6,073 research outputs found

    Honey Sheets: What Happens to Leaked Google Spreadsheets?

    Get PDF
    Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper, we present a system able to monitor user activity on Google spreadsheets. We populated 5 Google spreadsheets with fake bank account details and fake funds transfer links. Each spreadsheet was configured to report details of accesses and clicks on links back to us. To study how people interact with these spreadsheets in case they are leaked, we posted unique links pointing to the spreadsheets on a popular paste site. We then monitored activity in the accounts for 72 days, and observed 165 accesses in total. We were able to observe interesting modifications to these spreadsheets performed by illicit accesses. For instance, we observed deletion of some fake bank account information, in addition to insults and warnings that some visitors entered in some of the spreadsheets. Our preliminary results show that our system can be used to shed light on cybercriminal behavior with regards to leaked online documents

    Report on a review of selected general and application controls over the University of Northern Iowa’s tuition and fees system for the period May 24, 2007 through July 3, 2007

    Get PDF
    Report on a review of selected general and application controls over the University of Northern Iowa’s tuition and fees system for the period May 24, 2007 through July 3, 200

    Asynchronous intrusion recovery for interconnected web services

    Get PDF
    Recovering from attacks in an interconnected system is difficult, because an adversary that gains access to one part of the system may propagate to many others, and tracking down and recovering from such an attack requires significant manual effort. Web services are an important example of an interconnected system, as they are increasingly using protocols such as OAuth and REST APIs to integrate with one another. This paper presents Aire, an intrusion recovery system for such web services. Aire addresses several challenges, such as propagating repair across services when some servers may be unavailable, and providing appropriate consistency guarantees when not all servers have been repaired yet. Experimental results show that Aire can recover from four realistic attacks, including one modeled after a recent Facebook OAuth vulnerability; that porting existing applications to Aire requires little effort; and that Aire imposes a 19--30% CPU overhead and 6--9 KB/request storage cost for Askbot, an existing web application.National Science Foundation (U.S.) (NSF award CNS-1053143)United States. Defense Advanced Research Projects Agency (DARPA Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) program under contract #N66001-10-2-4089

    INTEGRATION PROCESSES QUALITY IN HETEROGENOUS ENVIRONMENTS

    Get PDF
    It presents heterogeneous distributed software applications concept. It describes integration techniques. It defines quality of integration processes regarding heterogeneous environments. It defines quality metrics for heterogeneous e-commerce applications.integration, distributed environments, software process

    Paperless policy: digital filing system benefits to DoD contracting organizations

    Get PDF
    MBA Professional ReportThe year 2000 was the cutoff date for the Department of Defense (DoD) to have paperless processes in place. Since then, advances in computer technology have led to such paperless contracting processes as the DoD wide Standard Procurement System (SPS), Wide Area Work Flow, and other department specific major weapon procurement information systems. Although great strides were made by the DoD to implement paperless contracting processes, there still exists substantial room for improvement. Despite the use of all of the paperless system processes, now, seven years beyond the paperless cutoff date, many organizations still use a paper based filing system. This thesis will explore the policy and benefits of implementing a paperless contracting filing system using a software program such as Adobe Acrobat, provide a brief assessment of current Air Force and Navy/Marine contract filing systems, and include a real-world case study of the implementation of a paperless policy change at the Los Angeles Air Force Base (LAAFB).http://archive.org/details/paperlesspolicyd1094510172Approved for public release; distribution is unlimited

    Same Question, Different World: Replicating an Open Access Research Impact Study

    Get PDF
    To examine changes in the open access landscape over time, this study partially replicated Kristin Antelman’s 2004 study of open access citation advantage. Results indicated open access articles still have a citation advantage. For three of the four disciplines examined, the most common sites hosting freely available articles were independent sites, such as academic social networks or article sharing sites. For the same three disciplines, more than 70% of the open access copies were publishers’ PDFs. The major difference from Antelman’s is the increase in the number of freely available articles that appear to be in violation of publisher policies

    Security Code Smells in Android ICC

    Get PDF
    Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps. To promote secure programming practices, we have reviewed related research, and identified avoidable ICC vulnerabilities in Android-run devices and the security code smells that indicate their presence. We explain the vulnerabilities and their corresponding smells, and we discuss how they can be eliminated or mitigated during development. We present a lightweight static analysis tool on top of Android Lint that analyzes the code under development and provides just-in-time feedback within the IDE about the presence of such smells in the code. Moreover, with the help of this tool we study the prevalence of security code smells in more than 700 open-source apps, and manually inspect around 15% of the apps to assess the extent to which identifying such smells uncovers ICC security vulnerabilities.Comment: Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE), 201

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp
    corecore