The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach

Calvin Ko, Manfred Ruschitzka, Karl Levitt

This paper describes a specfication-based approach to detect exploitations of vulnerabilities in security-critical programs.  The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for operations that are in violation of the specifications…

Added 2002-07-26

Detecting Intrusions Using System Calls: Alternative Data Models

Christina Warrender, Stephanie Forrest, Barak Pearlmutter

Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities.  In this paper we study one such observable - sequences of system calls into the kernel of an operating system…

Added 2002-07-26

Detecting Disruptive Routers: A Distributed Network Monitoring Approach

Kirk A. Bradley, Steven Cheung, Nick Puketza Biswanath Mukherjee, Ronald A. Olsson

An attractive target for a computer system attacker is the router.  An attacker in control of a router can disrupt communication by dropping or misrouting packets passing through the router.  We present a protocol called Watchers that detects and reacts to routers that drop or misroute packets…

Added 2002-07-26

Why Cryptography is Harder Than it Looks

Counterpane Systems
Added 2002-07-26

Crowds: Anonymity for Web Transactions

Michael K. Reiter and Aviel D. Rubin
Added 2002-07-26

Goal Mining to Examine Health Care Privacy Policies

Annie I. Ant
Download: PDF
Added 2002-07-26

On Watermarking Numeric Sets

CERIAS TR 2001-60
Radu Sion and Mikhail Atallah and Sunil Prabhakar
Download: PDF

We\‘re looking into the fundamental problem of watermarking finite numeric sets. The wide area of applicability of the problem ranging from numeric database content to stock market analysis data, makes it especially intriguing when considering a generic solution and particularities of its various applications. Given a range of associated numeric constraints and assumptions we provide a generic solution and analyze associated attacks. We further present several problem applicability domains and relate it to some of our past and ongoing research in watermarking semistructures.

Added 2002-07-26

An Architecture for Secure Wireless Networking

CERIAS TR 2001-56
Yi Lu, Bharat Bhargava, Mohamed Hefeeda
Download: PDF
Added 2002-07-26

Achieving Flexibility and Scalability: A New Architecture for Wireless Network

CERIAS TR 2001-01
Yi Lu, Bharat Bhargava
Download: PDF

We present a Hierarchical Hybrid Network architecture for wireless networks.  In such a network, mobile nodes are hierarchically organized into groups.  Different groups can have different routing protocols.  Mobile nodes communicate with nodes outside their groups through the group agents.  The groups are highly autonomous.  This architecture is flexible and scalable.  We conduct experiments to compare the new architecture with Ad Hoc networks.  The new architecture has a more stable topology and higher throughput when the number of mobile nodes is large.  The objective of our research is to set up a survivable, secure mobile wireless network.

Added 2002-07-26

CONTEXT OF INFORMATION ASSURANCE IN INTER-NETWORKED ENTERPRISES

CERIAS TR 2001-57
Thomas Bellocci, and Shimon Y. Nof
Download: PDF

The development of inter-networked enterprises created a new computing environment in which information assurance is critical. The objective of this article is to investigate the information assurance needs of today

Added 2002-07-26

AGENTS AND PROTOCOLS FOR VARIABLE INFORMATION ASSURANCE IN WORKFLOW SYSTEMS

CERIAS TR 2001-58
Thomas Bellocci, and Shimon Y. Nof
Download: PDF

The design and operation of autonomous agents to assure information in ERP systems of inter-networked enterprises are investigated. A variable information assurance implementation model is proposed based on the AIMIS model, and a risk assessment procedure is applied. The protocols and models needed to support variable assurance are introduced and their performance is assessed. Experimentation shows the possibility to reduce the processing time of requests without decreasing the proportion of trusted requests, compared to a systematic total assurance approach.

Added 2002-07-26

INFORMATION ASSURANCE IN AGENT-BASED WORKFLOW SYSTEM: AN OVERVIEW

CERIAS TR 2001-59
Thomas Bellocci, Chwee Beng Ang, Parbati Ray, and Shimon Y. Nof
Download: PDF
Added 2002-07-26

On Probability of Success in Differential and Linear Cryptanalysis

CERIAS TR 2002-02
Ali A. Selcuk
Download: PDF

Differential and linear cryptanalysis, two of the most important techniques in modern block cipher cryptanalysis, still lack a sound, generally-applicable analysis of their success probabilities. In this paper, we present an analytical calculation of the success probability of differential and linear cryptanalytic attacks. In addition to a formulation of the success probability, the analysis yields a formulation of the attacks’ data requirements as well, and it also finds the size of the aimed key information in differential cryptanalysis as one of the factors affecting the success probability. We also discuss the issue of key dependence in linear cryptanalysis, which can be a serious limitation for this technique of attack.

Added 2002-07-26


Ambiguity of Ultrashort Pulses Retrieved from Intensity

CERIAS TR 2002-03
Jung-Ho Chung, Andrew M. Weiner
Download: PDF

We construct several examples showing that two distinct pulses can have identical intensity autocorrelations and power spectra, from which we infer that retrieval methods based on these two datasets alone produce ambiguous solutions.

Added 2002-07-26