Search For:

Displaying 1-10 out of 10 total
Combating Double-Spending Using Cooperative P2P Systems
Found in: Distributed Computing Systems, International Conference on
By Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim
Issue Date:June 2007
pp. 41
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating mer- chants, so that the broker cannot link spent coins to the user who withdraws them. A variet...
 
Functional Alarms for Systems of Interoperable Medical Devices
Found in: 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (HASE)
By Krishna K. Venkatasubramanian,Eugene Y. Vasserman,Oleg Sokolsky,Insup Lee
Issue Date:January 2014
pp. 247-248
Alarms are essential for medical systems in order to ensure patient safety during deteriorating clinical situations and inevitable device malfunction. As medical devices are connected together to become interoperable, alarms become crucial part in making t...
 
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
Found in: IEEE Transactions on Dependable and Secure Computing
By Abedelaziz Mohaien,Denis Foo Kune,Eugene Y. Vasserman, Myungsun Kim, Yongdae Kim
Issue Date:November 2013
pp. 380-393
Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that ...
 
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification
Found in: IEEE Security & Privacy
By Eugene Y. Vasserman,Krishna K. Venkatasubramanian,Oleg Sokolsky,Insup Lee
Issue Date:November 2012
pp. 70-73
Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security...
 
Security and Interoperable-Medical-Device Systems, Part 1
Found in: IEEE Security & Privacy
By Krishna K. Venkatasubramanian,Eugene Y. Vasserman,Oleg Sokolsky,Insup Lee
Issue Date:September 2012
pp. 61-63
Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security...
 
Improved group off-the-record messaging
Found in: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (WPES '13)
By Eugene Y. Vasserman, Nicholas Hopper, Hong Liu
Issue Date:November 2013
pp. 249-254
Off-the-Record Messaging (OTR) is an online analogy of face-to-face private chat -- messages are confidential and authenticated at the time of the conversation, but cannot later be used to prove authorship. The original OTR protocol is limited to two parti...
     
Losing control of the internet: using the data plane to attack the control plane
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Max Schuchard, Nicholas Hopper, Yongdae Kim
Issue Date:October 2010
pp. 726-728
In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. CXPST extends previous work that demonstrates a vulnerability in routers th...
     
Secure encounter-based social networks: requirements, challenges, and designs
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Max Schuchard, Yongdae Kim
Issue Date:October 2010
pp. 717-719
In this paper we outline requirements, challenges, and designs for encounter-based mobile social networks, where relationships are based on a temporarily shared location. To illustrate the challenges we examine a recently proposed design, SMILE, against a ...
     
How much anonymity does network latency leak?
Found in: ACM Transactions on Information and System Security (TISSEC)
By Eric Chan-TIN, Eugene Y. Vasserman, Nicholas Hopper
Issue Date:February 2010
pp. 1-28
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control only a few machines and have low enough delay to support anonymous us...
     
On the effectiveness of k;-anonymity against traffic analysis and surveillance
Found in: Proceedings of the 5th ACM workshop on Privacy in electronic society (WPES '06)
By Eugene Y. Vasserman, Nicholas Hopper
Issue Date:October 2006
pp. 9-18
The goal of most research on anonymity, including all currently used systems for anonymity, is to achieve anonymity through unlinkability: an adversary should not be able to determine the correspondence between the input and output messages of the system. ...
     
 1