Search For:

Displaying 1-4 out of 4 total
Cloud Data Protection for the Masses
Found in: Computer
By Dawn Song,Elaine Shi,Ian Fischer,Umesh Shankar
Issue Date:January 2012
pp. 39-45
Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development eff...
Active Mapping: Resisting NIDS Evasion without Altering Traffic
Found in: Security and Privacy, IEEE Symposium on
By Umesh Shankar, Vern Paxson
Issue Date:May 2003
pp. 44
A critical problem faced by a Network Intrusion Detection System (NIDS) is that of ambiguity.TheNIDS cannot always determine what traffic reaches a given host nor how that host will interpret the traffic, and attackers may exploit this ambiguity to avoid d...
Doppelganger: Better browser privacy without the bother
Found in: Proceedings of the 13th ACM conference on Computer and communications security (CCS '06)
By Chris Karlof, Umesh Shankar
Issue Date:October 2006
pp. 154-167
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy risks, since they can be used to track users' actions in detail, but some coo...
PRIMA: policy-reduced integrity measurement architecture
Found in: Proceedings of the eleventh ACM symposium on Access control models and technologies (SACMAT '06)
By Reiner Sailer, Trent Jaeger, Umesh Shankar
Issue Date:June 2006
pp. 19-28
We propose an integrity measurement approach based on information flow integrity,which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA).The recent availability of secure hardware has made it practical for a system to measure its own in...