Table of contents - Special issue from Kaspersky Lab's IT Security for the Next Generation International Conference 2012
Guest Editors: Veniamin Ginodman, Natalya Obelets, Ram Herkanaidu
Fingerprinting Tor
Pablo Carballude GonzálezIt is increasingly difficult to ignore the importance of anonymity on the internet. Tor has been proposed as a reliable way to keep our identity secret from governments and…
Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness
Iwan GulenkoThis study attempts to develop an efficient concept to mitigate the risks of social engineering in the era of social networks. For instance friend requests on Facebook are often…
SOUL System: secure online USB login system
Joshua Arvin S. Lat, Rod Xavier R. Bondoc, Kevin Charles V. AtienzaThe SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic…
VoxGrid: a mobile voice verification system
Mariah Strella P. Indrinal, Ranyel Bryan L. Maliwanag, Marynyriene I. SilvestreThe purpose of this paper is to introduce VoxGrid, a mobile voice verification system intended for improving the security of the username‐password authentication scheme.
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design
Ang Cui, Jatin Kataria, Salvatore J. StolfoIOS firmware diversity, the unintended consequence of a complex firmware compilation process, has historically made reliable exploitation of Cisco routers difficult. With…