Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Mapping internet sensors with probe response attacks
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Timing analysis in low-latency mix networks: attacks and defenses
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
BotHunter: detecting malware infection through IDS-driven dialog correlation
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Hi-index | 0.01 |
Could the future of Internet-scale collaborative security frameworks ultimately open a new era of fast-reaction Internet defenses, or are these systems destined to provide limited deployment and detection power for unclear liability risks? We think the former is unlikely without significant progress in rich-content extraction that addresses the fundamental vulnerabilities inherent in collaborative data sharing. Cyber-TA brings together an established group of researchers across a broad spectrum to search for practical solutions and enable new ways of threat detection.