Cyber Weapons Storage Mechanisms

  • Muhammd Mudassar YaminEmail author
  • Basel Katt
  • Mazaher Kianpour
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)


In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in case of losing controls of such weapons. Existing methods are summarized and new techniques which are currently under development are described. Some of the current limitations and challenges are also identified. To tackle these challenges, we propose a socio-technical framework, in which Cyber Ranges can play a major role.


Cyber Weapon Storage Vulnerabilities Exploits 


  1. 1.
    Schmitt, M.N.: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)CrossRefGoogle Scholar
  2. 2.
    Jesson, J., Matheson, L., Lacey, F.M.: Doing Your Literature Review: Traditional and Systematic Techniques. Sage, London (2011)Google Scholar
  3. 3.
    Zschoch, M.A.: Configurational comparative methods: qualitative comparative analysis (QCA) and related techniques. Edited by Rihoux, B., Ragin, C., pp. xxv. Sage Publications, Thousand Oaks (2009). Canadian Journal of Political Science/Revue canadienne de science politique, 44(3), 743–746, 2011Google Scholar
  4. 4.
    Kowalski, S.: It insecurity: a multi-disciplinary inquiry (1996)Google Scholar
  5. 5.
    Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120–124 (2013)CrossRefGoogle Scholar
  6. 6.
    Schwartz, A., Knake, R.: Belfer Center for Science, and International Affairs. Government’s Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process. Harvard Kennedy School, Belfer Center for Science and International Affairs (2016)Google Scholar
  7. 7.
    Tripathi, A., Singh, U.K.: Taxonomic analysis of classification schemes in vulnerability databases. In: 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 686–691. IEEE (2011)Google Scholar
  8. 8.
    Baram, G., Cohen, D., Shapira, Z., Wechsler, O., Hight, N., Ben-Israel, I.: 2017 strategic trends in the global cyber conflict (2018)Google Scholar
  9. 9.
    Shane, S., Perlroth, N., Sanger, D.E.: Security breach and spilled secrets have shaken the NSA to its core. New York Times, 12 November 2017Google Scholar
  10. 10.
    Nurse, J.R.C., et al: Understanding insider threat: A framework for characterising attacks. In: IEEE Security and Privacy Workshops, pp. 214–228. IEEE (2014)Google Scholar
  11. 11.
    Chaudhry, P.E.: The looming shadow of illicit trade on the internet. Bus. Horiz. 60(1), 77–89 (2017)CrossRefGoogle Scholar
  12. 12.
    Yamin, M.M., Katt, B.: Inefficiencies in cyber-security exercises life-cycle: a position paper. In: CEUR Workshop Proceedings, vol. 2269, pp. 41–43 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Muhammd Mudassar Yamin
    • 1
    Email author
  • Basel Katt
    • 1
  • Mazaher Kianpour
    • 1
  1. 1.Norwegian University of Science and TechnologyGjøvikNorway

Personalised recommendations