University of Alabama

Displaying 1-40 of 41 results

  • White Papers // Oct 2013

    Digital Forensics in the Cloud

    Cloud computing offers immense opportunities for business and IT organizations by providing highly scalable infrastructure resources, pay-as-you-go service and low-cost on-demand computing. While clouds attract diverse organizations, the security and trustworthiness of cloud infrastructure has become a rising concern. Today's cloud computing architectures often lack support for computer forensic investigations....

    Provided By University of Alabama

  • White Papers // Sep 2013

    How Much Does Storage Really Cost? - Towards a Full Cost Accounting Model for Data Storage

    In the people everyday lives, they create massive amounts of data. But how much does it really cost to store data? With ever decreasing cost of storage media, a popular misconception is that the cost of storage has become cheaper than ever. However, they argue that the cost of storing...

    Provided By University of Alabama

  • White Papers // Feb 2013

    Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing

    The authors explore the use of extrinsic motivation to improve the state of user-centered security mechanisms. Specifically, they study applications of visual scores as user incentives in the context of secure device pairing. They develop a scoring functionality that can be integrated with traditional pairing approaches which involve the manual...

    Provided By University of Alabama

  • White Papers // Nov 2012

    Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing - Final

    Secure \"Pairing\" of wireless devices based on auxiliary or Out-Of-Band (OOB) - audio, visual or tactile - communication is a well-established research direction. Specifically, Authenticated as well as Secret OOB (AS-OOB) channels have been shown to be quite useful for this purpose. Pairing can be achieved by simply transmitting the...

    Provided By University of Alabama

  • White Papers // Nov 2012

    Towards Building Proofs of Past Data Possession in Cloud Forensics

    Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. A key task of digital forensics is to prove the presence of a particular file in a given storage system. Unfortunately, it is very hard to...

    Provided By University of Alabama

  • White Papers // Oct 2012

    The Enemy within: The Emerging Threats to Healthcare from Malicious Mobile Devices

    With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel...

    Provided By University of Alabama

  • White Papers // May 2012

    Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis

    Phishing has become a crippling problem for many of today's internet users. Despite innovations in preventative measures, phishing has evolved to become very hard to detect. Determining whether a particular site is a phishing site or not is difficult, causing many inexperienced users to fall victim. Phishing site operators often...

    Provided By University of Alabama

  • White Papers // May 2012

    MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2

    Malware and computer forensic researchers often communicate with malicious servers, either directly or indirectly, through the web browser or other ports utilized by malicious software. Communication with this form of adversary can sometimes necessitate the use of a proxy server in order to conceal the true origin of the researcher's...

    Provided By University of Alabama

  • White Papers // Apr 2012

    Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model

    In this paper, the authors introduce a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long messages sent over insecure channels as long as the sender and the receiver can additionally send a very short, e.g. 20 bit, authenticated message...

    Provided By University of Alabama

  • White Papers // Mar 2012

    Clustering Potential Phishing Websites Using DeepMD5

    Phishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive information by mimicking legitimate websites such as banks, product vendors, and service providers. Phishing websites are a pervasive and ongoing problem. Examining and analyzing a phishing website is a good first step in an investigation....

    Provided By University of Alabama

  • White Papers // Jan 2012

    Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model

    Many RFID tags store valuable information privy to their users that can easily be subject to unauthorized reading, leading to owner tracking or impersonation. RFID tags are also susceptible to different forms of relay attacks. This paper presents novel sensing-enabled defenses to unauthorized reading and relay attacks against RFID systems...

    Provided By University of Alabama

  • White Papers // Jan 2012

    Estimating Age Privacy Leakage in Online Social Networks

    The current Online Social Networks (OSNs) allow users to control and customize what personal information is available to other users. For example, a Facebook user - let's call the user alice can configure her account so that their friends can see their photos and interests, but the general public can...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Power Aware Load Balancing for Cloud Computing

    With the increased use of local cloud computing architectures, organizations are becoming aware of wasted power consumed by unutilized resources. In this paper, the authors present a load balancing approach to IaaS cloud architectures that is power aware. Since the cloud architecture implemented by local organizations tends to be heterogeneous,...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks

    In this paper, the authors propose to use probabilistic complexity theory, which is also known as the foundation of modern cryptography, to study very complex systems in the form of large-scale self-organizing networks. A very complex system is typically probabilistic and stochastic in its nature. In such a system, it...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Channel Assignment Algorithms for MRMC Wireless Mesh Networks

    The wireless mesh networks are considered as one of the vital elements in today's converged networks, providing high bandwidth and connectivity over large geographical areas. Mesh routers equipped with multiple radios can significantly overcome the capacity problem and increase the aggregate throughput of the network where single radio nodes suffer...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Selfless Inheritance

    Formal treatments of inheritance are rather scarce and those that do exist are often more suited for analysis of existing systems than as guides to language designers. One problem that adds complexity to previous efforts is the need to pass a reference to the original invoking object throughout the method...

    Provided By University of Alabama

  • White Papers // Aug 2011

    High-Performance Content-Based Phishing Attack Detection

    Phishers continue to alter the source code of the web pages used in their attacks to mimic changes to legitimate websites of spoofed brands and to avoid detection by phishing countermeasures. Manipulations can be as subtle as source code changes or as apparent as adding or removing significant content. To...

    Provided By University of Alabama

  • White Papers // Aug 2011

    Phishing: Crime That Pays

    Email phishing requires functional countermeasures, as does any crime those results in millions of dollars in yearly losses. Many financial institutions currently combat phishing by contracting takedown companies that remove relevant phishing websites as soon as possible after they are detected. By comparing the median time necessary for professionals to...

    Provided By University of Alabama

  • White Papers // Jul 2011

    Playful Security: A Computer Game for Secure Wireless Device Pairing

    The secure "Pairing" of wireless devices based on out-of-band communication is an established research direction. Unfortunately, this approach is prone to human errors that lead to man-in-the-middle attacks. To address this and to better motivate users, this paper proposes the use of computer games for pairing. Games make the pairing...

    Provided By University of Alabama

  • White Papers // Jan 2011

    Investigating the Use of Model-Driven Generative Techniques for Middleware Performance Analysis

    The increasing demand for faster availability of new, feature-rich and high performance network-centric services imposes the need for these services to be rapidly developed via composition, configuration and assembly of standards middleware building blocks. However, the decisions on the systems compositions must be validated for performance guarantees at design time,...

    Provided By University of Alabama

  • White Papers // Oct 2010

    Poster Abstract: Local Cloud Deployment in a Limited IP Setting

    This paper is intended to be an introduction to the current research on cloud and distributed computing. The focus of the research began with the deployment of a cloud computing system. Realizing the implications of deploying such a system in an environment with limited networking resources (IP addresses), the authors...

    Provided By University of Alabama

  • White Papers // Aug 2010

    Security Attacks and Solutions in Clouds

    Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many new security risks. In this paper, the authors identify the possible security attacks on clouds including: wrapping attacks, malware-injection attacks, flooding attacks, browser attacks, and also accountability checking problems. They identify...

    Provided By University of Alabama

  • White Papers // Jul 2010

    I-Interaction: An Intelligent In-Vehicle User Interaction Model

    The automobile is always a point of interest where new technology has been deployed. Because of this interest, human-vehicle interaction has been an appealing area for much research in recent years. The current in-vehicle design has been improved but still possesses some of the design from the traditional interaction style....

    Provided By University of Alabama

  • White Papers // Apr 2010

    Android OS: A Robust, Free, Open-Source Operating System for Mobile Devices

    Mobile devices have seen an extensive amount of development in recent years, but one question is still looming and nobody seems to have the answer: what is 'standard' for the mobile platform? Many companies have already written their own in-house operating systems for the devices they manufacture such as Symbian...

    Provided By University of Alabama

  • White Papers // Apr 2010

    Keep Your Feet on the Ground When Moving Software Into the Cloud

    Cloud computing and Web 2.0 are the latest buzzwords in the IT world. Cloud computing is on every software supplier's website from Amazon to Yahoo!. Open any newspaper, business journal or computer magazine and one will find an article on cloud computing. The Gartner group reported that "Worldwide cloud services...

    Provided By University of Alabama

  • White Papers // Mar 2010

    Recession Challenged Alabama's Automotive Industry

    Alabama's automotive industry was launched and grew during an era when light trucks (pickups, minivans, and SUVs) were king and U.S. sales were relatively steady at close to 17 million passenger vehicles annually. The state's first auto manufacturing got underway in 1997 at Mercedes-Benz U.S. International in Tuscaloosa County; a...

    Provided By University of Alabama

  • White Papers // Jan 2010

    How Strategic Planning Keeps You Sane When Delivering Distance Programs

    This paper details the advantages of creating a strategic plan in the development and delivery of distance programs at the authors' own institution. The steps involved in the planning process and the three key elements of a successful strategic plan are addressed. The key elements include a program plan explaining...

    Provided By University of Alabama

  • White Papers // Dec 2009

    Middleware Design in Wireless Sensor Networks

    This paper will introduce the middleware architecture of a WSN. The discussions are based on the summarization of [Miaomiao08]. If the readers want to understand more details, please refer to [Miaomiao08] for a comprehensive survey. Typically, the network protocol stack can be classified into 5 layers from top to bottom:...

    Provided By University of Alabama

  • White Papers // Jun 2009

    New Artificial Intelligence Systems for Improving Student Math Skills: Assessment and Learning in Knowledge Spaces (ALEKS)

    Artificial intelligence technology for advancing mathematical understanding is achieving new gains through a computer software called Assessment and Learning in Knowledge Spaces (ALEKS). ALEKS, an artificial intelligence system developed by a team of researchers at New York University and the University of California through the support of the National Science...

    Provided By University of Alabama

  • White Papers // Jun 2009

    Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs

    It has been shown that most phishing sites are created by means of a vulnerable web server being repurposed by a phisher to host a counterfeit website without the knowledge of the server's owner. In this paper, the authors examine common vulnerabilities which allow these phishing sites to be created...

    Provided By University of Alabama

  • White Papers // Jun 2009

    High-Speed Parallel Architecture of the Whirlpool Hash Function

    Whirlpool hash function should be capable of processing the input data streams at high speeds. The authors propose a fully synchronous parallel pipelined architecture with ten stages of pipelining between rounds, and internal pipelining within each round stage. The proposed architecture can tremendously improve the performance of Whirlpool hash function....

    Provided By University of Alabama

  • White Papers // May 2009

    An Online Energy-Efficient Routing Protocol With Traffic Load Prospects in Wireless Sensor Networks

    In wireless sensor networks, many routing algorithms are designed to implement energy-efficient mechanisms. Among those, some focus on maximising an important performance index called network lifetime, which is the number of messages successfully delivered in the network before a failure. In this paper, the authors propose a new online algorithm...

    Provided By University of Alabama

  • White Papers // May 2009

    An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors

    An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring data integrity and confidentiality is of the utmost importance in many such applications. This paper describes a practical implementation of security extensions for embedded systems built around...

    Provided By University of Alabama

  • White Papers // May 2009

    CEOs Under Fire: Pressure From Within The Effects Of Inside Directors On CEO Compensation And Turnover

    Are all non-CEO inside directors associated with greater CEO power or can certain inside directors strengthen board bargaining power? While it is often presumed that inside directors give CEOs greater power, the author provides evidence that certain inside directors increase labor market forces acting on the CEO benefiting shareholders. First,...

    Provided By University of Alabama

  • White Papers // Apr 2009

    Let The Games Begin: Positive And Negative Influences Of Video Games In The K-12 Classroom

    Children in elementary, middle, and high schools have become obsessed with computer generated games. Children once rushed to after school sports, extracurricular activities, and even homework. Now, it seems as if everyone is rushing to a video game. Because video games are so popular and fascinating, it is easy to...

    Provided By University of Alabama

  • White Papers // Apr 2009

    Multiple Radio Channel Assignment Utilizing Partially Overlapped Channels

    Existing channel assignment algorithms designed for Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC-WMN) mainly deal with orthogonal or non-overlapped channels. But in reality, the limited availability of orthogonal channel is a major issue where the network is very dense in terms of inter-nodal distances. On the other hand, Partially Overlapped Channels...

    Provided By University of Alabama

  • White Papers // Dec 2008

    Teaching Data Mining: The University of Alabama and SAS

    The University of Alabama (UA) and SAS developed a partnership whereby students who complete a sequence of four graduate-level courses can receive a joint Data Mining Certificate from UA and SAS. Recently, the opportunity to earn this certificate has been made available to MBA students as well. This paper will...

    Provided By University of Alabama

  • White Papers // Nov 2008

    Arbitrary Dimension Reed-Solomon Coding and Decoding for Extended RAID on GPUs

    Reed-Solomon coding is a method of generating arbitrary amounts of checksum information from original data via matrix-vector multiplication in finite fields. Previous work has shown that CPUs are not well-matched to this type of computation, but recent Graphical Processing Units (GPUs) have been shown through a case study to perform...

    Provided By University of Alabama

  • White Papers // Nov 2008

    Automating Phishing Website Identification Through Deep MD5 Matching

    The timeliness of phishing incident response is hindered by the need for human verification of whether suspicious URLs are actually phishing sites. This paper presents a method for automating the determination, and demonstrates the effectiveness of this method in reducing the number of suspicious URLs that need human review through...

    Provided By University of Alabama

  • White Papers // May 2008

    ORUIES: Object Oriented User Interface for Embedded Systems

    This paper introduces the Object Oriented User Interface for Embedded Systems (ORUIES), which is based on the Architecture Description Language concept, specifically the Simulation Architecture Description Language (SADL) developed by NASA. ORUIES is a graphical interface which allows the user to draw directed graphs representing system components, and interprets these...

    Provided By University of Alabama

  • White Papers // May 2008

    ORUIES: Object Oriented User Interface for Embedded Systems

    This paper introduces the Object Oriented User Interface for Embedded Systems (ORUIES), which is based on the Architecture Description Language concept, specifically the Simulation Architecture Description Language (SADL) developed by NASA. ORUIES is a graphical interface which allows the user to draw directed graphs representing system components, and interprets these...

    Provided By University of Alabama

  • White Papers // Jun 2009

    High-Speed Parallel Architecture of the Whirlpool Hash Function

    Whirlpool hash function should be capable of processing the input data streams at high speeds. The authors propose a fully synchronous parallel pipelined architecture with ten stages of pipelining between rounds, and internal pipelining within each round stage. The proposed architecture can tremendously improve the performance of Whirlpool hash function....

    Provided By University of Alabama

  • White Papers // Aug 2010

    Security Attacks and Solutions in Clouds

    Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many new security risks. In this paper, the authors identify the possible security attacks on clouds including: wrapping attacks, malware-injection attacks, flooding attacks, browser attacks, and also accountability checking problems. They identify...

    Provided By University of Alabama

  • White Papers // Apr 2010

    Keep Your Feet on the Ground When Moving Software Into the Cloud

    Cloud computing and Web 2.0 are the latest buzzwords in the IT world. Cloud computing is on every software supplier's website from Amazon to Yahoo!. Open any newspaper, business journal or computer magazine and one will find an article on cloud computing. The Gartner group reported that "Worldwide cloud services...

    Provided By University of Alabama

  • White Papers // May 2009

    CEOs Under Fire: Pressure From Within The Effects Of Inside Directors On CEO Compensation And Turnover

    Are all non-CEO inside directors associated with greater CEO power or can certain inside directors strengthen board bargaining power? While it is often presumed that inside directors give CEOs greater power, the author provides evidence that certain inside directors increase labor market forces acting on the CEO benefiting shareholders. First,...

    Provided By University of Alabama

  • White Papers // Jul 2011

    Playful Security: A Computer Game for Secure Wireless Device Pairing

    The secure "Pairing" of wireless devices based on out-of-band communication is an established research direction. Unfortunately, this approach is prone to human errors that lead to man-in-the-middle attacks. To address this and to better motivate users, this paper proposes the use of computer games for pairing. Games make the pairing...

    Provided By University of Alabama

  • White Papers // Apr 2009

    Multiple Radio Channel Assignment Utilizing Partially Overlapped Channels

    Existing channel assignment algorithms designed for Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC-WMN) mainly deal with orthogonal or non-overlapped channels. But in reality, the limited availability of orthogonal channel is a major issue where the network is very dense in terms of inter-nodal distances. On the other hand, Partially Overlapped Channels...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Power Aware Load Balancing for Cloud Computing

    With the increased use of local cloud computing architectures, organizations are becoming aware of wasted power consumed by unutilized resources. In this paper, the authors present a load balancing approach to IaaS cloud architectures that is power aware. Since the cloud architecture implemented by local organizations tends to be heterogeneous,...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Channel Assignment Algorithms for MRMC Wireless Mesh Networks

    The wireless mesh networks are considered as one of the vital elements in today's converged networks, providing high bandwidth and connectivity over large geographical areas. Mesh routers equipped with multiple radios can significantly overcome the capacity problem and increase the aggregate throughput of the network where single radio nodes suffer...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Selfless Inheritance

    Formal treatments of inheritance are rather scarce and those that do exist are often more suited for analysis of existing systems than as guides to language designers. One problem that adds complexity to previous efforts is the need to pass a reference to the original invoking object throughout the method...

    Provided By University of Alabama

  • White Papers // Nov 2008

    Arbitrary Dimension Reed-Solomon Coding and Decoding for Extended RAID on GPUs

    Reed-Solomon coding is a method of generating arbitrary amounts of checksum information from original data via matrix-vector multiplication in finite fields. Previous work has shown that CPUs are not well-matched to this type of computation, but recent Graphical Processing Units (GPUs) have been shown through a case study to perform...

    Provided By University of Alabama

  • White Papers // Oct 2011

    Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks

    In this paper, the authors propose to use probabilistic complexity theory, which is also known as the foundation of modern cryptography, to study very complex systems in the form of large-scale self-organizing networks. A very complex system is typically probabilistic and stochastic in its nature. In such a system, it...

    Provided By University of Alabama

  • White Papers // May 2009

    An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors

    An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring data integrity and confidentiality is of the utmost importance in many such applications. This paper describes a practical implementation of security extensions for embedded systems built around...

    Provided By University of Alabama

  • White Papers // Oct 2012

    The Enemy within: The Emerging Threats to Healthcare from Malicious Mobile Devices

    With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel...

    Provided By University of Alabama

  • White Papers // Nov 2012

    Towards Building Proofs of Past Data Possession in Cloud Forensics

    Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. A key task of digital forensics is to prove the presence of a particular file in a given storage system. Unfortunately, it is very hard to...

    Provided By University of Alabama

  • White Papers // Dec 2008

    Teaching Data Mining: The University of Alabama and SAS

    The University of Alabama (UA) and SAS developed a partnership whereby students who complete a sequence of four graduate-level courses can receive a joint Data Mining Certificate from UA and SAS. Recently, the opportunity to earn this certificate has been made available to MBA students as well. This paper will...

    Provided By University of Alabama

  • White Papers // Jan 2010

    How Strategic Planning Keeps You Sane When Delivering Distance Programs

    This paper details the advantages of creating a strategic plan in the development and delivery of distance programs at the authors' own institution. The steps involved in the planning process and the three key elements of a successful strategic plan are addressed. The key elements include a program plan explaining...

    Provided By University of Alabama

  • White Papers // Dec 2009

    Middleware Design in Wireless Sensor Networks

    This paper will introduce the middleware architecture of a WSN. The discussions are based on the summarization of [Miaomiao08]. If the readers want to understand more details, please refer to [Miaomiao08] for a comprehensive survey. Typically, the network protocol stack can be classified into 5 layers from top to bottom:...

    Provided By University of Alabama

  • White Papers // Apr 2010

    Android OS: A Robust, Free, Open-Source Operating System for Mobile Devices

    Mobile devices have seen an extensive amount of development in recent years, but one question is still looming and nobody seems to have the answer: what is 'standard' for the mobile platform? Many companies have already written their own in-house operating systems for the devices they manufacture such as Symbian...

    Provided By University of Alabama

  • White Papers // Apr 2009

    Let The Games Begin: Positive And Negative Influences Of Video Games In The K-12 Classroom

    Children in elementary, middle, and high schools have become obsessed with computer generated games. Children once rushed to after school sports, extracurricular activities, and even homework. Now, it seems as if everyone is rushing to a video game. Because video games are so popular and fascinating, it is easy to...

    Provided By University of Alabama

  • White Papers // Mar 2010

    Recession Challenged Alabama's Automotive Industry

    Alabama's automotive industry was launched and grew during an era when light trucks (pickups, minivans, and SUVs) were king and U.S. sales were relatively steady at close to 17 million passenger vehicles annually. The state's first auto manufacturing got underway in 1997 at Mercedes-Benz U.S. International in Tuscaloosa County; a...

    Provided By University of Alabama

  • White Papers // Oct 2010

    Poster Abstract: Local Cloud Deployment in a Limited IP Setting

    This paper is intended to be an introduction to the current research on cloud and distributed computing. The focus of the research began with the deployment of a cloud computing system. Realizing the implications of deploying such a system in an environment with limited networking resources (IP addresses), the authors...

    Provided By University of Alabama

  • White Papers // Jun 2009

    New Artificial Intelligence Systems for Improving Student Math Skills: Assessment and Learning in Knowledge Spaces (ALEKS)

    Artificial intelligence technology for advancing mathematical understanding is achieving new gains through a computer software called Assessment and Learning in Knowledge Spaces (ALEKS). ALEKS, an artificial intelligence system developed by a team of researchers at New York University and the University of California through the support of the National Science...

    Provided By University of Alabama

  • White Papers // Jul 2010

    I-Interaction: An Intelligent In-Vehicle User Interaction Model

    The automobile is always a point of interest where new technology has been deployed. Because of this interest, human-vehicle interaction has been an appealing area for much research in recent years. The current in-vehicle design has been improved but still possesses some of the design from the traditional interaction style....

    Provided By University of Alabama

  • White Papers // Jan 2011

    Investigating the Use of Model-Driven Generative Techniques for Middleware Performance Analysis

    The increasing demand for faster availability of new, feature-rich and high performance network-centric services imposes the need for these services to be rapidly developed via composition, configuration and assembly of standards middleware building blocks. However, the decisions on the systems compositions must be validated for performance guarantees at design time,...

    Provided By University of Alabama

  • White Papers // May 2009

    An Online Energy-Efficient Routing Protocol With Traffic Load Prospects in Wireless Sensor Networks

    In wireless sensor networks, many routing algorithms are designed to implement energy-efficient mechanisms. Among those, some focus on maximising an important performance index called network lifetime, which is the number of messages successfully delivered in the network before a failure. In this paper, the authors propose a new online algorithm...

    Provided By University of Alabama

  • White Papers // Jun 2009

    Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs

    It has been shown that most phishing sites are created by means of a vulnerable web server being repurposed by a phisher to host a counterfeit website without the knowledge of the server's owner. In this paper, the authors examine common vulnerabilities which allow these phishing sites to be created...

    Provided By University of Alabama

  • White Papers // Nov 2008

    Automating Phishing Website Identification Through Deep MD5 Matching

    The timeliness of phishing incident response is hindered by the need for human verification of whether suspicious URLs are actually phishing sites. This paper presents a method for automating the determination, and demonstrates the effectiveness of this method in reducing the number of suspicious URLs that need human review through...

    Provided By University of Alabama

  • White Papers // Mar 2012

    Clustering Potential Phishing Websites Using DeepMD5

    Phishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive information by mimicking legitimate websites such as banks, product vendors, and service providers. Phishing websites are a pervasive and ongoing problem. Examining and analyzing a phishing website is a good first step in an investigation....

    Provided By University of Alabama

  • White Papers // Dec 2006

    The Use of Encryption in it Control and in the Security of Data and Information

    In this paper, the authors present an overview of data encryption methods that may be used to protect data from unauthorized access. Data encryption has come to the forefront as an important method of protecting data due to legislation such as HIPAA as well as privacy concerns expressed by individuals....

    Provided By University of Alabama

  • White Papers // Aug 2011

    High-Performance Content-Based Phishing Attack Detection

    Phishers continue to alter the source code of the web pages used in their attacks to mimic changes to legitimate websites of spoofed brands and to avoid detection by phishing countermeasures. Manipulations can be as subtle as source code changes or as apparent as adding or removing significant content. To...

    Provided By University of Alabama

  • White Papers // Aug 2011

    Phishing: Crime That Pays

    Email phishing requires functional countermeasures, as does any crime those results in millions of dollars in yearly losses. Many financial institutions currently combat phishing by contracting takedown companies that remove relevant phishing websites as soon as possible after they are detected. By comparing the median time necessary for professionals to...

    Provided By University of Alabama

  • White Papers // Oct 2013

    Digital Forensics in the Cloud

    Cloud computing offers immense opportunities for business and IT organizations by providing highly scalable infrastructure resources, pay-as-you-go service and low-cost on-demand computing. While clouds attract diverse organizations, the security and trustworthiness of cloud infrastructure has become a rising concern. Today's cloud computing architectures often lack support for computer forensic investigations....

    Provided By University of Alabama

  • White Papers // Jan 2012

    Estimating Age Privacy Leakage in Online Social Networks

    The current Online Social Networks (OSNs) allow users to control and customize what personal information is available to other users. For example, a Facebook user - let's call the user alice can configure her account so that their friends can see their photos and interests, but the general public can...

    Provided By University of Alabama

  • White Papers // Jan 2012

    Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model

    Many RFID tags store valuable information privy to their users that can easily be subject to unauthorized reading, leading to owner tracking or impersonation. RFID tags are also susceptible to different forms of relay attacks. This paper presents novel sensing-enabled defenses to unauthorized reading and relay attacks against RFID systems...

    Provided By University of Alabama

  • White Papers // May 2012

    MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2

    Malware and computer forensic researchers often communicate with malicious servers, either directly or indirectly, through the web browser or other ports utilized by malicious software. Communication with this form of adversary can sometimes necessitate the use of a proxy server in order to conceal the true origin of the researcher's...

    Provided By University of Alabama

  • White Papers // May 2012

    Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis

    Phishing has become a crippling problem for many of today's internet users. Despite innovations in preventative measures, phishing has evolved to become very hard to detect. Determining whether a particular site is a phishing site or not is difficult, causing many inexperienced users to fall victim. Phishing site operators often...

    Provided By University of Alabama

  • White Papers // Sep 2013

    How Much Does Storage Really Cost? - Towards a Full Cost Accounting Model for Data Storage

    In the people everyday lives, they create massive amounts of data. But how much does it really cost to store data? With ever decreasing cost of storage media, a popular misconception is that the cost of storage has become cheaper than ever. However, they argue that the cost of storing...

    Provided By University of Alabama

  • White Papers // Feb 2013

    Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing

    The authors explore the use of extrinsic motivation to improve the state of user-centered security mechanisms. Specifically, they study applications of visual scores as user incentives in the context of secure device pairing. They develop a scoring functionality that can be integrated with traditional pairing approaches which involve the manual...

    Provided By University of Alabama

  • White Papers // Apr 2012

    Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model

    In this paper, the authors introduce a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long messages sent over insecure channels as long as the sender and the receiver can additionally send a very short, e.g. 20 bit, authenticated message...

    Provided By University of Alabama