Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing latest articles
Browse All 20 View Live

A Security Analysis of the IEEE 1588 Standard

View Article



A Security Analysis of the Precise Time Protocol (Short Paper)

This paper reports on a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b)...

View Article

A Security Analysis of the Precise Time Protocol

This paper reports on a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b)...

View Article

A Security Analysis of the Precise Time Protocol

We present a security analysis of the IEEE 1588 standard, a.k.a. Precise Time Protocol (PTP). We show that attackers can use the protocol to (a) incorrectly resynchronize clocks, (b) illegally...

View Article

Security Practitioners in Context: Their Activities and Interactions

This study develops the context of interactions of IT security practitioners. Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different...

View Article


Security Practitioners in Context: Their Activities and Collaborative...

This study develops the context of interactions of IT security practitioners. Preliminary qualitative analysis of 22 interviews (to date) and participatory observation has identified eight different...

View Article

HOT Admin Research Project: Overview and Results to Date

Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after...

View Article

A Broad Empirical Study of IT Security Practioners

Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after...

View Article


Human, Organizational and Technological Challenges of Implementing IT...

Our qualitative research provides a comprehensive list of challenges to the practice of IT security within organizations, including the interplay between human, organizational, and technical factors....

View Article


Toward Understanding the Workplace of IT Security Practitioners

Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after...

View Article

Management of IT Security in Organizations: What Makes It Hard?

Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after...

View Article

Security Practitioners in Context: Their Activities and Interactions with...

This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine different activities...

View Article

Towards Understanding Diagnostic Work During the Detection and Investigation...

This study investigates how security practitioners perform diagnostic work during the identification of security incidents. Based on empirical data from 16 interviews with security practitioners, we...

View Article


Preparation, detection, and analysis: the diagnostic work of IT security...

Purpose — The purpose of this study is to examine security incident response practices of IT security practitioners as a diagnostic work process, including the preparation phase, detection, and...

View Article

OpenID Security Analysis and Evaluation

OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, there are currently more than one billion OpenID-enabled user accounts provided by major service...

View Article


Systematically breaking and fixing OpenID security: Formal analysis,...

OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user accounts, and tens of thousands of supporting websites. While the security of the protocol is clearly...

View Article

Towards Improving the Usability and Security of Web Single Sign-On Systems

OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted by high-profile identity providers (IdPs), such as Facebook, Google, Microsoft, and Yahoo, and...

View Article


Analysis of Data-At-Rest Security In Smartphones

With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. However, small size and high mobility makes these...

View Article

Bits Under the Mattress: Understanding Different Risk Perceptions and...

Crypto-assets are unique in tying financial wealth to the secrecy of private keys. Prior empirical work has attempted to study end-user security from both technical and organizational perspectives....

View Article

Security Notifications in Static Analysis Tools: Developers’ Attitudes,...

Static analysis tools (SATs) have the potential to assist developers in finding and fixing vulnerabilities in the early stages of software development, requiring them to be able to understand and act...

View Article
Browsing latest articles
Browse All 20 View Live




Latest Images