Sciweavers

27 search results - page 3 / 6
» Practical Approaches to Recovering Encrypted Digital Evidenc...
Sort
View
100
Voted
CCS
1999
ACM
15 years 5 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel
102
Voted
IMF
2007
15 years 2 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
88
Voted
PUC
2010
77views more  PUC 2010»
14 years 11 months ago
Rhythms and plasticity: television temporality at home
Abstract Digital technologies have enabled new temporalities of media consumption in the home. Through a field study of home television viewing practices, we investigated temporal...
Lilly Irani, Robin Jeffries, Andrea Knight
140
Voted
CCS
2011
ACM
14 years 1 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
147
Voted
ESORICS
2011
Springer
14 years 25 days ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller