Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
1.
Thwarting fake accounts by predicting their victims / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Matei Ripeanu ; et al [LERSSE-PRESENTATION-2014-001]
Traditional fake account detection systems employed by today's online social networks rely on either features extracted from user activities, or ranks computed from the underlying social graph. [...]
Published in Boshmaf et al. Thwarting fake accounts by predicting their victims. Invited talk at AAAI 2014 Spring Symposia, Social Hacking and Cognitive Security on the Internet and New Media, Stanford, CA, March, 2014.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
2.
Security Analysis of Malicious Socialbots on the Web / Yazan Boshmaf [LERSSE-THESIS-2015-002]
The open nature of the Web, online social networks (OSNs) in particular, makes it possible to design socialbots—automation software that controls fake accounts in a target OSN, and has the ability to perform basic activities similar to those of real users. [...]
Published in Yazan Boshmaf, Security Analysis of Malicious Socialbots on the Web, PhD Dissertation, UBC, 2015:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
3.
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al [LERSSE-PRESENTATION-2015-001]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
4.
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs / Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al [LERSSE-RefConfPaper-2014-004]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: NDSS_260_Final - Download fulltextPDF Download fulltextPDF (PDFA); boshmaf_ndss_2015 - Download fulltextPDF Download fulltextPDF (PDFA);
5.
Graph-based Sybil Detection in Social and Information Systems / Yazan Boshmaf ; Konstantin Beznosov ; Matei Ripeanu [LERSSE-RefConfPaper-2013-001]
Sybil attacks in social and information systems have serious security implications. [...]
Published in Yazan Boshmaf, Konstantin Beznosov, Matei Ripeanu. Graph-based Sybil Detection in Social and Information Systems. In the Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'13), Niagara Falls, Canada, August 25-28, 2013.:
Fulltext: Download fulltextPDF;
6.
Towards Improving the Usability and Security of Web Single Sign-On Systems / San-Tsai Sun [LERSSE-THESIS-2013-001]
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted by high-profile identity providers (IdPs), such as Facebook, Google, Microsoft, and Yahoo, and millions of relying party (RP) websites. [...]
Published in San-Tsai Sun, "Towards Improving the Usability and Security of Web Single Sign-On Systems," PhD dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, November, 2013, pp.216:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
7.
Investigating User Account Control Practices / Sara Motiee ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-POSTER-2010-004]
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection [...]
Published in Sara Motiee, Kirstie Hawkey and Konstantin Beznosov. Investigating User Account Control Practices. In Proceedings of the 28th international Conference Extended Abstracts on Human Factors in Computing Systems (Atlanta, GA, USA, April 10 - 15, 2010). ACM, New York, NY, 6 pages.:
Transfer from CDS 0.99.7: Download fulltextPDF;
8.
Application-Based TCP Hijacking / Oliver Zheng ; Jason Poon ; Konstantin Beznosov [LERSSE-RefConfPaper-2009-033]
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data into an application session without either server or client applications noticing the spoofing attack. [...]
Published in Oliver Zheng, Jason Poon, Konstantin Beznosov, "Application-Based TCP Hijacking," in Proceedings of the 2009 European Workshop on System Security, Nuremberg, Germany, ACM, 31 March 2009, pp. 9-15.:
Transfer from CDS 0.99.7: Download fulltextPDF;
9.
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures / San-Tsai Sun ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefJnlPaper-2012-001]
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user accounts, and tens of thousands of supporting websites. [...]
Published in San-Tsai Sun, Kirstie Hawkey, and Konstantin Beznosov. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. Computers & Security, Accepted 7 February 2012.:
Transfer from CDS 0.99.7: Download fulltextPDF;
10.
Strategies for Monitoring Fake AV Distribution Networks / Onur Komili ; Kyle Zeeuwen ; Matei Ripeanu ; Konstantin Beznosov [LERSSE-UnrefConfPaper-2011-001]
We perform a study of Fake AV networks advertised via search engine optimization. [...]
Published in Onur Komili, Kyle Zeeuwen, Matei Ripeanu, and Konstantin Beznosov. Strategies for Monitoring Fake AV Distribution Networks. In Proceedings of the 21st Virus Bulletin Conference, October 5-7, 2011.:
Transfer from CDS 0.99.7: Download fulltextPDF;