Sciweavers

USS
2008
13 years 9 months ago
Panic Passwords: Authenticating under Duress
Panic passwords allow a user to signal duress during authentication. We show that the well-known model of giving a user two passwords, a `regular' and a `panic' password...
Jeremy Clark, Urs Hengartner
USS
2008
13 years 9 months ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...
USS
2008
13 years 9 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
USS
2008
13 years 9 months ago
Research Challenges for the Security of Control Systems
In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirem...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
USS
2008
13 years 9 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
USS
2008
13 years 9 months ago
Bootstrapping Trust in a "Trusted" Platform
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in th...
Bryan Parno
USS
2008
13 years 9 months ago
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
Remote error analysis aims at timely detection and remedy of software vulnerabilities through analyzing runtime errors that occur on the client. This objective can only be achieve...
Rui Wang 0010, XiaoFeng Wang, Zhuowei Li
USS
2008
13 years 9 months ago
Towards Quantification of Network-Based Information Leaks via HTTP
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today�...
Kevin Borders, Atul Prakash
USS
2008
13 years 9 months ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
USS
2008
13 years 9 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer