Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
Doctoral Dissertations
Security experts recommend password managers to help users generate, store, and enter strong, unique passwords. Prior research confirms that managers do help users move towards these objectives, but it also identified usability and security issues that had the potential to leak user data or prevent users from making full use of their manager. In this dissertation, I set out to measure to what extent modern managers have addressed these security issues on both desktop and mobile environments. Additionally, I have interviewed individuals to understand their password management behavior.
I begin my analysis by conducting the first security evaluation of the …
Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai
Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai
Doctoral Dissertations
In the Internet, network traffic between endpoints typically follows one path that is determined by the control plane. Endpoints have little control over the choice of which path their network traffic takes and little ability to verify if the traffic indeed follows a specific path. With the emergence of software-defined networking (SDN), more control over connections can be exercised, and thus the opportunity for novel solutions exists. However, there remain concerns about the attack surface exposed by fine-grained control, which may allow attackers to inject and redirect traffic. To address these opportunities and concerns, we consider two specific challenges: (1) …
Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev
Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev
Doctoral Dissertations
Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …