ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Making of a Spam Zombie Army: Dissecting the Sobig Worms
IEEE Security and Privacy
Research Issues in Ad-Hoc Distributed Personal Networking
Wireless Personal Communications: An International Journal
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Privacy and Anonymity in Personal Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
Proceedings of the twentieth ACM symposium on Operating systems principles
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Digital Crime And Forensic Science in Cyberspace (N/A)
Digital Crime And Forensic Science in Cyberspace (N/A)
Privacy and resource protection in personal network federations
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
On the difficulty of software-based attestation of embedded devices
Proceedings of the 16th ACM conference on Computer and communications security
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Retroactive detection of malware with applications to mobile platforms
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
The decreasing marginal value of evaluation network size
ACM SIGCAS Computers and Society
Wireless personal area networks
IEEE Network: The Magazine of Global Internetworking
Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology - Special Publication 800-63-1
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Personal area networks such as home or small office LANs are usually more vulnerable to cyber-attacks than those with dedicated support staff and the ability to invest consistently in security defenses. In this paper I propose leveraging physical characteristics of these personal area networks in order to enable non-technical individuals to secure their networks or at least be aware that their devices have been compromised. This proposal leverages records of location for mobile devices, proximity authentication, and individual homophily. In this work, I summarize previous studies on securing personal networks, proximity authentication, and software attestation. I then present a preliminary design for the detection of and recovery from infection for personal area networks. Limitations and future work are also discussed.