Sciweavers

USS
2008
14 years 2 months ago
An Empirical Security Study of the Native Code in the JDK
It is well known that the use of native methods in Java defeats Java's guarantees of safety and security, which is why the default policy of Java applets, for example, does n...
Gang Tan, Jason Croft
USS
2008
14 years 2 months ago
Measurement and Classification of Humans and Bots in Internet Chat
The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to distribute spam and malwa...
Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haini...
USS
2008
14 years 2 months ago
An Improved Clock-skew Measurement Technique for Revealing Hidden Services
The Tor anonymisation network allows services, such as web servers, to be operated under a pseudonym. In previous work Murdoch described a novel attack to reveal such hidden servi...
Sebastian Zander, Steven J. Murdoch
USS
2008
14 years 2 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron
USS
2008
14 years 2 months ago
Selective Versioning in a Secure Disk System
Making vital disk data recoverable even in the event of OS compromises has become a necessity, in view of the increased prevalence of OS vulnerability exploits over the recent yea...
Swaminathan Sundararaman, Gopalan Sivathanu, Erez ...
USS
2008
14 years 2 months ago
Highly Predictive Blacklisting
The notion of blacklisting communication sources has been a well-established defensive measure since the origins of the Internet community. In particular, the practice of compilin...
Jian Zhang, Phillip A. Porras, Johannes Ullrich
USS
2008
14 years 2 months ago
Reverse-Engineering a Cryptographic RFID Tag
Karsten Nohl, David Evans, Starbug, Henryk Plö...
USS
2008
14 years 2 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
USS
2008
14 years 2 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach