Search For:

Displaying 1-11 out of 11 total
A Unified Approach to Intra-domain Security
Found in: Computational Science and Engineering, IEEE International Conference on
By Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
Issue Date:August 2009
pp. 219-224
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a s...
 
Analysis of IPSec overheads for VPN servers
Found in: IEEE Workshop on Secure Network Protocols
By Craig Shue, Youngsang Shin, M. Gupta, Jong Youl Choi
Issue Date:November 2005
pp. 25-30
Internet protocol security (IPSec) is a widely deployed mechanism for implementing virtual private networks (VPNs). This paper evaluates the performance overheads associated with IPSec. We use Openswan, an open source implementation of IPSec, and measure t...
 
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Found in: Hawaii International Conference on System Sciences
By Craig A. Shue, Minaxi Gupta
Issue Date:January 2010
pp. 1-10
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when hi...
   
Reporting Insider Threats via Covert Channels
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By David N. Muchene,Klevis Luli,Craig A. Shue
Issue Date:May 2013
pp. 68-71
Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at th...
   
Resolvers Revealed: Characterizing DNS Resolvers and their Clients
Found in: ACM Transactions on Internet Technology (TOIT)
By Andrew J. Kalafut, Craig A. Shue
Issue Date:July 2013
pp. 1-17
The Domain Name System (DNS) allows clients to use resolvers, sometimes called caches, to query a set of authoritative servers to translate host names into IP addresses. Prior work has proposed using the interaction between these DNS resolvers and the auth...
     
Understanding new anonymity networks from a user's perspective
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Craig Shue, Erik Archambault
Issue Date:October 2012
pp. 995-997
Anonymity networks have been studied for decades, from both theoretical and practical perspectives. Several anonymity systems, such as Tor and Java Anon Proxy (JAP), have become popular enough for general Internet users. However, both noticeably constrain ...
     
Implementing a "moving target" system to protect servers
Found in: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11)
By Craig Shue, Curtis Taylor
Issue Date:October 2011
pp. 1-1
On the Internet, attackers often compromise systems owned by other people and group these systems into a "botnet" to launch attacks automatically. Current methods to prevent such automated attacks are either are application-specific or use signatures that ...
     
A system for intelligent substitution of named entities with applications to the automatic generation of honey tokens
Found in: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11)
By Aaron Mishtal, Stephen Kelley, Craig Shue
Issue Date:October 2011
pp. 1-1
Mobile phone programming can provide an authentic and engaging hook into computer science. With App Inventor, developed by Google and recently moved to MIT, programming Android apps is as easy as clicking blocks together. App Inventor has been used success...
     
Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Brenda S. Lenard, Craig A. Shue, Stan L. Bowie
Issue Date:April 2010
pp. 1-2
The paper describes the preliminary methodological outcomes and findings from a long-term, exploratory research program on cybercrime countermeasures designed to isolate behavioral or demographic correlates associated with public acceptance or rejection. S...
     
Understanding implications of DNS zone provisioning
Found in: Proceedings of the 8th ACM SIGCOMM conference on Internet measurement (IMC '08)
By Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta
Issue Date:October 2008
pp. 1-1
DNS is a critical component of the Internet. This paper takes a comprehensive look at the provisioning of Internet domains and its impact on the availability of various services. To gather data, we sweep 60% of the Internet's domains for zone transfers. 6....
     
"Empty space" computes: the evolution of an unconventional supercomputer
Found in: Proceedings of the 3rd conference on Computing frontiers (CF '06)
By Brian Kopecky, Bryce Himebaugh, Chris Weilemann, Craig Shue, Jonathan W. Mills, Matt Parker
Issue Date:May 2006
pp. 115-126
Lee A. Rubel defined the extended analog computer to avoid the limitations of Shannon's general purpose analog computer. Partial differential equation solvers were a "quintessential" part of Rubel's theoretical machine. These components have been implement...
     
 1