Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

[PDF][PDF] Towards automated dynamic analysis for linux-based embedded firmware.

DD Chen, M Woo, D Brumley, M Egele - NDSS, 2016 - ndss-symposium.org
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled
by vendor firmware to perform integral functions in our daily lives. For example, wireless …

A search engine backed by Internet-wide scanning

Z Durumeric, D Adrian, A Mirian, M Bailey… - Proceedings of the …, 2015 - dl.acm.org
Fast Internet-wide scanning has opened new avenues for security research, ranging from
uncovering widespread vulnerabilities in random number generators to tracking the evolving …

All things considered: an analysis of {IoT} devices on home networks

D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …

Measuring the longitudinal evolution of the online anonymous marketplace ecosystem

K Soska, N Christin - 24th USENIX security symposium (USENIX security …, 2015 - usenix.org
February 2011 saw the emergence of Silk Road, the first successful online anonymous
marketplace, in which buyers and sellers could transact with anonymity properties far …

{ZMap}: Fast internet-wide scanning and its security applications

Z Durumeric, E Wustrow, JA Halderman - 22nd USENIX Security …, 2013 - usenix.org
Internet-wide network scanning has numerous security applications, including exposing new
vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire …