Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aviel D. Rubin is active.

Publication


Featured researches published by Aviel D. Rubin.


Proceedings of the 2007 ACM workshop on Recurring malcode | 2007

A framework for detection and measurement of phishing attacks

Sujata Garera; Niels Provos; Monica Chew; Aviel D. Rubin

Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries to lure her victim into clicking a URL pointing to a rogue page. In this paper, we focus on studying the structure of URLs employed in various phishing attacks. We find that it is often possible to tell whether or not a URL belongs to a phishing attack without requiring any knowledge of the corresponding page data. We describe several features that can be used to distinguish a phishing URL from a benign one. These features are used to model a logistic regression filter that is efficient and has a high accuracy. We use this filter to perform thorough measurements on several million URLs and quantify the prevalence of phishing on the Internet today


financial cryptography | 2009

Coercion Resistant End-to-end Voting

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin

End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been considered only when voting devices are honest, and in many schemes, voters can be forced or incentivized to cast votes of an adversarys choice. In this paper, we examine the issue of voter coercion and identify one example method for coercing voters in a scheme by Benaloh. To address such attacks, we present a formal definition of coercion resistance for end-to-end voting. We then present a new scheme, extended from Benalohs, that is provably coercion resistant. In addition to providing accuracy and coercion resistance, our scheme emphasizes ease-of-use for the voter.


IEEE Transactions on Information Forensics and Security | 2009

Detecting Code Alteration by Creating a Temporary Memory Bottleneck

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin

We develop a new technique whereby a poll worker can determine whether the software executing on electronic voting machines on election day has been altered from its factory version. Our generalized approach allows a human, using a known challenge-response pair, to detect attacks that involve modification or replacement of software on a computer based on the time it takes the computer to provide a correct response to a challenge. We exploit the large difference between main memory access times and cache memory access or CPU clock cycle times to significantly increase the time required to compute the right response when the software has been changed.


computer and communications security | 2007

An independent audit framework for software dependent voting systems

Sujata Garera; Aviel D. Rubin

The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. One of the problems is that the elections held on these machines cannot be independently audited. In this paper we address this issue by designing a new all-electronic independent audit framework for DRE voting systems. Our framework leverages system virtualization concepts and image recognition techniques to maintain an audit of the vote totals. The architecture we present is a step towards meeting the software independence requirements as defined by Rivest et al. [21, 2]. We have implemented a prototype using the Diebold Accuvote TS DRE voting software and the XEN hypervisor and demonstrate that our system can achieve a robust election audit with negligible overhead.


Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems | 2009

Securing medical records on smart phones

Ryan W. Gardner; Sujata Garera; Matthew W. Pagano; Matthew Green; Aviel D. Rubin

There is an inherent conflict between the desire to maintain privacy of ones medical records and the need to make those records available during an emergency. To satisfy both objectives, we introduce a flexible architecture for the secure storage of medical records on smart phones. In our system, a person can view her records at any time, and emergency medical personnel can view the records as long as the person is present (even if she is unconscious). Our solution allows for efficient revocation of access rights and is robust against adversaries who can access the phones storage offline.


financial cryptography | 2010

Designing for audit: a voting machine with a tiny TCB

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin

Thoroughly auditing voting machine software has proved to be difficult, and even efforts to reduce its complexity have relied on significant amounts of external code. We design and implement a device that allows a voter to confirm and cast her vote while trusting only 1,034 lines of ARM assembly. The system, which we develop from scratch, supports visually (and hearing) impaired voters and ensures the privacy of the voter as well as the integrity of the tally under some common assumptions. We employ several techniques to increase the readability of our code and make it easier to audit.


Archive | 2009

Protecting Patient Records from Unwarranted Access

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin; Anand Rajan; Carlos V. Rozas; Manoj R. Sastry

Securing access to medical information is vital to protecting patient privacy. However, Electronic Patient Record (EPR) systems are vulnerable to a number of inside and outside threats. Adversaries can compromise EPR client machines to obtain a variety of highly sensitive information including valid EPR login credentials, without detection. Furthermore, medical staff can covertly view records of their choosing for personal interest or more malicious purposes. In particular, we observe that the lack of integrity measurement and auditability in these systems creates a potential threat to the privacy of patient information. We explore the use of virtualization and trusted computing hardware to address these problems. We identify open problems and encourage further research in the area.


usenix workshop on accurate electronic voting technology | 2007

On the difficulty of validating voting machine software with software

Ryan W. Gardner; Sujata Garera; Aviel D. Rubin


Archive | 2010

Designing for Audit: A Voting Machine with a

Tiny Tcb; Ryan W. Gardner; Sujata Garera; Aviel D. Rubin


Archive | 2009

New techniques to defend against computer security attacks

Aviel D. Rubin; Sujata Garera

Collaboration


Dive into the Aviel D. Rubin's collaboration.

Top Co-Authors

Avatar

Sujata Garera

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew Green

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sujata Doshi

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar

Fabian Monrose

University of North Carolina at Chapel Hill

View shared research outputs
Researchain Logo
Decentralizing Knowledge