Hannah Pruse

Learn More
Virtualization is the cornerstone of the developing third party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the <i>co-resident threat</i> -- unless perfect isolation is provided by the(More)
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual(More)
Determining a computer’s identity is a challenge of critical importance to users wishing to ensure that they are interacting with the correct system; it is also extremely valuable to forensics investigators. However, even hosts that contain trusted computing hardware to establish identity can be defeated by relay and impersonation attacks. In this paper, we(More)
On February 15th, Paul Elliot presented a talk on the security of Implantable Medical Devices (IMDs). The presentation focused on the paper titled “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses” by Halperin et al. that was featured in the proceedings of the 2008 IEEE Conference. A similar paper, titled(More)
Video games have become ubiquitous as both entertainment and computer-mediated social interaction, and due to their interactivity may be more influential than films, television, and other electronic media. Games have even become part of children’s development and therefore may have heavy influence on skill and character development of the future generation.(More)
  • 1