Now showing items 1-5 of 5
Keystroke-Dynamics Authentication Against Synthetic Forgeries
We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
Personal Anomaly Detection and Smart-Phone Security
(Virginia Tech, 2010-04-22)
Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
User-Behavior Based Detection of Infection Onset
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2010), TR-10-09
A major vector of computer infection is through exploiting software or design flaws in networked applications such as the browser. Malicious code can be fetched and executed on a victim’s machine without the user’s permission, ...
Storytelling Security: User-Intention Based Traffic Sanitization
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2010-12-01), TR-10-15
Malicious software (malware) with decentralized communication infrastructure, such as peer-to-peer botnets, is difficult to detect. In this paper, we describe a traffic-sanitization method for identifying malware-triggered ...
Applications and Security of Next-Generation, User-Centric Wireless Systems
Pervasive wireless systems have significantly improved end-users quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of ...