71.
|
The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems
/ San-Tsai Sun ; Konstantin Beznosov
[LERSSE-RefConfPaper-2012-003]
Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) websites. [...]
Published in San-Tsai Sun and Konstantin Beznosov. The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. In Proceedings of ACM Conference on Computer and Communications Security (CCS'12), October 2012.:
Transfer from CDS 0.99.7: PDF;
|
72.
|
Augur: Aiding Malware Detection Using Large-Scale Machine Learning
/ Yazan Boshmaf ; Matei Ripeanu ; Konstantin Beznosov ; Kyle Zeeuwen ; et al
[LERSSE-POSTER-2012-001]
We present Augur: a large-scale machine learning system that uses malware static and dynamic analyses to predict the maliciousness of new files. [...]
Published in Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Kyle Zeeuwen, David Cornell, Dmitry Samosseiko. Augur: Aiding Malware Detection Using Large-Scale Machine Learning. At the Poster Session of the 21st Usenix Security Symposium, Bellevue, WA, 2012:
Transfer from CDS 0.99.7: PDF;
|
73.
|
Design and Analysis of a Social Botnet
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-RefJnlPaper-2012-002]
Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today's Web ecosystem. [...]
Published in Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Design and Analysis of a Social Botnet. Elsevier Journal of Computer Network - Special Issue on Botnets, 2012.:
Transfer from CDS 0.99.7: PDF;
|
74.
|
Key Challenges in Defending Against Malicious Socialbots
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-PRESENTATION-2012-001]
The ease with which we adopt online personas and relationships has created a soft spot that cyber criminals are willing to exploit. [...]
Published in Usenix 5th Workshop on Large-scale Exploits and Emerging Threats (LEET'12), San Jose, CA, USA.:
Transfer from CDS 0.99.7: PDF;
|
75.
|
Key Challenges in Defending Against Malicious Socialbots
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-RefConfPaper-2012-002]
The ease with which we adopt online personas and relationships has created a soft spot that cyber criminals are willing to exploit. [...]
Published in Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Key challenges in defending against malicious socialbots. In Proceedings of the 5th USENIX workshop on Large-scale exploits and emergent threats, LEET'12, Berkeley, CA, USA. USENIX Association.:
Transfer from CDS 0.99.7: PDF;
|
76.
|
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
/ San-Tsai Sun ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-RefJnlPaper-2012-001]
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user accounts, and tens of thousands of supporting websites. [...]
Published in San-Tsai Sun, Kirstie Hawkey, and Konstantin Beznosov. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Computers & Security, Accepted 7 February 2012.:
Transfer from CDS 0.99.7: PDF;
|
77.
|
The Socialbot Network: Are Social Botnets Possible?
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-etc-2012-001]
In this invited piece at the ACM Interactions Magazine, we briefly describe our research into the use, impact, and implications of socialbots on Facebook..
Published in Article by Tim Hwang, Ian Pearce, and Max Nanis. Socialbots: voices from the fronts. In ACM Interactions 19, 2 (March 2012). Piece by Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. The Socialbot Network: Are Social Botnets Possible?:
Transfer from CDS 0.99.7: PDF;
|
78.
|
The Socialbot Network: When Bots Socialize for Fame and Money
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-REPORT-2012-001]
Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today's Web ecosystem. [...]
Published in Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011:
Transfer from CDS 0.99.7: PDF;
|
79.
|
Understanding Users’ Requirements for Data Protection in Smartphones
/ Ildar Muslukhov ; Yazan Boshmaf ; Cynthia Kuo ; Jonathan Lester ; et al
[LERSSE-RefConfPaper-2012-001]
Securing smartphones’ data is a new and growing concern, especially when this data represents valuable or sensitive information. [...]
Published in Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov.
Understanding users' requirements for data protection in smartphones. In Workshop on Secure Data Management on Smartphones and Mobiles, 2012.:
Transfer from CDS 0.99.7: PDF;
|
80.
|
Influencing User Password Choice Through Peer Pressure
/ Andreas Sotirakopoulos
[LERSSE-THESIS-2011-004]
Passwords are the main means of authenticating users in most systems today. [...]
Published in UBC Thesis:
Transfer from CDS 0.99.7: PDF;
|