Skip to main content
CAMELLIA is a 128 bit block cipher certified for its security by NESSIE and CRYPTREC. Yet an implementation of CAMELLIA can easily fall prey to cache attacks. In this paper we present an attack on CAMELLIA, which utilizes cache access... more
    • by 
    •   2  
      Computer SecurityCryptography
CAMELLIA is a 128 bit block cipher certified for its security by NESSIE and CRYPTREC. Yet an implementation of CAMELLIA can easily fall prey to cache attacks. In this paper we present an attack on CAMELLIA, which utilizes cache access... more
    • by 
    •   4  
      Computer ScienceComputer SecurityCryptographySide-channel attack
Reported results on cache trace attacks on CLEFIA do not work with increased cache line size. In this paper we present an enhanced cache trace attack on CLEFIA using the differential property of the s-boxes of the cipher and the diffusion... more
    • by 
    •   4  
      Information SecurityComputer SecurityCryptographySide-channel attack
Verifiable secret sharing (VSS) is a vital primitive in secure distributed computing. It allows an untrusted dealer to verifiably share a secret among n parties in the presence of an adversary controlling at most t of them. VSS in the... more
    • by 
    •   3  
      Complexity TheoryCryptographySecret Sharing
ABSTRACT In a series of studies, we investigated a user interface intended to help users stay aware of their access-control policy even when they are engaged in another activity as their primary task. Methodological issues arose in each... more
    • by 
Several works have recently shown that Android's security architecture cannot prevent many undesired behaviors that compromise the integrity of applications and the privacy of their data. This paper makes two main contributions to the... more
    • by 
Abstract In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducted a series of interviews with thirteen... more
    • by 
Abstract. Run-time monitors ensure that untrusted software and system behavior adheres to a security policy. This paper defines an expressive formal framework, based on I/O automata, for modeling systems, policies, and run-time monitors... more
    • by 
ABSTRACT Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change in the Carnegie Mellon University (CMU) computing... more
    • by 
Abstract The proliferation of advanced technologies has been altering our lifestyle and social interactions–the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be... more
    • by 
Abstract Recent years have seen a dramatic increase in the number and importance in daily life of smartphones and similar mobile devices. The security properties that these devices provide to their applications, however, are inadequate to... more
    • by 
Abstract As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access policies is reactive policy creation, in which users... more
    • by 
As users store and share more digital content at home, effective access control becomes increasingly important. One promising approach to helping non-expert users create accurate access policies is reactive policy creation, in which users... more
    • by 
Abstract: Logical techniques have been developed that capture both authorization and information flow requirements in security applications. These logical techniques achieve a significantly higher degree of end-to-end accountability in... more
    • by 
Abstract In access-control systems, policy rules conflict when they prescribe different decisions (allow or deny) for the same access. We present the results of a user study that demonstrates the significant impact of conflict-resolution... more
    • by 
Abstract Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owners issue credentials to specify policies, and the... more
    • by 
Abstract A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy-a technique called proof-carrying authorization.... more
    • by 
Abstract We take a detailed look at how users, while focusing on non-permission tasks, notice and fix access-control permission errors depending on where the access-control policy is spatially located on a photo-sharing website. The... more
    • by 
Abstract A runtime monitor is a program that runs in parallel with an untrusted application and examines actions from the application's instruction stream. If the sequence of program actions deviates from a specified security policy, the... more
    • by 
A run-time monitor is a program that runs in parallel with an untrusted application and examines actions from the application's instruction stream. If the sequence of program actions deviates from a specified security policy, the monitor... more
    • by