User intention-based traffic dependence analysis for anomaly detection

H Zhang, W Banick, D Yao… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
This paper describes an approach to enforce dependencies between network traffic and
user activities for anomaly detection. We present a framework and algorithms that analyze …

Enhancing data trustworthiness via assured digital signing

W Dai, TP Parker, H **, S Xu - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Digital signatures are an important mechanism for ensuring data trustworthiness via source
authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee …

Droidbarrier: Know what is executing on your android

HMJ Almohri, D Yao, D Kafura - Proceedings of the 4th ACM Conference …, 2014 - dl.acm.org
Many Android vulnerabilities share a root cause of malicious unauthorized applications
executing without user's consent. In this paper, we propose the use of a technique called …

Process authentication for high system assurance

HMJ Almohri, D Yao, D Kafura - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper points out the need in modern operating system kernels for a process
authentication mechanism, where a process of a user-level application proves its identity to …

Spam Trap** System: Novel security framework to fight against spam botnets

A Derhab, A Bouras, FB Muhaya… - 2014 21st …, 2014 - ieeexplore.ieee.org
In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in
system, to tackle the issue of spam botnet detection. We add a new line of defense to the …

[PDF][PDF] Kernel based process level authentication framework for secure computing and high-level system assurance

P Patil, S Joshi - Int J Innov Res Comput Commun Eng, 2014 - academia.edu
ABSTRACTIn modern operating system kernels level security is not present and a well-
known approach to protecting systems from malicious activity is through the deployment of …

High assurance models for secure systems

HMJ Almohri - 2013 - search.proquest.com
Despite the recent advances in systems and network security, attacks on large enterprise
networks consistently impose serious challenges to maintaining data privacy and software …

[PDF][PDF] Upgraded Kernel Based Process Validation for High System Assurance

VD Sonawane, A Mishra, C Vishal, J Vinay - 2016 - academia.edu
The current working framework doesn't have bits level security and they are shielded from
malevolent action through either by utilizing Mandatory Access Control (MAC) or Firewall …

[PDF][PDF] Enhancing Data Trustworthiness via Assured Digital Signing

T Weiqi Dai, H **, S Xu - researchgate.net
Digital signatures are an important mechanism for ensuring data trustworthiness via source
authenticity, integrity, and source non-repudiation. However, their trustworthiness guarantee …

AGENT BASED PUBLIC AUDIT FOR SECURED CLOUD STORAGE

VK Pal, R Roy, G Michael - Compusoft, 2015 - search.proquest.com
Operating system kernels typically enforce lowest restrictions on the applications
permissible to execute leading to the power of malicious programs to abuse system …