No abstract available.
Analyses of Two End-User Software Vulnerability Exposure Metrics
The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure ...
An Adaptive Risk Control and Security Management for Embedded Real-Time System
Traditional mechanisms for risk control and task scheduling may not be very suitable for security-critical embedded real-time systems under dynamic peration environments. In this paper, we are interested in design of an adaptive risk control and ...
Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem
This paper presents a new diagnosis approach, using linear support vector machines (SVMs). The objective is to identify the set of permanent faulty nodes when at most t nodes can fail simultaneously. We consider the asymmetric comparison diagnosis model ...
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach
Secure initialization of sensor nodes with cryptographic keys is inherent to all security protocols and applicationsin the area of wireless sensor networks (WSN).We introduce a general framework, denoted TOPKEY, thatprovides tool assistance and performs ...
On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags
Radio-frequency identification (RFID) tags have found their way into many applications. When tags implement cryptographic algorithms, side-channel analysis (SCA) attacks become a concern. Especially tags in the ultra-high frequency (UHF) range are ...
Veto-based Malware Detection
Malicious software (malware) represents a threatto the security and privacy of computer users. Traditionalsignature-based and heuristic-based methods are unsuccessfulin detecting some forms of malware. This paper presents amalware detection approach ...
Efficient Generic Construction of Forward-Secure Identity-Based Signature
We propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that ensures unforgeability of past signatures in spite of the exposure of the current signing key. Our construction, supported by formal security analysis, ...
From Computationally-proved Protocol Specifications to Implementations
This paper presents a novel framework for proving specifications of security protocols in the computational model and generating runnable implementations from such proved specifications. We rely on the computationally-sound protocol verifier CryptoVerif ...
Oblivious and Fair Server-Aided Two-Party Computation
We show efficient, practical (server-aided) securetwo-party computation protocols ensuring privacy, correctnessand fairness in the presence of malicious (Byzantine) faults. Ourrequirements from the server are modest: to ensure privacyand correctness, we ...
A Group Signature Based Electronic Toll Pricing System
With the prevalence of GNSS technologies, nowadays freely available for everyone, location-based vehicle services such as electronic tolling pricing systems and pay-as-you-drive services are rapidly growing. Because these systems collect and process ...
Anonymous Communication by Branch-and-Bound
Communication in which the sender and receiver are both anonymous is usually achieved by using a telescoping construction. The channel is established hop-by-hop, where each relay gets to know the previous and next node along the route. All previously ...
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites
To address privacy threats stemming from interacting with other users on Social Networking Sites (SNS), effective Social Identity Management (SIdM) is a key requirement. SIdM refers to the deliberate and targeted disclosure of personal attribute values ...
An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides
Mining approaches, such as role mining or organizational mining, can be applied to derive permissions and roles from a system's configuration or from log files. In this way, mining techniques document the current state of a system and produce current-...
Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications
The use of role engineering has grown in importance with the expansion of highly abstracted access control frameworks in organizations. In particular, the use of role mining techniques for the discovery of roles from previously deployed authorizations ...
A Coordination-Driven Authorization Framework for Space Containers
Collaborative applications usually involve multiple autonomous processes that have to coordinate themselves over the Internet in an efficient way. For such systems, shared tuple spaces provide a highly flexible coordination medium that enables the ...
RIM: A Method to Defend from JIT Spraying Attack
As a code reuse technique, JIT spraying attack becomes popular on the JITed VM (Virtual Machine) (e.g., Javascript Engine, Flash Engine). Using a bug in web applications, an attacker can reuse the code generated by the JIT (Just-In-Time) compiler, which ...