The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Virtual Orality: How eBay Controls Auctions without an Auctioneer's Voice

CERIAS TR 2002-18
Josh Boyd
Download: PDF

Auctions are communication-intensive enterprises.  Most scholarly examinations of auctions, however, have come from economics and sociology.  This paper applies a communication perspective to eBay, the largest online auction, and argues that eBay has maintained safety, order, and interest in its auctions by mimicking the oral style of the auctioneer and following the rules of in-person auctions, but in a virtual space.

Added 2001-03-06

Detecting the Abnormal: Machine Learning in Computer Security

COAST TR 97-02
Lane, T., Brodley, C.
Download:
Added 2001-01-01

Use of A Taxonomy of Security Faults

COAST TR 96-05
Aslam, T., Krsul, I., Spafford, E.
Download:
Added 2001-01-01

IDIOT - Users Guide

COAST TR 96-04
Crosbie, M., Dole, B., Ellis, T., Krsul, I., Spafford, E.
Download:
Added 2001-01-01

A Secure Message Broadcast System (SMBS)

COAST TR 96-01, CSD-TR-96-019
Crosbie, M., Krsul, I., Lodin, S., Spafford, E.
Download: PDF

This paper describes the design and implementation of a secure message broadcast system (SMBS). It is a secure, multi-party chat program that ensures privacy in communication and does not rely on shared secret keys. The system was built as a study of the feasibility of building effective communication tools using zero knowledge proofs. There is a general consensus in the computer security community that traditional password based authentication mechanisms are insuficient in today’s globally connected environment. Mechanisms such as one-time-passwords are a partial solution to the problem. The issue that these protocols don’t address is the lack of mutual authentication. The Kerberos family of systems addresses the issue of mutual authentication but relies heavily on the physical security of the server and safekeeping of the password database.

Added 2001-01-01

Defending a Computer System using Autonomous Agents

COAST TR 95-02
Crosbie, M., Spafford, E.
Download: PDF
Added 2001-01-01

A Taxonomy Of Security Faults In The Unix Operating System

COAST TR 95-09
Aslam, T.
Download:

Security in computer systems is important to ensure reliable operation and protect the integrity of stored information.  Faults in the implementation can be exploited to breach security and penetrate an operating system.  These faults must be identified, detected, and corrected to ensure reliability and safe-guard against denial of service, unauthorized modification of data, or disclosure of information. We define a classification of security faults in the Unix operating system.  We state the criteria used to categorize the faults and present examples of the different fault types. We present the design and implementation details of a database to store vulnerability information collected from different sources.  The data is organized according to our fault categories.  the information in the database can be applied in static audit analysis of systems, intrusion detection, and fault detection.  We also identify and describe software testing methods that should be effective in detecting different faults in our classification scheme.

Added 1970-01-01

Penetration Analysis of a XEROX Docucenter DC 230ST: Assessing the Security of a Multi-Purpose Office Machine

CERIAS TR 1999-09
Thomas E. Daniels, Benjamin A. Kuperman, Eugene H. Spafford
Download: PDF
Added 1900-01-01

A prototype for a distributed Intrusion Detection System

COAST TR 98-06
Zamboni, D., Spafford, E.
Added 1900-01-01

An Algorithm for Estimating All Matches Between Two Strings

COAST TR 97-18
Mikhail J. Atallah, Frederic Chyzak, Philippe Dumas
Download:
Added 1900-01-01

Prototyping Experiences with Classical IP and ARP over Signaled ATM Connections (Prototyping Experiences with IP over ATM)

COAST TR 97-16
Schuba, C., Spafford, E., Kercheval, B.
Download:
Added 1900-01-01

Host-Based Misuse Detection and Conventional Operating Systems

COAST TR 97-15
Price, Katherine
Download:

Computing systems have evolved from stand-aone mainframes to comlex, interconnected open systems, and this evolution has lead to proliferation of avenues of attack.  With the knowledge that system misusers have open avenues for attack, misuse detection provides an important line of defense.  For a misuse detection system to be effective, there needs to be an audit trail of system activity that was designed to support misuse detection needs. A major challenge in misuse detection is that audit data is inadequate.  The data supplied by current auditing systems lack content useful for misuse detection, and there is no widely accepted audit trail standard. This thesis presents a comparison of the needs of host-based misuse detection with the capabilities of auditing facilities of convential operating systems.  Host-based misuse detection systems are examined, and the audit data used by each are outlined.  Auditing systems of convential operating systems are also examined, and the data colected by each are outlined.  A comparison of the needs of the misuse detection systems and the capabilities of existing auditing facilities is then presented.  the results of this study aid in the determination of what data content should be provided by auditing systems for the support of misuse detection goals.

Added 1900-01-01

Preliminary Computer Vulnerability Classifications

COAST TR 97-14
Krsul, I., Spafford, E.
Added 1900-01-01

A New Approach to the Specification of General Computer Security Policies

COAST TR 97-13
Krsul, I., Tuglular, T., Spafford, E.
Added 1900-01-01

COAST Vulnerability Database Reference Guide - Draft Version

COAST TR 97-12
Krsul, I
Added 1900-01-01