Now showing items 1-16 of 16

    • Addressing connectivity challenges for mobile computing and communication 

      Shi, Cong (Georgia Institute of Technology, 2014-05-16)
      Mobile devices are increasingly being relied on for computation intensive and/or communication intensive applications that go beyond simple connectivity and demand more complex processing. This has been made possible by ...
    • Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications 

      Carter, Henry; Amrutkar, Chaitrali; Dacosta, Italo; Traynor, Patrick (Georgia Institute of Technology, 2011)
      The growth of smartphone capability has led to an explosion of new applications. Many of the most useful apps use context-sensitive data, such as GPS location or social network information. In these cases, users may not ...
    • Efficient techniques for secure multiparty computation on mobile devices 

      Carter, Henry Lee (Georgia Institute of Technology, 2015-11-04)
      Smartphones are rapidly becoming a widespread computation platform, with many users relying on their mobile devices as their primary computing device. This popularity has brought about a plethora of mobile applications and ...
    • Emerging Cyber Threats Report for 2009 

      Ahamad, Mustaque; Amster, Dave; Barrett, Michael; Cross, Tom; Heron, George; Jackson, Don; King, Jeff; Lee, Wenke; Naraine, Ryan; Ollmann, Gunter; Ramsey, Jon; Schmidt, Howard A.; Traynor, Patrick (Georgia Institute of Technology, 2008-10-15)
      On October 15, 2008, the Georgia Tech Information Security Center (GTISC) hosted its annual summit on emerging security threats and countermeasures affecting the digital world. At the conclusion of the event, GTISC released ...
    • An Empirical Evaluation of Security Indicators in Mobile Web Browsers 

      Amrutkar, Chaitrali; Traynor, Patrick; van Oorschot, Paul C. (Georgia Institute of Technology, 2011)
      Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications ...
    • Evaluating Bluetooth as a Medium for Botnet Command and Control 

      Jain, Nehil; Lee, Wenke; Sangal, Samrit; Singh, Kapil; Traynor, Patrick (Georgia Institute of Technology, 2009)
      Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, many of which use near-field communications in order ...
    • Improving quality of experience for mobile video streaming 

      Yusuf, Lateef (Georgia Institute of Technology, 2014-04-08)
      Thanks to their increasing sophistication and popularity, mobile devices, in the form of smartphones and tablets, have become the fastest growing contributors to Internet traffic. Indeed, smartphones are projected to account ...
    • On the Disparity of Display Security in Mobile and Traditional Web Browsers 

      Amrutkar, Chaitrali; Singh, Kapil; Verma, Arunabh; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Mobile web browsers now provide nearly equivalent features when compared to their desktop counterparts. However, smaller screen size and optimized features for constrained hardware make the web experience on mobile browsers ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The most recommended defense against this threat is to completely replace HTTP with HTTPS. ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2012-02)
      HTTP cookies are the de facto mechanism for session authentication in web applications. However, their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended to protect ...
    • Reinforcing the weakest link in cyber security: securing systems and software against attacks targeting unwary users 

      Lu, Long (Georgia Institute of Technology, 2013-06-27)
      Unwary computer users are often blamed as the weakest link on the security chain, for unknowingly facilitating incoming cyber attacks and jeopardizing the efforts to secure systems and networks. However, in my opinion, ...
    • Replacing Oblivious Computation with Private Search for Context Sensitive Communications 

      Amrutkar, Chaitrali; Naik, Rishikesh; Dacosta, Italo; Traynor, Patrick (Georgia Institute of Technology, 2010)
      Context aware applications provide users with an increasingly rich set of services. From services such as interactive maps to restaurant guides and social networking tools, the use of information including location, ...
    • Secure Outsourced Garbled Circuit Evaluation for Mobile Devices 

      Carter, Henry; Mood, Benjamin; Traynor, Patrick; Butler, Kevin (Georgia Institute of Technology, 2012)
      Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research has made the use of this primitive more practical, such solutions generally ...
    • Towards secure web browsing on mobile devices 

      Amrutkar, Chaitrali Vijay (Georgia Institute of Technology, 2014-01-22)
      The Web is increasingly being accessed by portable, multi-touch wireless devices. Despite the popularity of platform-specific (native) mobile apps, a recent study of smartphone usage shows that more people (81%) browse the ...
    • Understanding and protecting closed-source systems through dynamic analysis 

      Dolan-Gavitt, Brendan (Georgia Institute of Technology, 2014-08-22)
      In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior ...
    • Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices 

      Carter, Henry; Lever, Charles; Traynor, Patrick (Georgia Institute of Technology, 2014)
      Garbled circuits offer a powerful primitive for computation on a user’s personal data while keeping that data private. Despite recent improvements, constructing and evaluating circuits of any useful size remains ...