The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Identification of Host Audit Data to Detect Attacks on Low-Level IP Vulnerabilities

COAST TR 98-10
Thomas E. Daniels and E. H. Spafford
Download: PDF
Added 2002-07-26

Access to Cyberspace as a Human Right: Universal Service and the Right to Communicate

William J. McIver, Jr.

This paper examines human rights and policy frameworks supporting the right of access to cyberspace.

Added 2002-07-26


WHITE PAPER: The Clinton Administration\

Clinton Administration
Added 2002-07-26



Misplaced trust: Kerberos 4 Session Keys

COAST TR 97-01
Bryn Dole, Steve Lodin, and E. H. Spafford
Download: PDF

One of the commonly accepted principles of software design for security is that making the source code openly available leads to better security. The presumption is that the open publications of source code will lead others to review the code for errors, however, this openness is no guarantee of correctness. One of the most widely published and used pieces of security software in recent memory is the MIT implementation of the Kerberos authentication protocol. In the design of the protocol, random session keys are the basis for establishing the authenticity of sevice requests. Because of the way that the Kerberos Version 4 implementation selected its random keys, the secret keys could easily by guessed in a matter of seconds. This paper discusses the difficulty of generating good random numbers, the mistakes that were made in implementing Kerberos Version 4, and the breakdown of software engineering that allowed this flaw to remain unfixed for ten years. We discuss this as a particularly notable example of the need to examine security-critical code carefully, even when it is made publicly available.

Added 2002-07-26

Categorization of Software Errors that led to Security Breaches

Wenliang Du and A. P. Mathur
Download: PDF
Added 2002-07-26

Vulnerability Testing of Software System Using Fault Injection

COAST TR 98-02
Wenliang Du and A. P. Mathur
Download: PDF
Added 2002-07-26

Incremental Mining of Partial Periodic Patterns in Time-Series Databases

CERIAS TR 2000-03
Mohamed G. Elfeky, and A. P. Mathur
Download: PDF
Added 2002-07-26

An Efficient Edge Extraction Technique Using Color Components and More Potential Patterns

CERIAS TR 2000-05
ianping Fan, and Walid G. Aref, A. Rezgui, Ahmed K. Elmagarmid
Download: PDF
Added 2002-07-26

A Toolkit for Modeling and Compressing Audit Data

COAST TR 98-20
J. Chapman Flack, Mikhail Atallah
Download: PDF
Added 2002-07-26

Monitoring File System Integrity on Unix Platforms

Gene Kim and E. H. Spafford
Added 2002-07-26

The Design and Implementation of Tripwire: A File System Integrity Checker

CSD-TR-93-071
Gene Kim and E. H. Spafford
Download: PDF
Added 2002-07-26

Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection

Gene H. Kim and E. H. Spafford;
Download: PDF
Added 2002-07-26