Now showing items 1-20 of 88

    • Cyber War Game in Temporal Networks 

      Cho, Jin-Hee; Gao, Jianxi (PLOS, 2016-02-09)
      In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ...
    • Conceptualizing Cyber Deterrence by Entanglement 

      Brantly, A (2018-03-01)
      Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
    • Battling the Bear: Ukraine's Approach to National Cybersecurity 

      Brantly, A (2018-09-29)
      Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
    • Creating Technological Surprise 

      Walker, Steven H. (Virginia Tech, 2018-10-05)
      This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018.
    • Personal Anomaly Detection and Smart-Phone Security 

      Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
      Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
    • Distributed Storage Systems with Secure and Exact Repair - New Results 

      Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2014-02)
      Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
    • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

      Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
      We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
    • Security and Privacy produced by nHCP Unique Identifiers 

      Tront, Joseph; Groat, Stephen; Dunlop, Matthew; Marchany, Randy (IEEE, 2011-10)
      As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
    • Strategic Cyber Maneuver 

      Brantly, Aaron F. (Small Wars Foundation, 2017-10-17)
      Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? Maneuvering with an army is advantageous; with an ...
    • A Declarative Approach to Hardening Services Against QoS Vulnerabilities 

      Kwon, Young-Wo; Tilevich, Eli (IEEE, 2011)
      The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
    • Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid 

      Sherburne, Matthew; Marchany, Randy; Tront, Joseph (ACM Press, 2014)
      The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
    • Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation 

      Rahaman, Sazzadur; Cheng, Long; Yao, Danfeng (Daphne); Li, He; Park, Jung-Min (Jerry) (De Gruyter Open, 2017)
      Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern ...
    • Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

      Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
      The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
    • User-Centric Dependence Analysis For Identifying Malicious Mobile Apps 

      Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G. (IEEE, 2012)
      This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
    • Implementing an IPv6 Moving Target Defense on a Live Network 

      Dunlop, Matthew; Groat, Stephen; Marchany, Randy; Tront, Joseph (Cyber-Physical Systems Virtual Organization, 2012)
      The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
    • Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore 

      Chen, Zhimin; Schaumont, Patrick Robert (Cryptology ePrint Archive, 2010)
      This paper discusses a novel direction for multicore cryptographic software, namely the use of multicore to protect a design against side-channel attacks.We present a technique which is based on the principle of dual-rail ...
    • An Extended Perspective on Individual Security Behaviors 

      Crossler, Robert E.; Belanger, Francé (ACM, 2014-11)
      Security threats regularly affect users of home computers. As such, it is important to understand the practices of users for protecting their computers and networks, and to identify determinants of these practices. Several ...
    • Religiosity and Information Security Policy Compliance 

      Borena, Berhanu; Belanger, Francé (AMCIS, 2013-08)
      Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members ...