Now showing items 39-58 of 88

    • Identifying Native Applications with High Assurance 

      Almohri, Hussain M. J.; Yao, Danfeng (Daphne); Kafura, Dennis G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011), TR-11-20
      The work described in this paper investigates the problem of identifying and deterring stealthy malicious processes on a host. We point out the lack of strong application iden- tication in main stream operating systems. ...
    • Implementing an IPv6 Moving Target Defense on a Live Network 

      Dunlop, Matthew; Groat, Stephen; Marchany, Randy; Tront, Joseph (Cyber-Physical Systems Virtual Organization, 2012)
      The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
    • Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid 

      Sherburne, Matthew; Marchany, Randy; Tront, Joseph (ACM Press, 2014)
      The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
    • Indexing the Darknet 

      Owenson, Gareth (Virginia Tech, 2018-05-18)
      This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
    • Intrusion Detection System for Applications using Linux Containers 

      Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
      Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
    • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

      Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
      We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
    • LTE PHY Layer Vulnerability Analysis and Testing Using Open-Source SDR Tools 

      Rao, R. M.; Ha, S.; Marojevic, Vuk; Reed, J. H.
      This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual ...
    • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers 

      Gang, Wang; Wang, Tianyi; Zheng, Haitao; Zhao, Ben Y. (USENIX, 2014-08)
      Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived ...
    • Measuring and Analyzing Online Anonymous Marketplaces 

      Christin, Nicolas (Virginia Tech, 2018-05-18)
      This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
    • Measuring the Insecurity of Mobile Deep Links of Android 

      Lui, Fang; Wang, Chun; Pico, Andres; Yao, Danfeng; Wang, Gang (USENIX, 2017-08)
      Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
    • Medical Monitoring Applications for Wearable Computing 

      Raskovic, Dejan; Martin, Thomas; Jovanov, Emil (The British Computer Society, 2004-04-01)
      Medical monitors have benefited from technological advances in the field of wireless communication, processing and power sources. These advances have made possible miniaturization and prolonged operating times of medical ...
    • Microblogging in Crisis Situations: Mass Protests in Iran, Tunisia, Egypt 

      Kavanaugh, Andrea L.; Yang, Seungwon; Li, Lin T.; Sheetz, Steven D.; Fox, Edward A. (2011-05-01)
      In this paper we briefly examine the use of Twitter in Iran, Tunisia and Egypt during the mass political demonstrations and protests in June 2009, December 2010 and January 2011 respectively. We compare this usage with ...
    • Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation 

      Krishan, Neelima; Hitefield, Seth; Clancy, T. Charles; McGwier, Robert W.; Tront, Joseph G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-06-28), TR-13-02
      We propose and detail a system called multipersona Hypovisors for providing light-weight isolation for enhancing security on Multipersona mobile devices, particularly with respect to the current memory constraints of these ...
    • Network Security Data Analytics Architecture for Logged Events 

      DeYoung, Mark E.; Marchany, Randy; Tront, Joseph (2017-01-04)
      Data-driven network security and information security efforts have decades long history. The deluge of logged events from network mid-points and end-points coupled with unprecedented temporal depth in data retention are ...
    • Personal Anomaly Detection and Smart-Phone Security 

      Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
      Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
    • Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security 

      La Pan, Matthew J.; Clancy, Charles T.; McGwier, Robert W. (Wiley, 2014-08-18)
      Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
    • A policy review of the impact existing privacy principles have on current and emerging transportation safety technology 

      Pethtel, Ray D.; Phillips, James D.; Hetherington, Gene (Virginia Tech. Virginia Tech Transportation Institute, 2011-05-12)
      Ensuring the safety of travelers by the use of technology, and protecting the personal information that is collected for those applications, is an important transportation policy concern. Perceptions of an abuse of privacy ...
    • Pricing a Protest: Forecasting the Dynamics of Civil Unrest Activity in Social Media 

      Goode, Brian J.; Krishnan, Siddharth; Roan, Michael; Ramakrishnan, Naren (PLOS, 2015-10-06)
      Online social media activity can often be a precursor to disruptive events such as protests, strikes, and “occupy” movements.We have observed that such civil unrest can galvanize supporters through social networks and help ...
    • Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records): U.S. and EU Compared 

      Hiller, Janine S.; McMullen, Matthew S.; Chumney, Wade M.; Baumer, David L. (Boston University School of Law, 2011)
      The importance of the adoption of Electronic Health Records (EHRs) and the associated cost savings cannot be ignored as an element in the changing delivery of health care. However, the potential cost savings predicted in ...