Economic Perspectives, Vol. 33, No. 1, 2009.

superfluitysmackoverΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 5 μήνες)

62 εμφανίσεις

(1)

RFID Security


(a)

Heydt
-
Benjamin, Thomas S., Bailey, Daniel V., Fu, Kevin, Juels, Ari and
O'Hare, Tom,

Vulnerabilities in First
-
Generation RFID
-
Enabled Credit Cards
.

Economic Perspectives, Vol. 33, No. 1, 2009.

(b)

Spiekermann, S. 2009. RFID and privacy: what con
sumers really want and
fear.
Personal Ubiquitous Comput.

13, 6 (Aug. 2009), 423
-
434.

(c)

Konomi, S. and Roussos, G. 2007. Ubiquitous computing in the real world:
lessons learnt from large scale RFID deployments.
Personal Ubiquitous
Comput.

11, 7 (Oct. 2007), 5
07
-
521.

(d)

Legner, C. and Thiesse, F. 2006. RFID
-
Based Facility Maintenance at
Frankfurt Airport.
IEEE Pervasive Computing

5, 1 (Jan. 2006), 34.

(e)

Spiekermann, S.; Evdokimov, S.
, "Critical RFID Privacy
-
Enhancing
Technologies,"

IEEE
Security & Privacy,

vol.7, no
.2, pp.56
-
62,
March
-
April
2009
.

(f)

Konomi, S., Inoue, S., Kobayashi, T., Tsuchida, M., and Kitsuregawa, M.
2006. Supporting Colocated Interactions Using RFID and Social Network
Displays.
IEEE Pervasive Computing

5, 3 (Jul. 2006), 48
-
56.


(2)

Privacy in Social Net
work


(a)

A Practical Attack to De
-
Anonymize Social Network Users, by Gilbert
Wondracek, Thorsten Holz, Engin Kirda, and Christopher Kruegel

(b)

(Under)mining Privacy in Social Networks, by: Monica Chew, Dirk Balfanz,
Ben Laurie

(c)

Messin’ with Texas Deriving Mothe
r’s Maiden Names Using Public Records,
by Virgil Griffith and Markus Jakobsson

(d)

Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. 2007. Social
phishing.
Commun. ACM

50, 10 (Oct. 2007), 94
-
100.

(e)

Bonneau, J. & Preibusch, S., The Privacy Jungle: On

the Market for Data
Protection in Social Networks, 2009, The Eighth Workshop on the Economics
of Information Security WEIS.

(f)

Bilge, L., Strufe, T., Balzarotti, D., and Kirda, E. 2009.
All your contacts are
belong to us: automated identity theft attacks on
social networks. In
Proceedings of the 18th international Conference on World Wide Web

(Madrid, Spain, April 20
-

24, 2009). WWW '09.

(g)

Balachander Krishnamurthy and Craig E. Wills. 2010. Privacy leakage in
mobile online social networks. In Proceedings of th
e 3rd conference on Online
social networks (WOSN'10). USENIX Association, Berkeley, CA, USA, 4
-
4.


(3)

How to
attack captcha


(a)

Yan, J. and El Ahmad, A. S. 2008. A low
-
cost attack on a Microsoft captcha.
In
Proceedings of the 15th ACM Conference on Computer and
Communications Security

(Alexandria, Virginia, USA, October 27
-

31, 2008).
CCS '08. ACM, New York, NY, 543
-
554.

(b)

Elie Bursztein, Matthieu Martin, and John Mitchell. 2011. Text
-
based
CAPTCHA strengths and weaknesses. In
Proceedings of the 18th ACM
conferenc
e on Computer and communications security

(CCS '11)
.

(c)

Asirra: a CAPTCHA that exploits interest
-
aligned manual image
categorization. In
Proceedings of the 14th ACM Conference on Computer and
Communications Security

(Alexandria, Virginia, USA, October 28
-

31
, 2007).

(d)

Yan, J.; El Ahmad, A.S.; , "CAPTCHA Security: A Case Study,"
Security &
Privacy, IEEE

, vol.7, no.4, pp.22
-
28, July
-
Aug. 2009.

(e)

ScatterType: A Legible but Hard
-
to
-
Segment CAPTCHA, Henry S. Baird and
Michael A. Moll and Sui
-
Yu Wang.


(4)

Graphical passw
ords


(a)

Dhamija, R. and Perrig, A. 2000. Déjà Vu: a user study using images for
authentication. In
Proceedings of the 9th Conference on USENIX Security
Symposium
-

Volume 9

(Denver, Colorado, August 14
-

17, 2000).

(b)

Wiedenbeck, S., Waters, J., Birget, J., Bro
dskiy, A., and Memon, N. 2005.
Authentication using graphical passwords: effects of tolerance and image
choice. In
Proceedings of the 2005 Symposium on Usable Privacy and
Security

(Pittsburgh, Pennsylvania, July 06
-

08, 2005). SOUPS '05, vol. 93.
ACM, New

York, NY, 1
-
12.

(c)

Dunphy, P. and Yan, J. 2007. Do background images improve "draw a secret"
graphical passwords?. In
Proceedings of the 14th ACM Conference on
Computer and Communications Security

(Alexandria, Virginia, USA, October
28
-

31, 2007).

(d)

Chiasson,

S., Biddle, R., and van Oorschot, P. C. 2007. A second look at the
usability of click
-
based graphical passwords. In
Proceedings of the 3rd
Symposium on Usable Privacy and Security

(Pittsburgh, Pennsylvania, July 18
-

20, 2007).

(e)

Moncur, W. and Leplâtre, G.

2007. Pictures at the ATM: exploring the
usability of multiple graphical passwords. In
Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems

(San Jose, California,
USA, April 28
-

May 03, 2007).



(5)

Google hacking and countermeasures


(a)

C
onti, G. 2007. Googling considered harmful. In
Proceedings of the 2006
Workshop on New Security Paradigms

(Germany, September 19
-

22, 2006).
NSPW '06.

(b)

Lancor, L. and Workman, R. 2007. Using google hacking to enhance defense
strategies. In
Proceedings of t
he 38th SIGCSE Technical Symposium on
Computer Science Education

(Covington, Kentucky, USA, March 07
-

11,
2007).

(c)

Google

Swiss army knife for hackers? SA Mathieson

(d)

Billig, J., Danilchenko, Y., and Frank, C. E. 2008.
Evaluation of Google
hacking. In
Proceed
ings of the 5th Annual Conference on information
Security Curriculum Development

(Kennesaw, Georgia, September 26
-

27,
2008). InfoSecCD '08.

(e)

Privacy in Danger: Let’s google Your Privacy by Emin Islam Tatlı



(6)

Security of Recent Hot Toys such as iPhone, Wii, XBOX, and PS2


(a)

Security Evaluation of Apple’s iPhone, by Charlie Miller, Jake Honoroff,
Joshua Mason

(b)

iPhone Privacy, by Nicolas Seriot

(c)

Hacki
ng the Nintendo Wii Remote, by Johnny Chung Lee, Carnegie Mellon
University

(d)

Forensic Analysis of a Sony Play Station 3 Gaming Console, by Scott Conrad,
Greg Dorn, J. Philip Craiger

(e)

ILOVE the iPhone: Hackers, the Internet and the Press, 2000
-
2008, by Guy
F.
H. Dickinson

(f)

Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011.
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone
accelerometers. In
Proceedings of the 18th ACM conference on Computer and
communications securit
y

(CCS '11).

(g)

Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh. 2010.
Framing attacks on smart phones and dumb routers: tap
-
jacking and geo
-
localization attacks. In Proceedings of the 4th USENIX conference on
Offensive technologies (WOOT'10)
. USENIX Association, Berkeley, CA,
USA, 1
-
8.


(7)

Bio
metric

security


(a)

Large
-
Scale Evaluation of Multimodal Biometric Authentication Using State
-
of
-
the
-
Art Systems, by
Robert Snelick
,
Umut Uludag,

Alan Mink,
Michael
Indovina, and Anil Jain.

(b)

Toward Reliable Use
r Authentication through Biometrics, Vclav Maty Jr.,,
Zdenek Riha

(c)

Keystroke dynamics as a biometric for authentication, by Fabian Monrose,
Aviel D. Rubin

(d)

Typing patterns: A key to user identification, by A Peacock, X Ke, M
Wilkerson

(e)

Pusara, M. and Brodley,

C. E. 2004. User re
-
authentication via mouse
movements. In
Proceedings of the 2004 ACM Workshop on Visualization and
Data Mining For Computer Security

(Washington DC, USA, October 29
-

29,
2004).