Sciweavers

JDFP
2006
63views more  JDFP 2006»
13 years 11 months ago
Heuristic Security-Testing Methods
John E. Kerivan
JDFP
2006
49views more  JDFP 2006»
13 years 11 months ago
Exploration
Mark Pollitt
JDFP
2006
139views more  JDFP 2006»
13 years 11 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
JDFP
2006
109views more  JDFP 2006»
13 years 11 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
JDFP
2006
98views more  JDFP 2006»
13 years 11 months ago
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories
We describe a new type of threat to the Internet infrastructure, in the shape of a highly efficient but very well camouflaged click-fraud attack on the advertising infrastructure....
Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz