Search For:

Displaying 1-6 out of 6 total
Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier
Found in: IEEE Security & Privacy
By Sergey Bratus,Trey Darley,Michael Locasto,Meredith L. Patterson,Rebecca bx Shapiro,Anna Shubina
Issue Date:January 2014
pp. 83-87
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate ...
Avoiding a War on Unauthorized Computation
Found in: IEEE Security & Privacy
By Sergey Bratus,Anna Shubina
Issue Date:March 2013
pp. 83-88
Any attempt to regulate—or, indeed, legally define—exploits will cause irreparable harm to both coder freedoms and consumer systems' trustworthiness. It will reduce the sum of our knowledge about how systems can and cannot behave&...
Distributed monitoring of conditional entropy for anomaly detection in streams
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Chrisil Arackaparambil,Sergey Bratus,Joshua Brody,Anna Shubina
Issue Date:April 2010
pp. 1-8
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams where the problem has received significant attention.
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris
Found in: Proceedings of the fifth ACM workshop on Scalable trusted computing (STC '10)
By Anna Shubina, Sean W. Smith, Sergey Bratus, Wyllys Ingersol
Issue Date:October 2010
pp. 85-90
Broad adoption of secure programming primitives such as the TPM can be hurt by programmer confusion regarding the nature and representation of failures when using a primitive. Conversely, a clear understanding of the primitive's failure modes is essential ...
On the reliability of wireless fingerprinting using clock skews
Found in: Proceedings of the third ACM conference on Wireless network security (WiSec '10)
By Anna Shubina, Chrisil Arackaparambil, David Kotz, Sergey Bratus
Issue Date:March 2010
pp. 169-174
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. But cryptographic exchange protocols are complex and therefore induce potentia...
Teaching the principles of the hacker curriculum to undergraduates
Found in: Proceedings of the 41st ACM technical symposium on Computer science education (SIGCSE '10)
By Anna Shubina, Michael E. Locasto, Sergey Bratus
Issue Date:March 2010
pp. 122-126
The "Hacker Curriculum" exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability to question the trust assumptions in the design and implementation of computer sy...