Sciweavers

27 search results - page 3 / 6
» Practical Approaches to Recovering Encrypted Digital Evidenc...
Sort
View
CCS
1999
ACM
13 years 10 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel
IMF
2007
13 years 7 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
PUC
2010
77views more  PUC 2010»
13 years 4 months ago
Rhythms and plasticity: television temporality at home
Abstract Digital technologies have enabled new temporalities of media consumption in the home. Through a field study of home television viewing practices, we investigated temporal...
Lilly Irani, Robin Jeffries, Andrea Knight
CCS
2011
ACM
12 years 5 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
ESORICS
2011
Springer
12 years 5 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller