Game theory in distributed systems security: Foundations, challenges, and future directions
Combining insights from distributed system security and game theory could effectively
address security challenges. We present foundational concepts from both fields that can be …
address security challenges. We present foundational concepts from both fields that can be …
Reliable password hardening service with opt-out
C Jia, S Wu, D Wang - 2022 41st International Symposium on …, 2022 - ieeexplore.ieee.org
As the most dominant authentication mechanism, password-based authentication suffers
catastrophic offline password guessing attacks once the authentication server is …
catastrophic offline password guessing attacks once the authentication server is …
Honeyhash: Honeyword generation based on transformed hashes
C Shi, H Sun - Secure IT Systems: 25th Nordic Conference, NordSec …, 2021 - Springer
Since systems using honeywords store a set of decoy passwords together with real
passwords of users to confuse adversaries, they are strongly dependent on the algorithm for …
passwords of users to confuse adversaries, they are strongly dependent on the algorithm for …
[PDF][PDF] Game Theory and Distributed Systems Security NSF SaTC PI Meeting Breakout 2022
SBKCM Abdallaha, X Gaoc - cps-vo.org
This serves as the report of the breakout session at the NSF SaTC PI meeting that happened
in Arlington, VA. The first day's session had enthusiastic participation from 30 members …
in Arlington, VA. The first day's session had enthusiastic participation from 30 members …
[PDF][PDF] MODELING DECEPTION FOR CYBER SECURITY
C DE FAVERI - 2021 - run.unl.pt
In the era of software-intensive, smart and connected systems, the growing power and
sophistication of cyber attacks poses increasing challenges to software security. The …
sophistication of cyber attacks poses increasing challenges to software security. The …