Share This Author
A survey of active network research
- D. Tennenhouse, Jonathan M. Smith, W. Sincoskie, D. Wetherall, G. Minden
- Computer ScienceIEEE Communications Magazine
It is illustrated how the routers of an IP network could be augmented to perform such customized processing on the datagrams flowing through them, and these active routers could also interoperate with legacy routers, which transparently forwarddatagrams in the traditional manner.
Smudge Attacks on Smartphone Touch Screens
- Adam J. Aviv, Katherine L. Gibson, Evan Mossop, M. Blaze, Jonathan M. Smith
- Computer ScienceWOOT
- 9 August 2010
This paper examines the feasibility of smudge attacks on touch screens for smartphones, and focuses on the Android password pattern, and provides a preliminary analysis of applying the information learned in a smudge attack to guessing an Android passwordpattern.
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
- Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith
- Computer ScienceIEEE Symposium on Security and Privacy
- 16 May 2010
This paper proposes BlueChip, a defensive strategy that has both a design-time component and a runtime component that is able to prevent all hardware attacks the authors evaluate while incurring a small runtime overhead.
IDES: An Internet Distance Estimation Service for Large Networks
- Yun Mao, L. Saul, Jonathan M. Smith
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 1 December 2006
A model for representing and predicting distances in large-scale networks by matrix factorization is presented which can model suboptimal and asymmetric routing policies, an improvement on previous approaches and a scalable system is designed and implemented that predicts large numbers of network distances from limited samples of Internet measurements.
A secure and reliable bootstrap architecture
- W. Arbaugh, D. Farber, Jonathan M. Smith
- Computer ScienceProceedings. IEEE Symposium on Security and…
- 4 May 1997
The AEGIS architecture for initializing a computer system validates integrity at each layer transition in the bootstrap process, and it is shown how this results in robust systems.
Practicality of accelerometer side channels on smartphones
This paper demonstrates how to use the accelerometer sensor to learn user tap- and gesture-based input as required to unlock smartphones using a PIN/password or Android's graphical password pattern and develops sample rate independent features for accelerometer readings based on signal processing and polynomial fitting techniques.
EROS: a fast capability system
EROS is a capability-based operating system for commodity processors which uses a single level storage model. The single level store's persistence is transparent to applications. The performance…
Implementing a distributed firewall
This paper presents the design and implementation of a distributed rewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security
To achieve the safety of fat pointers without increasing program state, this work compactly encode approximate base and bound pointers along with exact address pointers for a 46b address space into one 64-bit word with a worst-case memory overhead of 3%.
Architectural Support for Software-Defined Metadata Processing
This work generalizes prior work on hardware tagging by considering a generic architecture that supports software-defined policies over metadata of arbitrary size and complexity and introduces several novel microarchitectural optimizations that keep the overhead of this rich processing low.