Search For:

Displaying 1-40 out of 40 total
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)
Found in: Security and Privacy, IEEE Symposium on
By David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
Issue Date:May 2006
pp. 365-370
We enumerate requirements and give constructions for the vote storage unit of an electronic voting machine. In this application, the record of votes must survive even an unexpected failure of the machine; hence the data structure should be durable. At the ...
 
Security and Privacy Issues in E-passports
Found in: Security and Privacy for Emerging Areas in Communications Networks, International Conference on
By Ari Juels, David Molnar, David Wagner
Issue Date:September 2005
pp. 74-88
Within the next year, travelers from dozens of nations may be carrying a new form of passport in response to a mandate by the United States government. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new tec...
 
Evidence-Based Elections
Found in: IEEE Security & Privacy
By Philip B. Stark,David Wagner
Issue Date:September 2012
pp. 33-41
The authors propose an alternative to current requirements for certifying voting equipment and conducting elections. They argue that elections should be structured to provide convincing affirmative evidence that the reported outcomes actually reflect how p...
 
Portably solving file races with hardness amplification
Found in: ACM Transactions on Storage (TOS)
By Dan Tsafrir, David Wagner, David Wagner, Dilma Da Silva, Dilma Da Silva, Tomer Hertz, Tomer Hertz
Issue Date:November 2008
pp. 1-30
The file-system API of contemporary systems makes programs vulnerable to TOCTTOU (time-of-check-to-time-of-use) race conditions. Existing solutions either help users to detect these problems (by pinpointing their locations in the code), or prevent the prob...
     
Leadership 2.0: Engaging and Supporting Leaders in the Transition towards a Networked Organization
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Alexander Richter,David Wagner
Issue Date:January 2014
pp. 574-583
The adoption of social software brings about a plethora of socio-technological changes for organizations. A still largely unresolved challenge is to develop a better understanding of the consequences for leadership. To address this challenge, we first deve...
   
Defeating UCI: Building Stealthy and Malicious Hardware
Found in: Security and Privacy, IEEE Symposium on
By Cynthia Sturton, Matthew Hicks, David Wagner, Samuel T. King
Issue Date:May 2011
pp. 64-77
In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI) for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm essentially looks for portions of the circuit that go unused during design-tim...
 
Energy management of the Multi-Mission Space Exploration Vehicle using a goal-oriented control system
Found in: IEEE Aerospace Conference
By Julia M. Badger Braman, David A. Wagner
Issue Date:March 2011
pp. 1-6
Safe human exploration in space missions requires careful management of limited resources such as breathable air and stored electrical energy. Daily activities for astronauts must be carefully planned with respect to such resources, and usage must be monit...
 
C++ Dynamic Cast in Autonomous Space Systems
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Damian Dechev, Rabi Mahapatra, Bjarne Stroustrup, David Wagner
Issue Date:May 2008
pp. 499-507
The dynamic cast operation allows flexibility in the design and use of data management facilities in object-oriented programs. Dynamic cast has an important role in the implementation of the Data Management Services (DMS) of the Mission Data System Project...
 
Architecture for dynamic management of QoS policies for heterogeneous Internet environments
Found in: Next Generation Mobile Applications, Services and Technologies, International Conference on
By Ilka Miloucheva, David Wagner, Pedro A.Aranda Gutierrez
Issue Date:September 2007
pp. 165-172
In heterogeneous Internet access network environments (UMTS, WLAN, WIMAX, WLAN DVB-T, DVB-H), there is a challenge for automated configuration and adaptation of policies aimed at management of Quality of Service (QoS) guarantees and resource usage. The pap...
 
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract)
Found in: Security and Privacy, IEEE Symposium on
By Philippe Golle, David Wagner
Issue Date:May 2007
pp. 66-70
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Symposium on Security and Privacy. These authentication schemes are designed to be secure against eavesdropping attacks while relying only on human cognitive skil...
 
Model Checking An Entire Linux Distribution for Security Violations
Found in: Computer Security Applications Conference, Annual
By Benjamin Schwarz, Hao Chen, David Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West
Issue Date:December 2005
pp. 13-22
Software model checking has become a popular tool for verifying programs? behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. However, even state-of-the-art model checkers are limited in use when they repor...
 
Fault Attacks on Dual-Rail Encoded Systems
Found in: Computer Security Applications Conference, Annual
By Jason Waddle, David Wagner
Issue Date:December 2005
pp. 483-494
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits that are robust against fault induction attacks. We develop a framework for anal...
 
Intrusion Detection via Static Analysis
Found in: Security and Privacy, IEEE Symposium on
By David Wagner, Drew Dean
Issue Date:May 2001
pp. 0156
Abstract: One of the primary challenges in intrusion detection is modelling typical application behavior, so that we can recognize attacks by their atypical effects without raising too many false alarms. We show how static analysis may be used to automatic...
 
Practical Techniques for Searches on Encrypted Data
Found in: Security and Privacy, IEEE Symposium on
By Dawn Xiaodong Song, David Wagner, Adrian Perrig
Issue Date:May 2000
pp. 0044
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. However, this usually implies that one has to sacrifice functionality for security. For example, if a client...
 
Reducing attack surfaces for intra-application communication in android
Found in: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (SPSM '12)
By David Kantola, David Wagner, Erika Chin, Warren He
Issue Date:October 2012
pp. 69-80
The complexity of Android's message-passing system has led to numerous vulnerabilities in third-party applications. Many of these vulnerabilities are a result of developers confusing inter-application and intra-application communication mechanisms. Consequ...
     
Privacy for RFID through trusted computing
Found in: Proceedings of the 2005 ACM workshop on Privacy in the electronic society (WPES '05)
By Andrea Soppera, David Molnar, David Wagner
Issue Date:November 2005
pp. 31-34
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. One of the biggest challenges for RFID technology is to provide privacy protecti...
     
Privacy and security in library RFID: issues, practices, and architectures
Found in: Proceedings of the 11th ACM conference on Computer and communications security (CCS '04)
By David Molnar, David Wagner
Issue Date:October 2004
pp. 210-219
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve rep...
     
Radio frequency Id and privacy with information goods
Found in: Proceedings of the 2004 ACM workshop on Privacy in the electronic society (WPES '04)
By David Molnar, David Wagner, Deirdre Mulligan, Elizabeth Miles, Jennifer M. Urban, Laura Quilter, Nathan Good
Issue Date:October 2004
pp. 41-42
We define message privacy against a <i>profiling</i> adversary, whose goal is to classify a population of users into categories according to the messages they exchange. This adversary models the most common privacy threat against email communicatio...
     
Analyzing internet voting security
Found in: Communications of the ACM
By Aviel D. Rubin, Barbara Simons, David Jefferson, David Wagner
Issue Date:October 2004
pp. 59-64
An extensive assessment of a proposed Internet-based voting system.
     
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources
Found in: Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13)
By Christopher Thompson, David Wagner, Jennifer King, Maritza Johnson, Serge Egelman
Issue Date:July 2013
pp. 1-14
Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. We performed a set of experiments to study whether attribution mecha...
     
Short paper: location privacy: user behavior in the field
Found in: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (SPSM '12)
By David Wagner, Drew Fisher, Leah Dorner
Issue Date:October 2012
pp. 51-56
Current smartphone platforms provide ways for users to control access to information about their location. For instance, on the iPhone, when an application requests access to location information, the operating system asks the user whether to grant locatio...
     
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
Found in: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices (SPSM '12)
By Adrienne Porter Felt, David Wagner, Serge Egelman
Issue Date:October 2012
pp. 33-44
Smartphone operating systems warn users when third-party applications try to access sensitive functions or data. However, all of the major smartphone platforms warn users about different application actions. To our knowledge, their selection of warnings wa...
     
Measuring user confidence in smartphone security and privacy
Found in: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12)
By David Wagner
Issue Date:July 2012
pp. 1-16
In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' comfor...
     
Analyzing inter-application communication in Android
Found in: Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys '11)
By Adrienne Porter Felt, David Wagner, Erika Chin, Kate Greenwood
Issue Date:June 2011
pp. 239-252
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provides a rich inter-application message passing system. This encourages inter-app...
     
Diesel: applying privilege separation to database access
Found in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11)
By Adrienne Porter Felt, David Wagner, Joel Weinberger, Matthew Finifter
Issue Date:March 2011
pp. 416-422
Database-backed applications typically grant complete database access to every part of the application. In this scenario, a flaw in one module can expose data that the module never uses for legitimate purposes. Drawing parallels to traditional privilege se...
     
Efficient character-level taint tracking for Java
Found in: Proceedings of the 2009 ACM workshop on Secure web services (SWS '09)
By David Wagner, Erika Chin
Issue Date:November 2009
pp. 3-12
Over 80% of web services are vulnerable to attack, and much of the danger arises from command injection vulnerabilities. We present an efficient character-level taint tracking system for Java web applications and argue that it can be used to defend against...
     
On voting machine design for verification and testability
Found in: Proceedings of the 16th ACM conference on Computer and communications security (CCS '09)
By Cynthia Sturton, David Wagner, Sanjit A. Seshia, Susmit Jha
Issue Date:November 2009
pp. 463-476
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was designed specifically to enable verification and testing. In our architecture, the...
     
Conditioned-safe ceremonies and a user study of an application to web authentication
Found in: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)
By Chris Karlof, David Wagner, J. D. Tygar
Issue Date:July 2009
pp. 1-32
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need o...
     
Verifiable functional purity in java
Found in: Proceedings of the 15th ACM conference on Computer and communications security (CCS '08)
By Adrian Mettler, David Wagner, Matthew Finifter, Naveen Sastry
Issue Date:October 2008
pp. 79-79
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function invertibility, reproducibility of computation, and safety of untrusted code execu...
     
Large-scale analysis of format string vulnerabilities in Debian Linux
Found in: Proceedings of the 2007 workshop on Programming languages and analysis for security (PLAS '07)
By David Wagner, Karl Chen
Issue Date:June 2007
pp. 75-84
Format-string bugs are a relatively common security vulnerability, and can lead to arbitrary code execution. In collaboration with others, we designed and implemented a system to eliminate format string vulnerabilities from an entire Linux distribution, us...
     
Object capabilities for security
Found in: Proceedings of the 2006 workshop on Programming languages and analysis for security (PLAS '06)
By David Wagner
Issue Date:June 2006
pp. 1-2
Existing systems often do a poor job of meeting the principle of least privilege. I will discuss how object capability systems and language-based methods can help address this shortcoming. In language-based object capability systems, an object reference is...
     
TinySec: a link layer security architecture for wireless sensor networks
Found in: Proceedings of the 2nd international conference on Embedded networked sensor systems (SenSys '04)
By Chris Karlof, David Wagner, Naveen Sastry
Issue Date:November 2004
pp. 162-175
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b...
     
Cryptanalysis of a provably secure CRT-RSA algorithm
Found in: Proceedings of the 11th ACM conference on Computer and communications security (CCS '04)
By David Wagner
Issue Date:October 2004
pp. 92-97
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we demonstrate that the proposal is in fact insecure: it can be broken with a s...
     
Resilient aggregation in sensor networks
Found in: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04)
By David Wagner
Issue Date:October 2004
pp. 78-87
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We examine several approaches for making these aggregation schemes more resilie...
     
Security considerations for IEEE 802.15.4 networks
Found in: Proceedings of the 2004 ACM workshop on Wireless security (WiSe '04)
By David Wagner, Naveen Sastry
Issue Date:October 2004
pp. 32-42
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we highlig...
     
Mimicry attacks on host-based intrusion detection systems
Found in: Proceedings of the 9th ACM conference on Computer and communications security (CCS '02)
By David Wagner, Paolo Soto
Issue Date:November 2002
pp. 255-264
We examine several host-based anomaly detection systems and study their security against evasion attacks. First, we introduce the notion of a mimicry attack, which allows a sophisticated attacker to cloak their intrusion to avoid detection by the IDS. Then...
     
MOPS: an infrastructure for examining security properties of software
Found in: Proceedings of the 9th ACM conference on Computer and communications security (CCS '02)
By David Wagner, Hao Chen
Issue Date:November 2002
pp. 235-244
We describe a formal approach for finding bugs in security-relevant software and verifying their absence. The idea is as follows: we identify rules of safe programming practice, encode them as safety properties, and verify whether these properties are obey...
     
Cool security trends
Found in: Proceedings of the seventh ACM symposium on Access control models and technologies (SACMAT '02)
By Cynthia Irvine, David Wagner, Dawson Engler, Trent Jaegar
Issue Date:June 2002
pp. 53-53
Trent Jarger will discuss ongoing work in the verification of authorization hook placement in Linux. The idea is that we can develop tools to check that all security-sensitive kernel operations can be mediated properly. Dawson Engler will discuss ongoing w...
     
Intercepting mobile communications: the insecurity of 802.11
Found in: Proceedings of the seventh annual international conference on Mobile computing and networking (MobiCom '01)
By David Wagner, Ian Goldberg, Nikita Borisov
Issue Date:July 2001
pp. 180-189
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from m...
     
Security flaws in 802.11 data link protocols
Found in: Communications of the ACM
By David Wagner, Jesse Walker, Nancy Cam-Winget, Russ Housley
Issue Date:January 1988
pp. 35-39
Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer.
     
 1