Technical Reports

Latest additions:
2018-02-14
06:49
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers / Hassan Halawa ; Matei Ripeanu ; Konstantin Beznosov ; Baris Coskun ; et al [LERSSE-REPORT-2018-001]
In the face of large-scale automated social engineering attacks to large online services, fast detection and remediation of compromised accounts are crucial to limit the spread of new attacks and to mitigate the overall damage to users, companies, and the public at large. [...]
Published in H. Halawa, M. Ripeanu, K. Beznosov, B. Coskun, and M. Liu "Forecasting Suspicious Account Activity at Large-Scale Online Service Providers", published in arXiv https://arxiv.org/abs/1801.08629v1:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2014-05-30
06:40
Access Review Survey Report / Pooya Jaferian ; Konstantin Beznosov [LERSSE-REPORT-2014-001]
To further understand the state of the practice in access review, and collect quantitative results on how companies perform access review, we conducted a survey of security practitioners [...]
Published in P. Jaferian and K. Beznosov. Access Review Survey Report. Technical Report LERSSE-TR-2014-001, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, May 2014.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
Detailed record - Similar records
2012-02-27
14:10
The Socialbot Network: When Bots Socialize for Fame and Money / Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu [LERSSE-REPORT-2012-001]
Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today's Web ecosystem. [...]
Published in Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2010-12-20
12:45
Speculative Authorization / Pranab Kini ; Konstantin Beznosov [LERSSE-REPORT-2010-002]
As enterprises aim towards achieving zero latency for their systems, latency introduced by authorization process can act as an obstacle towards achieving their goal. [...]
Published in Pranab Kini and Konstantin Beznosov, "Speculative Authorizaion," Tech. Rep. LERSSE-TR-2010-002, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, December 2010: :
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2010-01-22
11:14
An RT-based Policy Model for Converged Networks / San-Tsai Sun ; Konstantin Beznosov [LERSSE-REPORT-2010-001]
Technologies advanced in communication devices and wireless networks enable telecommunication network operators to provide rich personalized multimedia services. [...]
Published in San-Tsai Sun and Konstantin Beznosov, "An RT-based Policy Model for Converged Networks," Tech. Rep. LERSSE-TR-2010-001, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, January 2010:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2009-09-15
14:05
Support for ANSI RBAC in EJB / Wesam Darwish ; Konstantin Beznosov [LERSSE-REPORT-2009-034]
We analyze access control mechanisms of the Enterprise Java Beans (EJB)architecture and define a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. [...]
Published in Wesam Darwish and Konstantin Beznosov. Support for ANSI RBAC in EJB. Technical Report LERSSE-TR-2009-34, accessible from http://lersse-dl.ece.ubc.ca, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, January 21 2009:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2009-07-16
15:35
Effectiveness of IT Security Tools in Practice / Fahimeh Raja ; Kasia Muldner ; Konstantin Beznosovz [LERSSE-REPORT-2009-033]
In today's world, IT security plays a critical role in different organizations, yet little is known about IT security in the context of organizations. [...]
Published in Fahimeh Raja, Kasia Muldner, and Konstantin Beznosovz. Effectiveness of it security tools in practice. Technical Report LERSSE-TR-2009-33, University of British Columbia, March 2008.:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2009-04-27
13:08
SQLPrevent: Effective Dynamic Protection Against SQL Injection Attacks / San-Tsai Sun ; Konstantin Beznosov [LERSSE-REPORT-2009-032]
This paper presents an approach for retrofitting existing web applications with run-time protection against known as well as unseen SQL injection attacks (SQLIAs). [...]
Published in San-Tsai Sun and Konstantin Beznosov, "SQLPrevent: Effective Dynamic Protection Against SQL Injection Attacks," Tech. Rep. LERSSE-TR-2009-32, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, March 2009:
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2009-04-27
13:07
A Usability Analysis of Microsoft Windows Vista’s Firewall / Arun Chebium ; Pooya Jaferian ; Nima Kaviani ; Fahimeh Raja [LERSSE-REPORT-2009-031]
The usability of personal firewalls has not received a significant amount of attention in the literature. [...]
Published in Arun Chebium, Pooya Jaferian, Nima Kaviani, Fahimeh Raja, "A Usability Analysis of Microsoft Windows Vista’s Firewall", term project report, CPSC 544, University of British Columbia, Canada, Spring 2007. :
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records
2009-04-27
13:07
Usability of Windows Vista Firewall: A Laboratory User Study / Fahimeh Raja ; Robert Boeck ; Ganapathy Viswanathan ; Pouyan Arjmandi [LERSSE-REPORT-2009-030]
In this project we conducted a user study of Microsoft Windows Vista Firewall: a lab study followed by a questionnaire to evaluate the usability of Vista’s personal firewall. [...]
Published in Fahimeh Raja, Robert Boeck, Ganapathy Viswanathan, Pouyan Arjmandi, "Usability of Windows Vista Firewall: A Laboratory User Study", EECE 412 report, University of British Columbia, Canada, Fall 2007 :
Transfer from CDS 0.99.7: Download fulltextPDF;
Detailed record - Similar records