Improving Security using Deception

[1]  Ronald L. Rivest,et al.  Honeywords: making password-cracking detectable , 2013, CCS.

[2]  Wei Wang,et al.  Detecting Targeted Attacks By Multilayer Deception , 2013, J. Cyber Secur. Mobil..

[3]  Thomas C. Schmidt,et al.  Design, Implementation, and Operation of a Mobile Honeypot , 2013, ArXiv.

[4]  Collin Mulliner,et al.  Poster : HoneyDroid-Creating a Smartphone Honeypot , 2011 .

[5]  Haining Wang,et al.  BogusBiter: A transparent protection against phishing attacks , 2010, TOIT.

[6]  Eric Michael Hutchins,et al.  Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .

[7]  Adel Bouhoula,et al.  Ensuring security in depth based on heterogeneous network security technologies , 2009, International Journal of Information Security.

[8]  Chris Clifton,et al.  Providing Privacy through Plausibly Deniable Search , 2009, SDM.

[9]  Xu Chen,et al.  Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[10]  Tobias Eggendorfer Combining the SMTP tar pit simulator with white listing , 2008, Security and Management.

[11]  Xuxian Jiang,et al.  An Architectural Approach to Preventing Code Injection Attacks , 2010, IEEE Transactions on Dependable and Secure Computing.

[12]  Ian Welch,et al.  HoneyC - The low-interaction client honeypot , 2006 .

[13]  Guofei Gu,et al.  HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.

[14]  J. Yuill,et al.  Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[15]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[16]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[17]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[18]  Brad L. Hutchings,et al.  A dynamic instruction set computer , 1995, Proceedings IEEE Symposium on FPGAs for Custom Computing Machines.

[19]  Eugene H. Spafford,et al.  The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.

[20]  B. Cheswick An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied , 1997 .

[21]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .