Now showing items 1-10 of 20
A Declarative Approach to Hardening Services Against QoS Vulnerabilities
The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
Keystroke-Dynamics Authentication Against Synthetic Forgeries
We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
Distributed Storage Systems with Secure and Exact Repair - New Results
Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid
(ACM Press, 2014)
The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
Security and Privacy produced by nHCP Unique Identifiers
As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
Personal Anomaly Detection and Smart-Phone Security
(Virginia Tech, 2010-04-22)
Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
Creating Technological Surprise
(Virginia Tech, 2018-10-05)
This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018.
Religiosity and Information Security Policy Compliance
Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members ...
User-Centric Dependence Analysis For Identifying Malicious Mobile Apps
This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...