[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
A Systematic Assessment of the Security of Full Disk Encryption

Organizations as well as private users frequently report the loss and theft of mobile devices such as laptops and smartphones. The threat of data exposure in such scenarios can be mitigated by protection mechanisms based on encryption. Full disk ...

research-article
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility

Severe privacy leakage in the AOL search log incident has attracted considerable worldwide attention. However, all the web users' daily search intents and behavior are collected in such data, which can be invaluable for researchers, data analysts and law ...

research-article
GTID: A Technique for Physical Device <italic>and</italic> Device Type Fingerprinting

In this paper, we introduce GTID, a technique that can actively and passively fingerprint wireless devices and their types using wire-side observations in a local network. GTID exploits information that is leaked as a result of heterogeneity in devices, ...

research-article
Mining Attribute-Based Access Control Policies

Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the ...

research-article
New Publicly Verifiable Databases with Efficient Updates

The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later retrieve a database record and update it by assigning a new value. Also, any attempt by ...

research-article
On the Trustworthiness of Memory Analysis&#x2014;An Empirical Study from the Perspective of Binary Execution

Memory analysis serves as a foundation for many security applications such as memory forensics, virtual machine introspection and malware investigation. However, malware, or more specifically a kernel rootkit, can often tamper with kernel memory data, ...

research-article
Towards Automated Risk Assessment and Mitigation of Mobile Applications

Mobile operating systems, such as Apple's iOS and Google's Android, have supported a ballooning market of feature-rich mobile applications. However, helping users understand and mitigate security risks of mobile applications is still an ongoing challenge. ...

research-article
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation

Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Recent works investigate physical layer features such as received signal strength or radio frequency fingerprints to localize ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.