no code implementations • 5 Oct 2022 • Tyler Kaczmarek, Ercan Ozturk, Pier Paolo Tricomi, Gene Tsudik
We report results gathered for many representative passwords based on a user study involving 19 subjects.
1 code implementation • 25 Sep 2019 • Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik
Security and privacy of the Internet Domain Name System (DNS) have been longstanding concerns.
Cryptography and Security
1 code implementation • 7 Aug 2019 • Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
This prompts the following three questions: (1) How to trust data produced by a simple remote embedded device?
Cryptography and Security
no code implementations • 30 Mar 2019 • Kiran Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu
This paper studies leakage of user passwords and PINs based on observations of typing feedback on screens or from projectors in the form of masked characters that indicate keystrokes.
Cryptography and Security K.6.5
1 code implementation • 1 Nov 2018 • Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
In this work, we take the first step towards formal verification of Remote Attestation (RA) by designing and verifying an architecture called VRASED: Verifiable Remote Attestation for Simple Embedded Devices.
Cryptography and Security
1 code implementation • 25 May 2016 • Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices.
Cryptography and Security
no code implementations • 19 May 2014 • Mishari Almishari, Ekin Oguz, Gene Tsudik
Finally, we explore the combination of crowdsourcing and machine translation and report on the results.