Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nathanael Paul is active.

Publication


Featured researches published by Nathanael Paul.


Journal of diabetes science and technology | 2011

A review of the security of insulin pump infusion systems.

Nathanael Paul; Tadayoshi Kohno; David C. Klonoff

Insulin therapy has enabled patients with diabetes to maintain blood glucose control to lead healthier lives. Today, rather than injecting insulin manually using syringes, a patient can use a device such as an insulin pump to deliver insulin programmatically. This allows for more granular insulin delivery while attaining blood glucose control. Insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result, security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this article, we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components, which include the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues.


IEEE Computer | 2009

Trustworthy Voting: From Machine to System

Nathanael Paul; Andrew S. Tanenbaum

The authors describe an electronic voting approach that takes a system view, incorporating a trustworthy process based on open source software, simplified procedures, and built-in redundant safeguards that prevent tampering.


annual computer security applications conference | 2004

.NET security: lessons learned and missed from Java

Nathanael Paul; David Evans

Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweight platform for execution of untrusted code inside Web pages. More recently, Microsoft developed the .NET platform with similar goals. Both platforms share many design and implementation properties, but there are key differences between Java and .NET that have an impact on their security. This paper examines how .NETs design avoids vulnerabilities and limitations discovered in Java and discusses lessons learned (and missed) from Javas experience with security.


Computers & Security | 2006

Comparing Java and .NET security: Lessons learned and missed

Nathanael Paul; David Evans

Many systems execute untrusted programs in virtual machines (VMs) to mediate their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweight platform for executing untrusted code inside web pages. More recently, Microsoft developed the .NET platform with similar goals. Both platforms share many design and implementation properties, but there are key differences between Java and .NET that have an impact on their security. This paper examines how .NETs design avoids vulnerabilities and limitations discovered in Java and discusses lessons learned (and missed) from experience with Java security.


annual computer security applications conference | 2009

The Design of a Trustworthy Voting System

Nathanael Paul; Andrew S. Tanenbaum

After the voting debacle in the Florida Presidential election of 2000 with its now-fabled hanging chads and pregnant chads, many voting jurisdictions turned to electronic voting machines. This transition has had at least as many problems as punch-card systems and added the additional one of making recounts impossible. As a result, many jurisdictions have gone back to paper ballots in despair. We believe that electronic voting can have many benefits including accessibility and usability but requires regarding voting as a system of which the voting machine is only a (small) part. In this paper we describe all the components of an electronic voting system that is practical and difficult to tamper with. We emphasize the importance of systems aspects, defense in depth, and being paranoiac.


ieee symposium on security and privacy | 2005

A Closer Look at Viruses and Worms

Nathanael Paul

Reviewed in this issue:Peter Szor, The Art of Computer Virus Research and Defense, Addison-Wesley, 2005, ISBN: 0-321-30454-3, 744 pages, US


2012 Future of Instrumentation International Workshop (FIIW) Proceedings | 2012

Advanced metering infrastructure and communication test bed and applications for grid reliability

Isabelle B. Snyder; Nathanael Paul; Lawrence Paul MacIntyre

49.99.


usenix security symposium | 2005

Where's the FEEB? the effectiveness of instruction set randomization

Ana Nora Sovarel; David Evans; Nathanael Paul

This paper discusses the architecture of the advanced metering and communication test bed installed on the ORNL (Oak Ridge National laboratory) distribution grid. The test bed is being exploited for many applications that serve the reliability of the grid, such as standard validation and implementation of the new encryption devices to improve cyber security.


Archive | 2007

Method, system, and computer program product for malware detection analysis, and response

David Evans; Adrienne Felt; Nathanael Paul; Sudhanva Gurumurthi


ieee symposium on security and privacy | 2004

Election security: Perception and reality

David Evans; Nathanael Paul

Collaboration


Dive into the Nathanael Paul's collaboration.

Top Co-Authors

Avatar

David Evans

University of Virginia

View shared research outputs
Top Co-Authors

Avatar

Craig A. Shue

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Curtis R. Taylor

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Isabelle B. Snyder

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge