools
Access
control
Smack for simplified access
control (August 8, 2007)
Browser
exploit detection
Finding bugs lurking in the DOM
(January 30, 2008)
Firewall
All aboard the SmoothWall
Express (August 29, 2007)
Hiding open ports with shimmer
(January 9, 2008)
Password
guessing prevention
Preventing brute force ssh
attacks (October 24, 2007)
Penetration
testing
Mobile phone or penetration
tool? (September 24, 2008)
PHP
code scanning
Scanning for PHP
vulnerabilities with Pixy (June 27, 2007)
Policy
management
Centralizing policy rules with
PolicyKit (November 14, 2007)
SQL
injection scanning
Find SQL injection
vulnerabilities with sqlmap (September 3, 2008)
Voting
machines
Securing our votes (August
8, 2007)
Voting machine integrity
through transparency (March 26, 2008)
Vulnerabilities
Authentication
bypass
Authentication bypass in routers
(March 5, 2008)
Cross-site
request forgery (CSRF)
Cross-site request forgery
(October 17, 2007)
Cryptographic
splicing
Cryptographic splicing makes
for a Wordpress vulnerability (May 7, 2008)
HTTP
response splitting
HTTP response splitting
(October 17, 2008)
Image
handling
Image handling vulnerabilities
(April 23, 2008)
Macro
language (ab)use
BadBunny? Only if you invite it
in (June 12, 2007)
Privilege
escalation
vmsplice(): the making of a
local root exploit (February 12, 2008)
The rest of the vmsplice()
exploit story (March 4, 2008)
Standards, the kernel, and
Postfix (August 20, 2008)
Race
conditions
Exploiting races in system call
wrappers (August 15, 2007)
SQL
injection
Find SQL injection
vulnerabilities with sqlmap (September 3, 2008)
Temporary
files
Exploiting symlinks and tmpfiles
(September 19, 2007)
Web
application flaws
The backdooring of WordPress
(March 7, 2007)
Home routers and security flaws
(October 10, 2007)
Cross-site request forgery
(October 17, 2007)
The backdooring of SquirrelMail
(December 19, 2007)
Web security vulnerabilities
and _javascript_ (January 23, 2008)
Cryptographic splicing makes
for a Wordpress vulnerability (May 7, 2008)
Web
browsers
Leaking browser history
(June 25, 2008)
Web
sessions
Session cookies for web
applications (May 21, 2008)