Sciweavers

JCS
2011
138views more  JCS 2011»
13 years 3 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
JCS
2011
91views more  JCS 2011»
13 years 7 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
JCS
2011
74views more  JCS 2011»
13 years 7 months ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
JCS
2011
156views more  JCS 2011»
13 years 7 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
JCS
2011
55views more  JCS 2011»
13 years 7 months ago
Tree-based HB protocols for privacy-preserving authentication of RFID tags
Tzipora Halevi, Nitesh Saxena, Shai Halevi
JCS
2011
72views more  JCS 2011»
13 years 7 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
JCS
2011
126views more  JCS 2011»
13 years 7 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
JCS
2011
87views more  JCS 2011»
13 years 7 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke