Now showing items 21-40 of 88

    • Applying differential association theory to online hate groups: a theoretical statement 

      Hawdon, James (Social and Economic Research Association of the Turku Universities, 2012)
      In this paper, I will consider how social media can nurture and encourage mass murder within a framework of one of the most prominent and widely supported criminological theories: differential association. I will briefly ...
    • Device-Based Isolation for Securing Cryptographic Keys 

      Elish, Karim O.; Deng, Yipan; Yao, Danfeng (Daphne); Kafura, Dennis G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-21
    • User-Centric Dependence Analysis For Identifying Malicious Mobile Apps 

      Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G. (IEEE, 2012)
      This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
    • Implementing an IPv6 Moving Target Defense on a Live Network 

      Dunlop, Matthew; Groat, Stephen; Marchany, Randy; Tront, Joseph (Cyber-Physical Systems Virtual Organization, 2012)
      The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
    • Adaptive Key Protection in Complex Cryptosystems with Attributes 

      Wang, Zilong; Yao, Danfeng (Daphne); Feng, Rongquan (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-16
    • Data Leak Detection As a Service: Challenges and Solutions 

      Shu, Xiaokui; Yao, Danfeng (Daphne) (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-10
    • User Intention-Based Traffic Dependence Analysis for Anomaly Detection 

      Zhang, Hao; Banick, William; Yao, Danfeng (Daphne); Ramakrishnan, Naren (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-07
    • Dynamical Processes on Large Networks (CS Seminar Lecture Series) 

      Prakash, B. Aditya (2012-03-23)
      How do contagions spread in population networks? Which group should we market to, for maximizing product penetration? Will a given YouTube video go viral? Who are the best people to vaccinate? What happens when two products ...
    • Vulnerability of LTE to Hostile Interference 

      Lichtman, M; Reed, JH; Clancy, TC; Norton, M (Ieee, 2013-01-01)
    • Social Turing Tests: Crowdsourcing Sybil Detection 

      Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
      As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
    • Detecting Malicious Landing Pages in Malware Distribution Networks 

      Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
      Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
    • Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation 

      Krishan, Neelima; Hitefield, Seth; Clancy, T. Charles; McGwier, Robert W.; Tront, Joseph G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-06-28), TR-13-02
      We propose and detail a system called multipersona Hypovisors for providing light-weight isolation for enhancing security on Multipersona mobile devices, particularly with respect to the current memory constraints of these ...
    • A Static Assurance Analysis of Android Applications 

      Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G.; Jiang, Xuxian (Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-07-11), TR-13-03
      We describe an efficient approach to identify malicious Android applications through specialized static program analysis. Our solution – referred to as user intention program dependence analysis – performs offline analysis ...
    • Process Authentication for High System Assurance 

      Almohri, Hussain M.J.; Yao, Danfeng (Daphne); Kafura, Dennis (IEEE Computer Society, 2013-07-11)
      This paper points out the need in modern operating system kernels for a process authentication mechanism, where a process of a user-level application proves its identity to the kernel. Process authentication is different ...
    • Religiosity and Information Security Policy Compliance 

      Borena, Berhanu; Belanger, Francé (AMCIS, 2013-08)
      Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members ...
    • Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

      Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, T. Charles (Virginia Tech, 2013-11-01)
      A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
    • ‘Beating the news’ with EMBERS: Forecasting Civil Unrest using Open Source Indicators 

      Ramakrishnan, N; Butler, P; Self, N; Khandpur, R; Saraf, P; Wang, W; Cadena, J; Vullikanti, A; Korkmaz, G; Kuhlman, C; Marathe, A; Zhao, L; Ting, H; Huang, B; Srinivasan, A; Trinh, K; Getoor, L; Katz, G; Doyle, A; Ackermann, C; Zavorin, I; Ford, J; Summers, K; Fayed, Y; Arredondo, J; Gupta, D; Mares, D (2014)
    • Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid 

      Sherburne, Matthew; Marchany, Randy; Tront, Joseph (ACM Press, 2014)
      The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
    • Civil Cyberconflict: Microsoft, Cybercrime, and Botnets 

      Hiller, Janine S. (Santa Clara University School of Law, 2014-01)
      Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
    • Distributed Storage Systems with Secure and Exact Repair - New Results 

      Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2014-02)
      Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...