Now showing items 1-10 of 19
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce
The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Data leak detection aims at scanning content (in storage or transmission) for exposed sensitive ...
Applications and Security of Next-Generation, User-Centric Wireless Systems
Pervasive wireless systems have significantly improved end-users quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of ...
CCS 2017- Women in Cyber Security (CyberW) Workshop
The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
Storytelling Security: User-Intention Based Traffic Sanitization
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2010-12-01), TR-10-15
Device-Based Isolation for Securing Cryptographic Keys
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-21
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Enterprise data breach: causes, challenges, prevention, and future directions
A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
A Static Assurance Analysis of Android Applications
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-07-11), TR-13-03
We describe an efficient approach to identify malicious Android applications through specialized static program analysis. Our solution – referred to as user intention program dependence analysis – performs offline analysis ...
User-Centric Dependence Analysis For Identifying Malicious Mobile Apps
This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
Personal Anomaly Detection and Smart-Phone Security
(Virginia Tech, 2010-04-22)
Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...