ssc.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://ssc.cs.columbia.edu/labs.html
The Network Security Lab (NSL) at Columbia University's Computer Science Department is dedicated to performing cutting-edge research in critical areas of network and systems security. This research includes new methods for efficient encryption, system and network reliability, autonomic security, reactive security systems, automated patching, host-based intrusion prevention, applications of peer-to-peer networks, security and availability policy, and network intrusion detection and anomaly analysis. The I...
thestack.com
81% of Tor users can be de-anonymised via router information
https://thestack.com/chakravarty-tor-traffic-analysis-141114
81% of Tor users can be de-anonymised by analysing router information, research indicates. Fri 14 Nov 2014 2.27pm. Research undertaken between 2008 and 2014 suggests that more than 81% of Tor clients can be ‘de-anonymised’ their originating IP addresses revealed by exploiting the ‘Netflow’. Technology that Cisco has built into its router protocols, and similar traffic analysis software running by default in the hardware of other manufacturers. The technique depends on injecting a repeating traffic patter...
security.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://security.cs.columbia.edu/labs.html
The Network Security Lab (NSL) at Columbia University's Computer Science Department is dedicated to performing cutting-edge research in critical areas of network and systems security. This research includes new methods for efficient encryption, system and network reliability, autonomic security, reactive security systems, automated patching, host-based intrusion prevention, applications of peer-to-peer networks, security and availability policy, and network intrusion detection and anomaly analysis. The I...
ssc.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://ssc.cs.columbia.edu/publications.html
Please select the following research groups or faculty:. Intrusion Detection Systems Group. Distributed Network Analysis Research Group. Debra L. Cook, Moti Yung, and Angelos D. Keromytis. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers'. To appear in the Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP). July 2008, Wollongong, Australia. Casting out Demons: Sanitizing Training Data for Anomaly Sensors.'. In Proceedings of the 23rd Annu...
ssc.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://ssc.cs.columbia.edu/projects.html
Network Security and Survivability. Software and System Assurance. Access Control and Security Management. Intrusion Detection Systems Group. SPARSE: Malcode-Bearing Document Detection. STAND: Sanitization Tool for ANomaly Detection. BARTER: Behavior-Based Access Control. SRCS: Secure Remote Computing Services. THINC: THin-client InterNet Computing. Zap: Checkpoint-Restart and Migration Using Operating System Virtualization. BPC: Computing Research for NYC High School Students. VoIP for wireless networks.
security.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://security.cs.columbia.edu/people.html
Please select from the following research groups or faculty:. Intrusion Detection Systems Laboratory. Distributed Network Analysis Research Group. Affiliated Researchers and Adjunct Professors. Intrusion Detection Systems Laboratory. Brian M. Bowen. Distributed Network Analysis Research Group. Andrea G. Forte. Affiliated Researchers and Adjunct Professors. 2011 Columbia University, Department of Computer Science.
security.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://security.cs.columbia.edu/publications.html
Please select the following research groups or faculty:. Intrusion Detection Systems Group. Distributed Network Analysis Research Group. Debra L. Cook, Moti Yung, and Angelos D. Keromytis. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers'. To appear in the Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP). July 2008, Wollongong, Australia. Casting out Demons: Sanitizing Training Data for Anomaly Sensors.'. In Proceedings of the 23rd Annu...
security.cs.columbia.edu
SSC: Systems Security Center - Columbia University
http://security.cs.columbia.edu/projects.html
Network Security and Survivability. Software and System Assurance. Access Control and Security Management. Intrusion Detection Systems Group. SPARSE: Malcode-Bearing Document Detection. STAND: Sanitization Tool for ANomaly Detection. BARTER: Behavior-Based Access Control. SRCS: Secure Remote Computing Services. THINC: THin-client InterNet Computing. Zap: Checkpoint-Restart and Migration Using Operating System Virtualization. BPC: Computing Research for NYC High School Students. VoIP for wireless networks.