82.
|
Optimizing Re-Evaluation of Malware Distribution Networks
/ Kyle Zeeuwen
[LERSSE-THESIS-2011-002]
The retrieval and analysis of malicious content is an essential task for security researchers. [...]
Published in Kyle Zeeuwen, "Optimizing Re-Evaluation of Malware Distribution Networks", MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, October 2011.:
Transfer from CDS 0.99.7: PDF;
|
83.
|
Strategies for Monitoring Fake AV Distribution Networks
/ Onur Komili ; Kyle Zeeuwen ; Matei Ripeanu ; Konstantin Beznosov
[LERSSE-UnrefConfPaper-2011-001]
We perform a study of Fake AV networks advertised via search engine optimization. [...]
Published in Onur Komili, Kyle Zeeuwen, Matei Ripeanu, and Konstantin Beznosov. Strategies for Monitoring Fake AV Distribution Networks. In Proceedings of the 21st Virus Bulletin Conference, October 5-7, 2011.:
Transfer from CDS 0.99.7: PDF;
|
84.
|
Automated Social Engineering Attacks in OSNs
/ Yazan Boshmaf ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-PRESENTATION-2011-003]
In this presentation, we outline the latest automated social engineering attacks in Online Social Networks (OSNs) such as Facebook [...]
Published in Yazan Boshmaf, Konstantin Beznosov, and Matei Ripeanu. Automated social engineering attacks in OSNs. The Office of the Privacy Commissioner of Canada (Ottawa), May 2010:
Transfer from CDS 0.99.7: PPT;
|
85.
|
[POSTER] The Socialbot Network: When Bots Socialize for Fame and Money
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[LERSSE-POSTER-2011-002]
Online Social Networks (OSNs) have become an integral part of today's Web. [...]
Published in Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In the Poster Session of the 20th USENIX Conference on Security (SEC'11), August 2011.:
Transfer from CDS 0.99.7: PDF;
|
86.
|
The Socialbot Network: When Bots Socialize for Fame and Money
/ Yazan Boshmaf ; Ildar Muslukhov ; Konstantin Beznosov ; Matei Ripeanu
[258]
[LERSSE-RefConfPaper-2011-008]
Online Social Networks (OSNs) have become an integral part of today's Web. [...]
Published in Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272:
Transfer from CDS 0.99.7: PDF;
|
87.
|
Analysis of ANSI RBAC Support in EJB
/ Wesam Darwish ; Konstantin Beznosov
[LERSSE-RefJnlPaper-2011-001]
This paper analyzes access control mechanisms of the Enterprise Java Beans (EJB) architecture and defines a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. [...]
Published in Wesam Darwish and Konstantin Beznosov. Analysis of ANSI RBAC support in EJB. International Journal of Secure Software Engineering, 2(2):25-52, April-June 2011.:
Transfer from CDS 0.99.7: PDF;
|
88.
|
A Brick Wall, a Locked Door, and a Bandit: A Physical Security Metaphor For Firewall Warnings
/ Fahimeh Raja ; Kirstie Hawkey ; Steven Hsu ; Kai-Le Clement Wang ; et al
[LERSSE-RefConfPaper-2011-007]
We used an iterative process to design firewall warnings in which the functionality of a personal firewall is visualized based on a physical security metaphor. [...]
Published in Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, and Konstantin Beznosov. A Brick Wall, a Locked Door, and a Bandit: A Physical Security Metaphor For Firewall Warnings. In SOUPS '11: Proceedings of the 7th symposium on Usable privacy and security, 20 pages.:
Transfer from CDS 0.99.7: PDF;
|
89.
|
Heuristics for Evaluating IT Security Management Tools
/ Pooya Jaferian ; Kirstie Hawkey ; Andreas Sotirakopoulos ; Maria Velez-Rojas ; et al
[LERSSE-RefConfPaper-2011-006]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. [...]
Published in Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, in Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, PA, USA, July 20-22, 2011. :
Transfer from CDS 0.99.7: PDF;
|
90.
|
On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings
/ Andreas Sotirakopoulos ; Kirstie Hawkey ; Konstantin Beznosov
[LERSSE-RefConfPaper-2011-005]
We replicated and extended a 2008 study conducted at CMU that investigated the e effectiveness of SSL warnings. [...]
Published in Andreas Sotirakopoulos, Kirstie Hawkey, and Konstantin Beznosov. On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings. In Proceedings of Symposium on Usable Privacy and Security, July 2011:
Transfer from CDS 0.99.7: PDF;
|
91.
|
What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID
/ San-Tsai Sun ; Eric Pospisil ; Ildar Muslukhov ; Nuray Dindar ; et al
[LERSSE-RefConfPaper-2011-004]
OpenID is an open and promising Web single sign-on (SSO) solution. [...]
Published in San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. What makes users refuse web single sign-on? an empirical investigation of OpenID. In Proceedings of Symposium on Usable Privacy and Security, July 2011.:
Transfer from CDS 0.99.7: PDF;
|