Technical Reports

reports image

2014

CMU-CyLab-14-010:  Routing Bottlenecks in the Internet – Causes, Exploits, and Countermeasures
Research Area(s):  Next Generation Secure and Available Networks
Cross-Cutting Thrusts:  Next Generation Threat Prediction and Response
Author(s):  Min Suk Kang and Virgil D. Gligor
Publication Date:  May 15, 2014

CMU-CyLab-14-009:  Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines
Research Area(s):  Secure Home Computing
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Alain Forget, Saranga Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang
Publication Date:  July 14, 2014

CMU-CyLab-14-006:  MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles
Research Area(s):  Mobility
Cross-Cutting Thrusts:  Cryptography | Usable Privacy and Security
Author(s):  Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai
Publication Date:  May 26, 2014

CMU-CyLab-14-005:  Temporal Mode-Checking for Runtime Monitoring of Privacy Policies
Author(s):  Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta
Publication Date:  May 28, 2014

CMU-CyLab-14-004:  Results on Vertex Degree and K-Connectivity in Uniform S-Intersection Graphs
Research Area(s):  Security of Cyber-Physical Systems | Next Generation Secure and Available Networks
Author(s):  Jun Zhao, Osman Yagan, and Virgil Gligor
Publication Date:  January 1, 2014

CMU-CyLab-14-003:  Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
Research Area(s):  Security of Cyber-Physical Systems | Next Generation Secure and Available Networks
Author(s):  Jun Zhao, Osman Yagan, and Virgil Gligor
Publication Date:  March 3, 2014

CMU-CyLab-14-002:  Topological Properties of Wireless Sensor Networks Under the Q-Composite Key Predistribution Scheme With Unreliable Links
Research Area(s):  Next Generation Secure and Available Networks | Security of Cyber-Physical Systems
Author(s):  Jun Zhao, Osman Yagan and Virgil Gligor
Publication Date:  January 24, 2014

CMU-CyLab-14-001:  MiniBox: A Two-Way Sandbox for x86 Native Code
Research Area(s):  Trustworthy Computing Platforms and Devices
Author(s):  Yanlin Li, Adrian Perrig, Jonathan McCune, James Newsome, Brandon Baker, Will Drewry
Publication Date:  February 21, 2014

2013

CMU-CyLab-13-015:  Mobile Pickpocketing: Exfiltration of Sensitive Data through NFC-enabled Mobile Devices
Research Area(s):  Mobility
Cross-Cutting Thrusts:  Threat Analysis and Modeling
Author(s):  Ryan Caney, Christopher Dorros, Stuart Kennedy, Gregory Owens, and Patrick Tague
Publication Date:  December 5, 2013

CMU-CyLab-13-013:  Measuring Password Guessability for an Entire University
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, and Blase Ur
Publication Date:  October 22, 2013

CMU-CyLab-13-011:  Is Your Inseam a Biometric? Evaluating the Understandability of Mobile Privacy Notice Categories
Research Area(s):  Mobility | Privacy Protection
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Rebecca Balebako, Richard Shay, and Lorrie Faith Cranor
Publication Date:  July 17, 2013

CMU-CyLab-13-010:  DABLS: Device Attestation with Bounded Leakage of Secrets
Research Area(s):  Trustworthy Computing Platforms and Devices
Author(s):  Andrew Tran
Publication Date:  July 12, 2013

CMU-CyLab-13-009:  A5: Automated Analysis of Adversarial Android Applications (Revised June 3, 2014)
Research Area(s):  Mobility
Cross-Cutting Thrusts:  Threat Analysis and Modeling
Author(s):  Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, and Patrick Tague
Publication Date:  February 21, 2013

CMU-CyLab-13-008:  Continuous Tamper-proof Logging using TPM2.0 (Revised June 16, 2014)
Research Area(s):  Trustworthy Computing Platforms and Devices
Cross-Cutting Thrusts:  Cryptography | Formal Methods
Author(s):  Paul England, Limin Jia, James Lorch, and Arunesh Sinha
Publication Date:  July 9, 2013

CMU-CyLab-13-007:  "It’s Hidden in My Computer": Exploring Account Management Tools and Behaviors
Research Area(s):  Secure Home Computing
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Eiji Hayashi and Jason I. Hong
Publication Date:  July 8, 2013

CMU-CyLab-13-005:  Purpose Restrictions on Information Use
Research Area(s):  Privacy Protection
Cross-Cutting Thrusts:  Formal Methods
Author(s):  Michael Carl Tschantz, Anupam Datta, and Jeannette M. Wing
Publication Date:  June 3, 2013

CMU-CyLab-13-004:  Audit Games
Research Area(s):  Privacy Protection
Cross-Cutting Thrusts:  Business Risk Analysis and Economic Implications
Author(s):  Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, and Arunesh Sinha
Publication Date:  March 2, 2013

CMU-CyLab-13-003:  Privacy as Part of the App Decision-Making Process
Research Area(s):  Privacy Protection | Mobility
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh
Publication Date:  February 6, 2013

CMU-CyLab-13-002:  Warning Design Guidelines
Research Area(s):  Privacy Protection
Cross-Cutting Thrusts:  Usable Privacy and Security
Author(s):  Lujo Bauer, Cristian Bravo-Lillo, Lorrie Cranor, and Elli Fragkaki
Publication Date:  February 5, 2013