Beware of the Security Software

Abstract In the past, security software was gener-ally developed by security experts and had a quite limited distribution, as it was mostly used in servers. However, the demand for many kinds of security software has increased in recent years as domestic and desktop users have become aware of the numerous security menaces. This has favored the flourish of many security appli-cations that, unfortunately, do not do what they claim. Some of these applications pro-vide little more than a false sense of secu-rity. This article evaluates one of these applications and cites other examples that point out a very simple, but commonly for-gotten, maxim: beware of any software's security claims, particularly security software.

[1]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[2]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[3]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[4]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[5]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[6]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[7]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.