Browsing Department of Computer Science and Engineering by Author "Wright, Matthew"
Now showing items 1-20 of 36
-
A NEW REAL-TIME APPROACH FOR WEBSITE PHISHING DETECTION BASED ON VISUAL SIMILARITY
Asudeh, Omid; 0000-0002-5737-1780 (2016-05-10)Phishing attacks cause billions of dollars of loss every year worldwide. Among several solutions proposed for this type of attack, visual similarity detection methods have a good amount of accuracy. These methods exploit ... -
A STUDY OF USING MULTIPLE CUES TO AID PEOPLE WITH LEARNING DISABILITIES IN LEARNING SYSTEM-ASSIGNED PASSWORDS
Marne, Sonali Tukaram (2017-06-06)Traditional user-chosen passwords often offer weak password security and are prone to password reuse and password patterns whereas system-assigned passwords are secure but fail to provide sufficient memorability. LDs are ... -
Dovetail: Stronger Anonymity In Next-generation Internet Routing
Sankey, Jody Mark (Computer Science & Engineering, 2013-07-22)Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than this ... -
The Dynamics Of Salsa: A Structured Approach To Large-scale Anonymity
Khan, Safwan Mahmud (Computer Science & Engineering, 2008-09-17)Anonymity provides a technical solution for protecting one's online privacy. Highly distributed peer-to-peer (P2P) anonymous systems should have better distribution of trust and more scalability than centralized approaches, ... -
Efficient Frameworks For Lifetime Maximization In Tree Based Sensor Networks
Imon, Sk Kajal ArefinIn most wireless sensor network (WSN) applications, data are typically gathered by the sensor nodes and reported to a data collection point, called the sink. In order to support such data collection, a tree structure rooted ... -
Evading Existing Stepping Stone Detection Methods Using Buffering
Venkateshaiah, Madhu (Computer Science & Engineering, 2007-08-23)To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by ... -
EVALUATION OF HTML TAG SUSCEPTIBILITY TO STATISTICAL FINGERPRINTING FOR USE IN CENSORSHIP EVASION
French, Kelly Scott (2016-12-08)The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of ... -
Fast And Energy-efficient Technique For Jammed Region Mapping In Wireless Sensor Networks
Rahman, Nabila (Computer Science & Engineering, 2010-11-01)Wireless sensor networks (WSNs) have great practical importance for surveillance systems to perform monitoring by acquiring and sending information about intrusions into a secured area. Very little human intervention is ... -
Human Factors In Textual Password-based Authentication
Haque, S M TaiabulDespite being the most commonly used method of authentication on the Web, textual password-based authentication is by no means a panacea as long as usability is concerned. In this dissertation work, we address some usability ... -
The Impact Of Different Cues on the Memorability Of System-assigned Recognition-based Textual Passwords
Fatema, KanisTo ensure memorability, users employ predictable patterns when creating new passwords. These patterns make passwords easy to guess, which not only increases risks to users but also for the entire system. In contrast, ... -
Improving Memorization and Long Term Recall of System Assigned Passwords
Doolani, Jayesh; 0000-0003-0926-1373 (2016-12-20)Systems assigned password have guaranteed robustness against guessing attacks, but they are hard to memorize. To make system assigned passwords more usable, it is of prime importance that systems that assign random password ... -
Improving Performance and Security in Anonymity Systems
Imani, Mohsen (2018-09-06)Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users ... -
Improving Privacy And Performance In Anonymous Communications
Mallesh, Nayantara (Computer Science & Engineering, 2011-03-03)Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and ... -
Improving Tor Performance By Modifying Path Selection
Amirabadi, Mehrdad (Computer Science & Engineering, 2014-12)Tor is a popular volunteer-based overlay network that provides anonymity andprivacy for Internet users. Using the Onion Proxy (OP) client, users connect to anetwork of Onion Routers (ORs) and send their traffic through an ... -
Lilac: Architecture For Anonymous Light Weight Communication
Upadhyaya, Ankit (Computer Science & Engineering, 2013-10-23)We present lilac; a circuit based low latency anonymous light weight instant messaging communication system. This browser based chat platform provides anonymity in context with unlinkability and unobservability for the ... -
LILAC: THE SECOND GENERATION LIGHTWEIGHT LOW-LATENCY ANONYMOUS CHAT.
Pobala, Revanth Rao (2016-08-15)Instant messaging is one of the most used modes of communication and there are many instant messaging systems available online. Studies from the Electronic Frontier Foundation show that there are only a few instant messengers ... -
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
Walls, Robert J. (Computer Science & Engineering, 2009-09-16)Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-security level to an entity in a lower level. The difficulty of detecting or eliminating such channels makes them a desirable ... -
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
Dutta Chowdhuri, Subhasish (Computer Science & Engineering, 2013-03-20)Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ... -
A Method To Evade Keyword Based Censorship
Patil, Ritu R. (Computer Science & Engineering, 2014-12)Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ... -
Mimic: An Active Covert Channel That Evades Regularity-based Detection
Kothari, Kush (Computer Science & Engineering, 2010-07-19)A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ...