enter search term and/or author name
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems
Hyojeong Lee, Jeff Seibert, Dylan Fistrovic, Charles Killian, Cristina Nita-Rotaru
Article No.: 13
In this article, we propose Gatling, a framework that automatically finds performance attacks caused by insider attackers in large-scale message-passing distributed systems. In performance attacks, malicious nodes deviate from the protocol when...
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation
Ziming Zhao, Gail-Joon Ahn, Hongxin Hu
Article No.: 14
Picture gesture authentication has been recently introduced as an alternative login experience to text-based password on touch-screen devices. In particular, the newly on market Microsoft Windows 8™ operating system adopts such an...
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model,...
Attacking the Internet Using Broadcast Digital Television
Yossef Oren, Angelos D. Keromytis
Article No.: 16
In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a specification called Hybrid Broadcast-Broadband Television (HbbTV), which allows broadcast...