Citations
The paper
has been cited by the following works.
- M.D. Aime, P.C. Pomi, and
M. Vallini.
Policy-driven system configuration for dependability.
In Proceedings — 2nd Int. Conf. Emerging Security Inf., Systems and
Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on
Dependability and Security in Complex and Critical Inf. Sys., pages
420–425, 2008.
(doi:10.1109/SECURWARE.2008.54)
- Y. Alkabani and
F. Koushanfar.
Designer's hardware Trojan horse.
In HOST 2008: IEEE International Workshop on Hardware-Oriented Security
and Trust, pages 82–83, 2008.
(doi:10.1109/HST.2008.4559059)
- S.M. Bellovin,
M. Blaze, W. Diffie, S. Landau, P.G. Neumann, and J. Rexford.
Risking communications security: Potential hazards of the Protect America
Act.
IEEE Security and Privacy, 6(1):24–33, 2008.
(doi:10.1109/MSP.2008.17)
- I. Dacosta, N. Mehta,
E. Metrock, and J. Giffin.
Security analysis of an IP phone: Cisco 7960G.
In IPTComm 2008: Principles, Systems and Applications of IP
Telecommunications. Services and Security for Next Generation Networks —
Second International Conference, pages 236–255, July 2008.
Lecture Notes in Computer Science 5310.
(doi:10.1007/978-3-540-89054-6-12)
- M. Gegick, L. Williams,
J. Osborne, and M. Vouk.
Prioritizing software security fortification through code-level metrics.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 31–37, 2008.
(doi:10.1145/1456362.1456370)
- F. Hashim, M.R. Kibria,
and A. Jamalipour.
A detection and recovery architecture against DoS and worm attacks in NGMN.
In IEEE International Conference on Communications, pages
1675–1679, 2008.
(doi:10.1109/ICC.2008.323)
- K. Kotapati, P. Liu,
and T.F. LaPorta.
EndSec: An end-to-end message security protocol for mobile telecommunication
networks.
In WoWMoM 2008: IEEE International Symposium on A World of Wireless,
Mobile and Multimedia Networks, 2008.
(doi:10.1109/WOWMOM.2008.4594919)
- J.A. Roy, F. Koushanfar, and
I.L. Markov.
Circuit CAD tools as a security threat.
In HOST 2008: IEEE International Workshop on Hardware-Oriented Security
and Trust, pages 65–66, 2008.
(doi:10.1109/HST.2008.4559052)
- M.B. Salem,
S. Hershkop, and S.J. Stolfo.
A survey of insider attack detection research.
Advances in Information Security, 39:69–70, 2008.
- F.J. Seifert.
Safety from deception through broadband coding the Austrian victory over the
hackers at Graz in 1991.
Elektrotechnik und Informationstechnik, 125(11), 2008.
In German (Täuschungssicherheit durch Breitbandige Verschlüsselung Der
Österreichische Sieg uber die Hacker bei Graz 1991).
(doi:10.1007/s00502-008-0588-y)
- P. Traynor,
P. McDaniel, and T.L. Porta.
Security for telecommunications networks.
Advances in Information Security, 40:1–177, 2008.
- P. Bosch, A. Brusilovsky,
R. McLellan, S. Mullender, and P. Polakos.
Secure base stations.
Bell Labs Technical Journal, 13(4):227–244, 2009.
(doi:10.1002/bltj.20346)
- I. Kantzavelou
and S. Katsikas.
Playing games with internal attackers repeatedly.
In 2009 16th International Conference on Systems, Signals and Image
Processing, IWSSIP 2009, 2009.
(doi:10.1109/IWSSIP.2009.5367708)
- K. Kotapati, P. Liu,
and T.F. La Porta.
Evaluating MAPSec by marking attack graphs.
Wireless Networks, 15(8):1042–1058, 2009.
(doi:10.1007/s11276-008-0101-x)
- G. Me, D. Pirro, and
R. Sarrecchia.
Strong authentication for financial services: PTDs as a compromise between
security and usability.
In Mobile and Ubiquitous Commerce: Advanced E-Business Methods,
pages 101–114. IGI Global, 2009.
(doi:10.4018/978-1-60566-366-1.ch007)
- W.A. Owens, K.W. Dam,
H.S. Lin, and National Research Council.
Technology, policy, law, and ethics regarding U.S. acquisition and use of
cyberattack capabilities.
National Academy of Sciences, 2009.
(doi:10.17226/12651)
- F.S. Park, C. Gangakhedkar,
and P. Traynor.
Leveraging cellular infrastructure to improve fraud prevention.
In Proceedings - Annual Computer Security Applications Conference,
ACSAC, pages 350–359, 2009.
(doi:10.1109/ACSAC.2009.40)
- M. Sherr, G. Shah,
E. Cronin, S. Clark, and M. Blaze.
Can they hear me now? a security analysis of law enforcement wiretaps.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 512–523, 2009.
(doi:10.1145/1653662.1653724)
- M.D. Aime, P.C. Pomi, and
M. Vallini.
Ontology and algorithms for the dependable configuration of information
systems.
International Journal of Critical Computer-Based Systems,
1(4):310–335, 2010.
- D. Forte and
A. de Donno.
Mobile network investigations.
In Handbook of Digital Forensics and Investigation, pages
517–557. Elsevier Ltd, 2010.
(doi:10.1016/B978-0-12-374267-4.00010-0)
- A.S. Mousas,
A. Antonakopoulou, F. Gogoulos, G.V. Lioudakis, D.I. Kaklamani, and I.S.
Venieris.
Visualising access control: The PRISM approach.
In Proceedings - 14th Panhellenic Conference on Informatics, PCI
2010, pages 107–111, 2010.
(doi:10.1109/PCI.2010.52)
- B. Van Niekerk
and M. Maharaj.
Mobile security from an information warfare perspective.
In Proceedings of the 2010 Information Security for South Africa
Conference, ISSA 2010, 2010.
(doi:10.1109/ISSA.2010.5588339)
- S.F. Karabag and
C. Berggren.
Mobile communications in turkey: From first mover advantages to management
capabilities.
Info, 13(2):72–84, 2011.
(doi:10.1108/14636691111121647)
- Susan Landau.
Surveillance or Security?: The Risks Posed by New Wiretapping
Technologies.
The MIT Press, 2011.
- United States
House of Representatives. Committee on the Judiciary. Subcommittee on Crime,
Terrorism and Homeland Security.
Hearing
on: the ``going dark: Lawful electronic surveillance in the face of new
technologies''. testimony of susan landau.
Available online
http://judiciary.house.gov/_files/hearings/printers/112th/112-59_64581.pdf,
February 2011.
Serial No. 112-59. U.S. Government Printing Office. Washington.
- H. Lin.
Operational considerations in cyber attack and cyber exploitation.
In Cyberspace and National Security: Threats, Opportunities, and Power in
a Virtual World, pages 37–56. Georgetown University Press, 2012.
- S.M. Bellovin,
M. Blaze, S. Clark, and S. Landau.
Going bright: Wiretapping without weakening communications infrastructure.
IEEE Security and Privacy, 11(1):62–72, 2013.
(doi:10.1109/MSP.2012.138)
- Brian M. Bowen,
Pratap V. Prabhu, Vasileios P. Kemerlis, Stylianos Sidiroglou, Salvatore J.
Stolfo, and Angelos D. Keromytis.
Methods,
systems, and media for detecting covert malware.
United States Patent 8,528,091, September 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- M. Farooq-i
Azam and M.N. Ayyaz.
Embedded systems security.
Software Design and Development: Concepts, Methodologies, Tools, and
Applications, 2-4:980–998, 2013.
(doi:10.4018/978-1-4666-4301-7.ch047)
- J. Fitsanakis.
Digital Sparta: Information operations and cyber-warfare in Greece.
Cyber Conflict: Competing National Perspectives, pages 135–164,
2013.
(doi:10.1002/9781118562666.ch4)
- P. Liu, T.F. LaPorta,
and K. Kotapati.
Cellular network security.
In Network and System Security: Second Edition, pages 319–351.
Elsevier Inc., 2013.
(doi:10.1016/B978-0-12-416689-9.00011-3)
- P. Liu, T.F. LaPorta,
and K. Kotapati.
Cellular network security.
In Computer and Information Security Handbook, pages 323–343.
Elsevier Inc., 2013.
(doi:10.1016/B978-0-12-394397-2.00017-9)
- A. Mouhtaropoulos, P. Dimotikalis, and C.-T. Li.
Applying a digital forensic readiness framework: Three case studies.
In 2013 13th IEEE International Conference on Technologies for Homeland
Security, HST 2013, pages 217–223, 2013.
(doi:10.1109/THS.2013.6699003)
- C.R.
Suthikshn Kumar.
Portable speech encryption based anti-tapping device.
In 135th Audio Engineering Society Convention 2013, pages
523–528. Audio Engineering Society, 2013.
- S.M. Bellovin.
By any means possible: How intelligence agencies have gotten their data.
IEEE Security and Privacy, 12(4):80–84, 2014.
(doi:10.1109/MSP.2014.63)
- J. Feigenbaum
and J. Koenig.
On the feasibility of a technological response to the surveillance morass.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics),
8809:239–252, 2014.
- Angelos D.
Keromytis and Salvatore J. Stolfo.
Systems,
methods, and media for generating bait information for trap-based
defenses.
United States Patent 8,819,825, August 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- M. Langheinrich, R. Finn, V. Coroama, and D. Wright.
Quo vadis smart surveillance? how smart technologies combine and challenge
democratic oversight.
In Reloading Data Protection: Multidisciplinary Insights and Contemporary
Challenges, pages 151–182. Springer Netherlands, 2014.
(doi:10.1007/978-94-007-7540-4_9)
- Salvatore J.
Stolfo, Malek Ben Salem, and Shlomo Hershkop.
Methods,
systems, and media for masquerade attack detection by monitoring computer
user behavior.
United States Patent 8,769,684, July 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- A. Bates, K.R.B.
Butler, M. Sherr, C. Shields, P. Traynor, and D. Wallach.
Accountable wiretapping-or-i know they can hear you now.
Journal of Computer Security, 23(2):167–195, 2015.
(doi:10.3233/JCS-140515)
- Q. Do, B. Martini, and
K.-K.R. Choo.
Exfiltrating data from Android devices.
Computers and Security, 48:74–91, 2015.
(doi:10.1016/j.cose.2014.10.016)
- A. Muñoz,
M. Urueña, R. Aparicio, and G. Rodrıguez De Los Santos.
Digital wiretap warrant: Improving the security of ETSI lawful
interception.
Digital Investigation, 14:1–16, 2015.
(doi:10.1016/j.diin.2015.04.005)
- Salvatore J.
Stolfo, Angelos D. Keromytis, Brian M. Bowen, Shlomo Hershkop, Vasileios P.
Kemerlis, Pratap V. Prabhu, and Malek Ben Salem.
Methods,
systems, and media for baiting inside attackers.
United States Patent 9,009,829, April 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- S.M. Bellovin,
M. Blaze, and S. Landau.
Insecure surveillance: Technical issues with remote computer searches.
Computer, 49(3):14–24, 2016.
(doi:10.1109/MC.2016.68)
- Ang Cui and
Salvatore J. Stolfo.
Methods,
systems, and media for inhibiting attacks on embedded devices.
United States Patent 9,392,017, July 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Angelos D.
Keromytis and Salvatore J. Stolfo.
Systems,
methods, and media for generating bait information for trap-based
defenses.
United States Patent 9,356,957, May 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- S. Landau.
The real security issues of the iphone case: Law enforcement needs
21st-century investigative savvy.
Science, 352(6292):1398–1399, 2016.
(doi:10.1126/science.aaf7708)
- S.J. Murdoch.
Insecure by design: Protocols for encrypted phone calls.
Computer, 49(3):25–33, 2016.
(doi:10.1109/MC.2016.70)
- B. Reaves,
N. Scaife, D. Tian, L. Blue, P. Traynor, and K.R.B. Butler.
Sending out an SMS: Characterizing the security of the SMS ecosystem with
public gateways.
In 2016 IEEE Symposium on Security and Privacy, SP 2016, pages
339–356. Institute of Electrical and Electronics Engineers Inc., 2016.
(doi:10.1109/SP.2016.28)
- J.L. Rrushi.
NIC displays to thwart malware attacks mounted from within the OS.
Computers and Security, 61:59–71, 2016.
(doi:10.1016/j.cose.2016.05.002)
- Salvatore J.
Stolfo, Malek Ben Salem, and Shlomo Hershkop.
Methods,
systems, and media for masquerade attack detection by monitoring computer
user behavior.
United States Patent 9,311,476, April 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Salvatore J.
Stolfo, Angelos D. Keromytis, Brian M. Bowen, Shlomo Hershkop, Vasileios P.
Kemerlis, Pratap V. Prabhu, and Malek Ben Salem.
Methods,
systems, and media for baiting inside attackers.
United States Patent 9,501,639, November 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- United States
House of Representatives. Committee on Energy and Commerce. Subcommittee on
Oversight and Investigations.
Hearing
on: ``deciphering the debate over encryption: Industry and law enforcement
perspectives''. testimony of dr. matthew blaze.
Available online
http://docs.house.gov/meetings/IF/IF02/20160419/104812/HHRG-114-IF02-Wstate-BlazeM-20160419-U3.pdf,
April 2016.
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.