Search For:

Displaying 1-3 out of 3 total
Reducing the Attack Surface in Massively Multiplayer Online Role-Playing Games
Found in: IEEE Security and Privacy
By Stephen Bono, Dan Caselden, Gabriel Landau, Charlie Miller
Issue Date:May 2009
pp. 13-19
As online games become increasingly complex and continue to gain popularity, malware authors will be compelled to target these virtual worlds for launching attacks. Online games' large attack surfaces are an unfortunate consequence of the technological pro...
Security through legality
Found in: Communications of the ACM
By Adam Stubblefield, Aviel Rubin, Matthew Green, Stephen Bono
Issue Date:June 2006
pp. 41-43
The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker.
Verifiable audit trails for a versioning file system
Found in: Proceedings of the 2005 ACM workshop on Storage security and survivability (StorageSS '05)
By Giuseppe Ateniese, Randal Burns, Stephen Bono, Zachary Peterson
Issue Date:November 2005
pp. 44-50
We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published...