Search
Now showing items 1-9 of 9
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
(Georgia Institute of Technology, 2012)
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research
has made the use of this primitive more practical, such solutions generally ...
An Empirical Evaluation of Security Indicators in Mobile Web Browsers
(Georgia Institute of Technology, 2011)
Mobile browsers are increasingly being relied
upon to perform security sensitive operations. Like their
desktop counterparts, these applications can enable SSL/TLS
to provide strong security guarantees for communications ...
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
(Georgia Institute of Technology, 2014)
Garbled circuits offer a powerful primitive for computation
on a user’s personal data while keeping that
data private. Despite recent improvements, constructing
and evaluating circuits of any useful size remains ...
Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications
(Georgia Institute of Technology, 2011)
The growth of smartphone capability has led to
an explosion of new applications. Many of the most useful
apps use context-sensitive data, such as GPS location or social
network information. In these cases, users may not ...
Evaluating Bluetooth as a Medium for Botnet Command and Control
(Georgia Institute of Technology, 2009)
Malware targeting mobile phones is being studied with increasing interest by the research community. While
such attention has previously focused on viruses and worms, many of which use near-field communications in
order ...
One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens
(Georgia Institute of Technology, 2012-02)
HTTP cookies are the de facto mechanism for session authentication in web applications. However,
their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended
to protect ...
Replacing Oblivious Computation with Private Search for Context Sensitive Communications
(Georgia Institute of Technology, 2010)
Context aware applications provide users with an increasingly rich
set of services. From services such as interactive maps to restaurant
guides and social networking tools, the use of information including
location, ...
On the Disparity of Display Security in Mobile and Traditional Web Browsers
(Georgia Institute of Technology, 2011)
Mobile web browsers now provide nearly equivalent features
when compared to their desktop counterparts. However,
smaller screen size and optimized features for constrained
hardware make the web experience on mobile
browsers ...
One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials
(Georgia Institute of Technology, 2011)
Many web applications are vulnerable to session hijacking
attacks due to the insecure use of cookies for
session management. The most recommended defense
against this threat is to completely replace HTTP with
HTTPS. ...