Browsing UMBC Center for Information Security and Assurance (CISA) by Title
Now showing items 1-20 of 24
-
Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques
(2012-08-06)We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-aservice cloud computing and analyze some strategies for addressing these challenges. First, we create a ... -
Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel
(Springer, Berlin, Heidelberg, 2011-06-22)We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards ... -
A Conjunction, Language, and System Facets for Private Packet Filtering
(ASE, 2013)Our contribution de nes a conjunction operator for private stream searching, integrates this operator into a high level language, and describes the system facets that achieve a realization of private packet ltering. Private ... -
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform
(Elsevier B.V., 2013-08)We describe the design, implementation, and evaluation of FROST|three new forensic tools for the OpenStack cloud platform. Operated through the management plane, FROST provides the rst dedicated forensics capabilities ... -
Developing and Delivering Hands-On Information Assurance Exercises: Experiences with the Cyber Defense Lab at UMBC
(IEEE, 2005-06-10)In summer 2003, we developed four new hands-on information assurance educational exercises for use in the UMBC undergraduate and graduate curricula. Exercise topics comprise buffer overflow attacks, vulnerability scanning, ... -
An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study
(2006-04-15)We describe our findings and experiences from our technical review of vote verification systems for the Maryland State Board of Elections (SBE). The review included the following four systems for possible use together ... -
Formal Methods Analysis of the Secure Remote Password Protocol
(2020-03-16)We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed ... -
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
(IEEE, 2003-05-21)We present, implement, and analyze a new scalable centralized algorithm, called OFT, for establishing shared cryptographic keys in large, dynamically changing groups. Our algorithm is based on a novel application of one-way ... -
On the Independent Verification of a Punchscan Election
(2007)Punchscan is a cryptographic voting system providing full transparency throughout the entire election process: a mandatory pre-election public audit, a mandatory post-election public audit, and the ability for a voter ... -
On the Origins and Variations of Blockchain Technologies
(2018-10-15)We explore the origins of blockchain technologies to better understand the enduring needs they address. We identify the five key elements of a blockchain, show embodiments of these elements, and examine how these elements ... -
The PnchScan Voting System
(2006-08-20) -
Private Virtual Infrastructure for Cloud Computing
(2009)Cloud computing places an organization’s sensitive data in the control of a third party, introducing a significant level of risk on the privacy and security of the data. We propose a new management and security model for ... -
Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing
Private Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the ... -
Punchscan in Practice: An E2E Election Case Study
This paper presents a case study of the E2E voting system Punchscan and its first use in a binding election. The election was held in March 2007 at the University of Ottawa for several offices within the university’s ... -
Punchscan with Independent Ballot Sheets: Simplifying Ballot Printing and Distribution with Independently Selected Ballot Halves
(2007-06-15)We propose and implement a modification to the Punchscan protocol that simplifies ballot printing and distribution. In this improved version, each voter creates a ballot at the polling location by combining independently ... -
Punchscan: Introduction and System Definition of a High-Integrity Election System
(2006-05)Punchscan is a unique hybrid paper/electronic voting system concept. As a receipt-based system, Punchscan provides high voter privacy and election integrity, yet it does not rely on the complex and fragile electronic voting ... -
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
(2009-11-03)On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for the mayor and city council members using the Scantegrity II voting system—the first time any end-to-end (E2E) voting system with ballot privacy has ... -
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
(2008-07-01)We introduce Scantegrity II, a practical enhancement for optical scan voting systems that achieves increased election integrity through the novel use of confirmation codes printed on ballots in invisible ink. Voters mark ... -
Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability
(2017)Building on lessons learned from the November 2009 Scantegrity II election in Takoma Park, MD, we propose improvements to the Scantegrity II voting system that (1) automatically print trustworthy receipts for easier on-line ...