Unauthorized data destruction results in a loss of digital information and services, a devastating issue for society and commerce that rely on the availability and integrity of such systems. Remote adversaries who seek to destroy or alter digital information persistently study the protection mechanisms and craft attacks that circumvent defense mechanisms such as data back-up or recovery. This dissertation evaluates the use of deception to enhance the preservation of data under the threat of unauthorized data destruction attacks. The motivation for the proposed solution is two-fold. (i) An honest and consistent view of the preservation mechanisms are observable and often controlled from within the system under protection, allowing the advers...
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are ...
This dissertation treats a variety of topics in the computer security domain which have direct impac...
Abstract — Over the years, malicious entities in cyber-space have grown smarter and resourceful. For...
Unauthorized data destruction results in a loss of digital information and services, a devastating i...
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
In recent years, our society has seen a shift towards a reliance on digital means of data storage. T...
International audienceModern workstations and servers implicitly trust hard disks to act as well-beh...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
In computer systems, manufacturing variances and hardware effects are typically abstracted away by t...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Threats against computer networks continue to multiply, but existing security solutions are persiste...
The hard disk drive stores data the user is creating, modifying, and deleting while a firmware facil...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
AbstractTo a great degree, research in memory forensics concentrates on the acquisition and analysis...
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are ...
This dissertation treats a variety of topics in the computer security domain which have direct impac...
Abstract — Over the years, malicious entities in cyber-space have grown smarter and resourceful. For...
Unauthorized data destruction results in a loss of digital information and services, a devastating i...
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
In recent years, our society has seen a shift towards a reliance on digital means of data storage. T...
International audienceModern workstations and servers implicitly trust hard disks to act as well-beh...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
In computer systems, manufacturing variances and hardware effects are typically abstracted away by t...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Threats against computer networks continue to multiply, but existing security solutions are persiste...
The hard disk drive stores data the user is creating, modifying, and deleting while a firmware facil...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Aim: With the widespread adoption of disk encryption technologies, it has become common for adversar...
AbstractTo a great degree, research in memory forensics concentrates on the acquisition and analysis...
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are ...
This dissertation treats a variety of topics in the computer security domain which have direct impac...
Abstract — Over the years, malicious entities in cyber-space have grown smarter and resourceful. For...