HCSS'12 Poster Session

file

Visible to the public Science of Security

Abstract:

file

Visible to the public Detecting Malicious Activity in Wireless Sensor Networks using Topic Modeling with Latent Dirichlet Allocation

Abstract:

This work introduces the concept topic modeling utilizing latent Dirichlet allocation (LDA) as a particular approach for detecting malicious activity in wireless sensor networks (WSN). A brief summary of the theory and derivation of the underlying mathematics for LDA is provided for general applications in topic modeling. One insightful real-world application is demonstrated to showcase the extensibility and utility of the LDA algorithm for use in detecting vulnerabilities in computer systems.

Biography:

file

Visible to the public Maude-NPA: Equation-Aware Cryptographic Protocal Analysis

Abstract:

One area that has been particularly productive in the rapidly growing field of formal analysis of cryptographic protocols is development of special-purpose model checkers. These tools use variants of the Dolev-Yao model to search through different concurrent executions of a protocol in the face of a network controlled by an attacker who can read, alter, and redirect traffic using operations available to an honest principal. These tools have been extremely effective at finding non-intuitive flaws in protocol design.