All Images
Research News
Cyber-defense and forensic tool turns 20
The interactive Tree of Trust diagram helps clients identify malicious certificates by providing a third-party perspective on what they should expect to receive from a server.
Credit: ICSI
Download the high-resolution JPG version of the image. (3.0 MB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
The Bro Network Security Monitor provides a comprehensive platform for network traffic analysis. Well grounded in more than 15 years of research, Bro has successfully bridged the gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyberinfrastructure. Bro's user community includes major universities, research labs, supercomputing centers and open-science communities.
Credit: Bro
Download the high-resolution JPG version of the image. (403.6 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
Blue Waters, one of the most powerful supercomputers in the world, uses Bro to protect its network.
Credit: NCSA, University of Illinois at Urbana-Champaign
Download the high-resolution JPG version of the image. (970.3 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
Vern Paxson, a professor of computer science at the UC - Berkeley and leader of the Networking and Security Group at ICSI.
Credit: Vern Paxson
Download the high-resolution JPG version of the image. (419.3 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.