scispace - formally typeset
Search or ask a question
Author

Nils Bruzelius

Bio: Nils Bruzelius is an academic researcher. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.

Papers
More filters
01 Jan 2013
TL;DR: Amnet militarteknik utgar fran att tekniska system ar officerens arbetsredskap och att en forstaelse for och kunskap om dessa verktyg ar central for att kunna utova professionen framgangsrikt as mentioned in this paper.
Abstract: Amnet militarteknik utgar fran att tekniska system ar officerens arbetsredskap och att en forstaelse for och kunskap om dessa verktyg ar central for att kunna utova professionen framgangsrikt. Denn ...

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article, a concept called Military Utility is proposed for the study of the use of technology in military operations, which is derived through conceptual analysis and is based on related concepts used in social sciences, the military domain and Systems Engineering.

19 citations

Proceedings ArticleDOI
06 Oct 2014
TL;DR: A model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data, concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations may also incur non-negligible risks of collateral damage and other societal costs.
Abstract: Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in protecting own systems and networks, cyber operations may also involve exploiting identified vulnerabilities for intelligence collection or to produce military effects. The weapon zing and stockpiling of such vulnerabilities by various actors, or even the intentional implantation into cyberspace infrastructure, is a trend that currently resembles an arms race. An open question is how to measure the utility that access to these exploitable vulnerabilities provides for military purposes, and how to contrast and compare this to the possible adverse societal consequences that withholding disclosure of them may result in, such as loss of privacy or impeded freedom of the press. This paper presents a case study focusing on the Heart bleed bug, used as a tool in an offensive cyber operation. We introduce a model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data. Our calculations show that reaching a global adoption of at least 50 % would take approximately three years from the time of release, given that the vulnerability remains undiscovered, while surpassing 75 % adoption would take an estimated four years. The paper concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations take time. They may also incur non-negligible risks of collateral damage and other societal costs.

8 citations