Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 244 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
11. Android Rooting: Methods, Detection, and Evasion / San-Tsai Sun ; Andrea Cuadros ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-007]
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. [...]
Published in San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
12. Surpass: System-initiated User-replaceable Passwords / Jun Ho Huh ; Seongyeol Oh ; Hyoungshick Kim ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-006]
System-generated random passwords have maximum pass- word security and are highly resistant to guessing attacks. [...]
Published in Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
13. Thwarting Fake OSN Accounts by Predicting their Victims / Yazan Boshmaf ; Matei Ripeanu ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-005]
Traditional defense mechanisms for fighting against automated fake accounts in online social networks are victim-agnostic. [...]
Published in Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov. Thwarting Fake OSN Accounts by Predicting their Victims. In Proceedings of the 2015 Workshop on Artificial Intelligent and Security Workshop (AISec'15), Denver, Colorado, USA, Oct, 2015:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
14. Android Permissions Remystified: A Field Study on Contextual Integrity / Primal Wijesekera ; Arjun Baokar ; Ashkan Hosseini ; Serge Egelman ; et al [LERSSE-RefConfPaper-2015-004]
We instrumented the Android platform to collect data regarding how often and under what circumstances smartphone applications access protected resources regulated by permissions. [...]
Published in Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security 2015, Washington DC, USA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
15. On the Memorability of System-generated PINs: Can Chunking Help? / Jun Ho Huh ; Hyoungschick Kim ; Rakesh B. Bobba ; Masooda N. Bashir ; et al [LERSSE-RefConfPaper-2015-003]
To ensure that users do not choose weak personal identification numbers (PINs), many banks give out system-generated random PINs. [...]
Published in Jun Ho Huh, Hyoungschick Kim, Rakesh B. Bobba, Masooda N. Bashir and Konstantin Beznosov. 2015. On the Memorability of System-generated PINs: Can Chunking Help? SOUPS'15: Symposium On Usable Privacy and Security. Ottawa, Ontario, Canada:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
16. A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks / Hyoungshick Kim ; Konstantin Beznosov ; Eiko Yoneki [LERSSE-RefConfPaper-2015-002]
The problem of spreading information is a topic of considerable recent interest, but the traditional influence maximization problem is inadequate for a typical viral marketer who cannot access the entire network topology. [...]
Published in Kim, K. Beznosov, and E. Yoneki, “A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks” in Computational Social Networks, February 2015, v2n3.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
17. On the Impact of Touch ID on iPhone Passcodes / Ivan Cherapau ; Ildar Muslukhov ; Nalin Asanka ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-001]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-RefConfPaper-2015-001:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
18. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al [LERSSE-PRESENTATION-2015-001]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
19. Engineering Access Control For Distributed Enterprise Systems / Konstantin Beznosov [LERSSE-THESIS-2015-001]
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. [...]
Published in Florida International University, 2000:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
20. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al [LERSSE-RefConfPaper-2014-004]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: NDSS_260_Final - Download fulltextPDF Download fulltextPDF (PDFA); boshmaf_ndss_2015 - Download fulltextPDF Download fulltextPDF (PDFA);

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 244 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.