Sign up for ISW's Newsletter
Home
About Us

ISW News & Events

Text Library

Submit Your Paper
Contest
Recommended Reading
Contact Us
 

Subscribe to our monthly newsletter and receive updates on:
 
Security/Hack Challenges
ISW's Monthly Contest Prizes & Winners
Recommended Security Books & Reviews
Recently Published Papers
Click here to subscribe/unsubscribe!

Opt-in Terms | Archives
What is the top security concern you have today?
 
Virtual System Attacks
Cloud
Social Network
Web
Email
   

Best Security Papers of the Month Contest:

Contest FAQs

Prizes Catalog



Markus Jakobsson & Zulfikar Ramzan

Read the review here!
 

 

Past Winners

And The Winners Are...

Submissions | Contest FAQs | Prizes Catalog | Past Winners


Featured Feedback: Shaun Colley - April 2004 winner

Thanks for such a great project and competition in general. I believe this encourages hackers and security-enthusiasts alike to write interesting and technical papers for the entire community, whatever side of the fence you're on.


Past Winners: 2005

Month
Writer
Title
 
 
 
April
Anti Brute Force Resource Metering
April
Best Security Practice: Host Naming and URL Conventions
 
 
 
March
The Implementation of Passive Covert Channels in the Linux Kernel
March
 
 
 
 
February
Snort/Base Install Manual for Fedora Core 3
February
 
 
 
 
January
A solution against software piracy and IT sabotage
January
WebServices Security
 
 
 
 
 
 


Past Winners: 2004

Month
Writer
Title
     
December
Anti-Virus Evasion Techniques and Countermeasures
December
Installing a Virtual Honeywall using VMware
     
November
An Introduction to Linux Kernel Backdoors
November
LMCrack
     
October
   
October
   
     
September
Gunter Ollmann
The Phishing Guide
September
Mohammad Heidari
IPv6 Security Considerations
     
August
Bob Radvanovsky
I Know Something You Don't Know (Email Secrets)
August
Stijn Huyghe
OpenVPN 101: Introduction to OpenVPN
     
July
Securing Mac OS X
July
Shadow Software Attack
     
June
IT Security Event Management
June
Security Through Obscurity
     
May
An Overview of Common Programming Security Vulnerabilities and Possible Solutions
May
Proposing the role of Governance Director
     
April
April
     
March
Information Security & Negligence - Targeting the C-Class
March
Predictability of Windows DNS resolver
     
February
Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis
February
Identity Theft - The Real Cause
     
January
Adjacent Overwrite BUG
January
Improving Passive Packet Capture: Beyond Device Polling
     
     


Past Winners: 2003

Month
Writer
Title
     
December
Exploitation of Buffer Overflow Vulnerabilities Under Windows XP
December
The Anatomy of Cross Site Scripting
     
November
Human Factors in Information Security
November
Detecting Intrusions with your Firewall Log and OsHids
     
October
The Rise of the Spammers
October
The Future of IDS
     
September
Snort Install Manual
September
Smart Cards as Secure Corporate Badge?
     
August
Driftnet on WEPed wireless networks HOWTO
August
Covert Channel and Tunneling over the HTTP protocol detection
     
     

 

 


All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.