Sciweavers

USS
2008
13 years 6 months ago
SWOON: A Testbed for Secure Wireless Overlay Networks
Yu-Lun Huang, J. Doug Tygar, Hsiao-Ying Lin, L. Y....
USS
2008
13 years 6 months ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
USS
2008
13 years 6 months ago
The Case for Networked Remote Voting Precincts
Voting in national elections from the comfort of one's home computer may never be practical or secure, but we argue that remote network voting can be both practical and secur...
Daniel Sandler, Dan S. Wallach
USS
2008
13 years 6 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
USS
2008
13 years 6 months ago
On Auditing Elections When Precincts Have Different Sizes
We address the problem of auditing an election when precincts may have different sizes. Prior work in this field has emphasized the simpler case when all precincts have the same s...
Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest
USS
2008
13 years 6 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
USS
2008
13 years 6 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
USS
2008
13 years 6 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
USS
2008
13 years 6 months ago
All Your iFRAMEs Point to Us
As the web continues to play an ever increasing role in information exchange, so too is it becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provi...
Niels Provos, Panayiotis Mavrommatis, Moheeb Abu R...
USS
2008
13 years 6 months ago
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Ari Juels, Ravikanth Pappu, Bryan Parno