The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Computer Viruses as Artificial Life

E. H. Spafford
Added 2002-07-26

Observing Reusable Password Choices

E.H. Spafford
Download: PDF
Added 2002-07-26

Preventing Weak Password Choices

E.H. Spafford
Added 2002-07-26

Authorship Analysis Identifying the Author of a Program

COAST TR 94-08
Ivan Krsul
Download: PDF

Authorship analysis on computer software is a difficult problem. In this paper we explore the classification of programmers’ style, and try to find a set of characteristics
                            that remain constant for a significant portion of the programs that this programmer might produce. Our goal is to show that it is possible to identify the author of a
                            program by examining programming style characteristics. Within a closed environment the results of this paper support the conclustion that, for a specific set of
                            programmers, it is possible to identify the author of any individual program. Also, based on previous work and our observations during the experiments described herein
                            we believe that the probablity of finding two programmers who share exactly those characteristics should be very small.

Added 2002-07-26

Using the Techniques of a Security Assessment to Guide Technology Development in Education

CERIAS TR 1999-12
Stephanie Miller
Download: PDF

The goal of this thesis is to structure and present the complete process involved in implementing a security assessment.  Our objective is to capture the essence of a successful security assessment.  We will not only document best practices, but will outline such an assessment for a project underway in the School of Education and funded by the State of Indiana.  That project promotes improved evaluation of special needs students. The result of this work has been a concrete example of a security assessment methodology as well as a documented process that can be utilized as a template in future assessments.the assessment techniques we recommend in this thesis include project examination, threat analysis, modeling of data flows, and development of a security architecture. Other topics we will address throughout the document include fundamental security precautions, such as ensuring confidentiality, integrity, and availability. We will offer insight on dissemination of results to project sponsors and users to encourage the effectiveness of the deliverales produced during a security assessment.

Added 2002-07-26


Address Weaknesses in the Domain Name System Protocol

CSD-TR-94-028
Christoph L. Schuba
Added 2002-07-26

Countering Abuse of Name-Based Authentication

CSD-TR-94-029
Christoph L. Schuba, E.H. Spafford
Download: PDF
Added 2002-07-26

Classical IP and ARP over ATM

CSD-TR-95-024
Christoph L. Schuba, Berry Kercheval, E.H. Spafford
Download: PDF
Added 2002-07-26



Report on the IEEE CS 1996 Symposium on Security and Privacy

Christoph L. Schuba, Mary Ellen Zurko
Added 2002-07-26

Analysis of a Denial of Service Attack on TCP

Christoph L. Schuba, Ivan Krsul, Markus Kuhn, E. H. Spafford, Aurobindo Sundaram, and Diego Zamboni
Download: PDF
Added 2002-07-26


Design of Mutant Operators for the C Programming Language

Argrawal, DeMillo, Hathaway, Hsu, Krauser, Martin, Mathur, Spafford

Mutation analysis is a method for reliable testing of large software systems.  It provides a method for assessing the adequacy of test data.  Mothra (DeMi87) is a mutation analysis based software testing environment that currently supports the testing of Fortran 77 programs.  Work is underway to enhance this tool along several dimensions.  One of these is the addition of multilingual capability.  C is one of the languages that we plan to support.

Added 2002-07-26