Most Downloaded

  • “Practical and secure Software-Based attestation.” .
    [Bibtex]
    @inproceedings{lightsec,
    citeulike-article-id = {12477272},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:33:26},
    priority = {2},
    title = {Practical and Secure {Software-Based} Attestation},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf}
    }
  • M. Jakobsson and G. Stewart, “Mobile malware: why the traditional AV paradigm is doomed, and how to use physics to detect undesirable routines,” in Blackhat, 2013.
    [Bibtex]
    @inproceedings{blackhat13,
    abstract = {The traditional {Anti-Virus} paradigm focuses on signature-based and behavioral detection. These require substantial processing, which hurts the limited power resources of handsets. Also, carriers are reluctant and slow to deliver Firmware Over The Air ({FOTA}) patches, due to the rigorous testing they need to subject updates to, and the costs of over-the-air updates. A move to cloud-based screening fails to recognize that not all threats will be propagated over the backbone, may obfuscate themselves in transit; or fight back (as rootkits do) to evade reporting or use of techniques such as the ``Google kill switch''. Hardware vendors are evaluating security solutions with hardware support, such as {TrustZone}, but while this reduces the vulnerabilities, it still exposes an attack surface.
    We describe a new approach that detects the presence of any undesirable routines -- including corruptions of the code used to perform this detection. The security assertions we make are not based on heuristics, but rather, rely on the physical characteristics of the target device. We detail the approach, which does not rely on hardware modifications, and explain how to analyze its security.},
    author = {Jakobsson, Markus and Stewart, Guy},
    booktitle = {BlackHat},
    citeulike-article-id = {12477269},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:26:29},
    priority = {2},
    title = {Mobile Malware: Why the Traditional {AV} Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    year = {2013}
    }
  • M. Jakobsson and S. Wetzel, “Security weaknesses in bluetooth,” in Ct-rsa 2001: proceedings of the 2001 conference on topics in cryptology, London, UK, 2001, pp. 176-191.
    [Bibtex]
    @inproceedings{weakness-bluetooth,
    address = {London, UK},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology},
    citeulike-article-id = {7845896},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01.pdf},
    keywords = {mobile, most-downloaded, publications},
    pages = {176--191},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Security Weaknesses in Bluetooth},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01.pdf},
    year = {2001}
    }
  • M. Jakobsson and K. Johansson, “Retroactive detection of malware with applications to mobile platforms,” in Hotsec 2010, Washington, DC, 2010.
    [Bibtex]
    @inproceedings{JJ10b,
    address = {Washington, DC},
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {HotSec 2010},
    citeulike-article-id = {7845869},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    keywords = {fraud, malware, mobile, most-downloaded, publications},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    publisher = {USENIX},
    title = {Retroactive Detection of Malware With Applications to Mobile Platforms},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    year = {2010}
    }
  • V. Griffith and M. Jakobsson, “Messin ‘ with texas: deriving mother’s maiden names using public records,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{mmn,
    address = {New York, NY},
    author = {Griffith, Virgil and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845863},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    keywords = {fraud, most-downloaded, privacy, publications},
    month = jun,
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {Messin ' with Texas: Deriving Mother's Maiden Names Using Public Records},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    year = {2005}
    }
  • M. Gandhi, M. Jakobsson, and J. Ratkiewicz, “Badvertisements: stealthy click-fraud with unwitting accessories,” Journal of digital forensics practice, vol. 1, iss. 2, 2006.
    [Bibtex]
    @article{badvertisements,
    author = {Gandhi, Mona and Jakobsson, Markus and Ratkiewicz, Jacob},
    citeulike-article-id = {7845853},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-jdfp06.pdf},
    journal = {Journal of Digital Forensics Practice},
    keywords = {fraud, malware, most-downloaded, publications},
    number = {2},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Taylor \& Francis},
    title = {Badvertisements: Stealthy click-fraud with unwitting accessories},
    url = {http://markus-jakobsson.com/papers/jakobsson-jdfp06.pdf},
    volume = {1},
    year = {2006}
    }
  • T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. acm, vol. 50, iss. 10, pp. 94-100, 2007.
    [Bibtex]
    @article{social-phishing,
    address = {New York, NY, USA},
    author = {Jagatic, Tom N. and Johnson, Nathaniel A. and Jakobsson, Markus and Menczer, Filippo},
    citeulike-article-id = {7845851},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    journal = {Commun. ACM},
    keywords = {facebook, fraud, most-downloaded, phishing, publications, user-experiments},
    number = {10},
    pages = {94--100},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Social phishing},
    url = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    volume = {50},
    year = {2007}
    }
  • P. Finn and M. Jakobsson, “Designing and conducting phishing experiments,” in In ieee technology and society magazine, special issue on usability and security, 2007.
    [Bibtex]
    @inproceedings{Finn07designingand,
    author = {Finn, Peter and Jakobsson, Markus},
    booktitle = {In IEEE Technology and Society Magazine, Special Issue on Usability and Security},
    citeulike-article-id = {7845850},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    keywords = {fraud, most-downloaded, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {Designing and Conducting Phishing Experiments},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    year = {2007}
    }
  • M. Jakobsson, E. Shriver, B. K. Hillyer, and A. Juels, “A practical secure physical random bit generator,” in Ccs ’98: proceedings of the 5th acm conference on computer and communications security, New York, NY, USA, 1998, pp. 103-111.
    [Bibtex]
    @inproceedings{random-bit-gen,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Shriver, Elizabeth and Hillyer, Bruce K. and Juels, Ari},
    booktitle = {CCS '98: Proceedings of the 5th ACM conference on Computer and communications security},
    citeulike-article-id = {7845799},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs98.pdf},
    keywords = {building-blocks, most-downloaded, publications},
    location = {San Francisco, California, United States},
    pages = {103--111},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {A practical secure physical random bit generator},
    url = {http://markus-jakobsson.com/papers/jakobsson-ccs98.pdf},
    year = {1998}
    }
  • D. Coppersmith and M. Jakobsson, “Almost optimal hash sequence traversal,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 102-119.
    [Bibtex]
    @inproceedings{coppersmith-jakobsson,
    address = {Berlin, Heidelberg},
    author = {Coppersmith, Don and Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7845797},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    keywords = {building-blocks, mobile, most-downloaded, privacy, publications},
    location = {Southampton, Bermuda},
    pages = {102--119},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Almost optimal hash sequence traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    year = {2003}
    }
  • M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Eurocrypt’96: proceedings of the 15th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1996, pp. 143-154.
    [Bibtex]
    @inproceedings{verifier-proofs,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Sako, Kazue and Impagliazzo, Russell},
    booktitle = {EUROCRYPT'96: Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845775},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    keywords = {authentication, building-blocks, most-downloaded, privacy, publications},
    location = {Saragossa, Spain},
    pages = {143--154},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Designated verifier proofs and their applications},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    year = {1996}
    }
  • M. Jakobsson and J. Ratkiewicz, “Designing ethical phishing experiments: a study of (ROT13) rOnl query features,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 513-522.
    [Bibtex]
    @inproceedings{ethical-phishing-www06,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Ratkiewicz, Jacob},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845763},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    keywords = {authentication, fraud, most-downloaded, phishing, publications, user-experiments},
    location = {Edinburgh, Scotland},
    pages = {513--522},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Designing ethical phishing experiments: a study of ({ROT13}) {rOnl} query features},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    year = {2006}
    }
  • M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang, “Love and authentication,” in Chi ’08: proceeding of the twenty-sixth annual sigchi conference on human factors in computing systems, New York, NY, USA, 2008, pp. 197-200.
    [Bibtex]
    @inproceedings{love-auth-chi08,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stolterman, Erik and Wetzel, Susanne and Yang, Liu},
    booktitle = {CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems},
    citeulike-article-id = {7845759},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    keywords = {authentication, most-downloaded, publications, user-experiments},
    location = {Florence, Italy},
    pages = {197--200},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Love and authentication},
    url = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    year = {2008}
    }

Comments are closed.