Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 7 records found  Search took 0.00 seconds. 
1. Contextual Permission Models for Better Privacy Protection / Primal Wijesekera [LERSSE-THESIS-2018-002]
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordinary users, should be worried about occur every day without any scrutiny. [...]
Published in Primal Wijesekera, "Contextual Permission Models for Better Privacy Protection", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2018:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
2. Dynamically Regulating Mobile Application Permissions / Primal Wijesekera ; Arjun Baokar ; Lynn Tsai ; Joel Reardon ; et al [LERSSE-etc-2018-001]
Current smartphone operating systems employ permission systems to regulate how apps access sensitive resources. [...]
Published in P. Wijesekera et al., "Dynamically Regulating Mobile Application Permissions," in IEEE Security & Privacy, vol. 16, no. 1, pp. 64-71, January/February 2018. doi: 10.1109/MSP.2018.1331031 keywords: {Computer security;Medical devices;Mobile communication;Privacy;Smart phones;IEEE Symposium on Security and Privacy;machine learning;mobile privacy;permission systems;security}, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8283440&isnumber=8283426:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
3. Thwarting fake accounts by predicting their victims / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Matei Ripeanu ; et al [LERSSE-PRESENTATION-2014-001]
Traditional fake account detection systems employed by today's online social networks rely on either features extracted from user activities, or ranks computed from the underlying social graph. [...]
Published in Boshmaf et al. Thwarting fake accounts by predicting their victims. Invited talk at AAAI 2014 Spring Symposia, Social Hacking and Cognitive Security on the Internet and New Media, Stanford, CA, March, 2014.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
4. Speculative Authorization / Pranab Kini ; Konstantin Beznosov [LERSSE-RefJnlPaper-2012-003]
We present Speculative Authorization (SPAN), a prediction technique that reduces authorization latency in enterprise systems. [...]
Published in Pranab Kini, Konstantin Beznosov, "Speculative Authorization," IEEE Transactions on Parallel and Distributed Systems, 10 Aug. 2012.:
Transfer from CDS 0.99.7: Download fulltextPDF;
5. Augur: Aiding Malware Detection Using Large-Scale Machine Learning / Yazan Boshmaf ; Matei Ripeanu ; Konstantin Beznosov ; Kyle Zeeuwen ; et al [LERSSE-POSTER-2012-001]
We present Augur: a large-scale machine learning system that uses malware static and dynamic analyses to predict the maliciousness of new files. [...]
Published in Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Kyle Zeeuwen, David Cornell, Dmitry Samosseiko. Augur: Aiding Malware Detection Using Large-Scale Machine Learning. At the Poster Session of the 21st Usenix Security Symposium, Bellevue, WA, 2012:
Transfer from CDS 0.99.7: Download fulltextPDF;
6. Speculative Authorization / Pranab Kini ; Konstantin Beznosov [LERSSE-REPORT-2010-002]
As enterprises aim towards achieving zero latency for their systems, latency introduced by authorization process can act as an obstacle towards achieving their goal. [...]
Published in Pranab Kini and Konstantin Beznosov, "Speculative Authorizaion," Tech. Rep. LERSSE-TR-2010-002, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, December 2010: :
Transfer from CDS 0.99.7: Download fulltextPDF;
7. Towards Improving the Performance of Enterprise Authorization Systems using Speculative Authorization / Pranab Kini [LERSSE-THESIS-2010-001]
With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. [...]
Published in Pranab Kini, "Towards Improving the Performance of Enterprise Authorization Systems using Speculative Authorization" Masters thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, October, 2010 :
Transfer from CDS 0.99.7: Download fulltextPDF;

Interested in being notified about new results for this query?
Subscribe to the RSS feed.