3 research outputs found

    Process and System for Establishing a Moving Target Connection for Secure Communications in Client/Server Systems

    Get PDF
    A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send small pieces of information over a network while only requiring an exchange of public keys ahead of time. The system relies on the size and resilience of the BitTorrent Distributed Hash Table and the security properties of cryptographic constructions such as Elliptic Curve Diffie-Hellman key exchange and secure one-way hash functions.https://digitalcommons.usmalibrary.org/patents/1000/thumbnail.jp

    Ubiquitous Security: Privacy versus Protection

    No full text
    Abstract- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and protection to gain full entry into this new information-laden environment. This paper examines the current state-of-the-shelf security components, which predominantly overlay wired and wireless networks that will support next generation pervasive systems with a defense-in-depth approach. Information technology “best practices ” are considered, and privacy concerns within typical networks are discussed. An examination of emerging privacy protecting technologies is presented, and Radio Frequency Identification (RFID) tags and legal concerns are discussed to portray the asymmetry of information flow in pervasive systems that can impact our personal information privacy

    A Framework for Deriving Verification and Validation Strategies to Assess Software Security By

    No full text
    In recent years, the number of exploits targeting software applications has increased dramatically. These exploits have caused substantial economic damages. Ensuring that software applications are not vulnerable to the exploits has, therefore, become a critical requirement. The last line of defense is to test before hand if a software application is vulnerable to exploits. One can accomplish this by testing for the presence of vulnerabilities. This dissertation presents a framework for deriving verification and validation (V&V) strategies to assess the security of a software application by testing it for the presence of vulnerabilities. This framework can be used to assess the security of any software application that executes above the level of the operating system. It affords a novel approach, which consists of testing if the software application permits violation of constraints imposed by computer system resources or assumptions made about the usage of these resources. A vulnerability exists if a constraint or an assumption can be violated. Distinctively different from other approaches found in the literature, this approach simplifies the process of assessing the security of a software application. The framework is composed of three components: (1) a taxonomy of vulnerabilities, which is a
    corecore