Skip to main content

Technical Reports

reports image

2015

CMU-CyLab-15-001:  Influence in Classification via Cooperative Game Theory
Research Area(s):  Privacy Protection
Author(s):  Amit Datta, Anupam Datta, Ariel D. Procaccia and Yair Zick
Publication Date:  May 1, 2015

2014

CMU-CyLab-14-013:  BUZZ: Testing Context-Dependent Policies in Stateful Data Planes
Research Area(s):  Next Generation Secure and Available Networks
Cross-Cutting Thrusts:  Formal Methods
Author(s):  Seyed K Fayaz, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar
Publication Date:  September 25, 2014

CMU-CyLab-14-012:  Smartphone Fingerprint Authentication versus PINs: A Usability Study
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Shri Karthikeyan, Sophia Feng, Ashwini Rao, Norman Sadeh
Publication Date:  July 31, 2014

CMU-CyLab-14-011:  What do they know about me? Contents and Concerns of Online Behavioral Profiles
Research Area(s):  Privacy Protection
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Ashwini Rao, Florian Schaub, Norman Sadeh
Publication Date:  July 30, 2014

CMU-CyLab-14-010:  Routing Bottlenecks in the Internet – Causes, Exploits, and Countermeasures
Research Area(s):  Next Generation Secure and Available Networks
Cross-Cutting Thrusts:  Next Generation Threat Prediction and Response
Author(s):  Min Suk Kang and Virgil D. Gligor
Publication Date:  May 15, 2014

CMU-CyLab-14-009:  Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines
Research Area(s):  Secure Home Computing
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Alain Forget, Saranga Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang
Publication Date:  July 14, 2014

CMU-CyLab-14-006:  MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles
Research Area(s):  Mobility
Cross-Cutting Thrusts:  Usable Privacy and Security | Cryptography
Author(s):  Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai
Publication Date:  May 26, 2014

CMU-CyLab-14-005:  Temporal Mode-Checking for Runtime Monitoring of Privacy Policies
Author(s):  Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta
Publication Date:  May 28, 2014

CMU-CyLab-14-004:  Results on Vertex Degree and K-Connectivity in Uniform S-Intersection Graphs
Research Area(s):  Security of Cyber-Physical Systems | Next Generation Secure and Available Networks
Author(s):  Jun Zhao, Osman Yagan, and Virgil Gligor
Publication Date:  January 1, 2014

CMU-CyLab-14-003:  Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
Research Area(s):  Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Author(s):  Jun Zhao, Osman Yagan, and Virgil Gligor
Publication Date:  March 3, 2014

CMU-CyLab-14-002:  Topological Properties of Wireless Sensor Networks Under the Q-Composite Key Predistribution Scheme With Unreliable Links
Research Area(s):  Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Author(s):  Jun Zhao, Osman Yagan and Virgil Gligor
Publication Date:  January 24, 2014

CMU-CyLab-14-001:  MiniBox: A Two-Way Sandbox for x86 Native Code
Research Area(s):  Trustworthy Computing Platforms and Devices
Author(s):  Yanlin Li, Adrian Perrig, Jonathan McCune, James Newsome, Brandon Baker, Will Drewry
Publication Date:  February 21, 2014