The large-scale monitoring of computer users' software activities has become commonplace, eg, for application telemetry, error reporting, or demographic profiling. This paper describes …
Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire …
Potentially dangerous cryptography errors are well-documented in many applications. Conventional wisdom suggests that many of these errors are caused by cryptographic …
We report the results of a large-scale measurement study of the HTTPS certificate ecosystem- --the public-key infrastructure that underlies nearly all secure web communications. Using …
The web services (WS) technology provides a comprehensive solution for representing, discovering, and invoking services in a wide variety of environments, including Service …
Annotation & bull; & bull; Describes new approach to wireless security based on Wi-Fi Protected Access (WPA) and the 802.11 i standard (releasing summer 2003). & bull; …
Cloud Computing is one of the most intensively developed solutions for large-scale distributed processing. Effective use of such environments, management of their high …
Cache-timing attacks are a serious threat to security-critical software. We show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool …
As Technology pushes the limits of removable media-so drives the need for a new file system in order to support the larger capacities and faster access speeds being designed …