In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at th...
Mohammed H. Almeshekah, Christopher N. Gutierrez, ...
: Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent sn...
Administrators need effective tools to quickly and automatically obtain a succinct, yet informative, overview of the status of their networks to make critical administrative deci...
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard...
Software emulation has been proven useful in many scenarios, such as software testing, malware analysis, and intrusion response. However, fine-grained software emulation (e.g., at...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
We propose a new way to verify the integrity and freshness of footage from security cameras by sending visual challenges to the area being monitored by the camera. We study the ef...
Over the past decade many exploit mitigation techniques have been introduced to defend against memory corruption attacks. WˆX, ASLR, and canary-based protections are nowadays wid...
Theofilos Petsios, Vasileios P. Kemerlis, Michalis...
In [7] we introduced the category MKHaus of modal compact Hausdorff spaces, and showed these were concrete realizations of coalgebras for the Vietoris functor on compact Hausdor...
Guram Bezhanishvili, Nick Bezhanishvili, John Hard...