Home / Talks / Presentations

Presentations

[Paper] Enhancing Passwords Security using Deceptive Covert Communication

Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford International Conference on ICT Systems Security and Privacy Protection, IFIP SEC’15, May 26-28, 2015, Hamburg, Germany ABSTRACT: The use of deception to enhance security has shown promising results as a defensive technique. In this paper we present an authentication scheme that …

Read More »

[Paper] Planning and Integrating Deception into Computer Security Defenses

Mohammed H. Almeshekah and Eugene H. Spafford New Security Paradigms Workshop (NSPW’14), Victoria, BC, Canada, 15-18 September 2014 ABSTRACT: Deceptive techniques played a prominent role in many human conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the …

Read More »

[Paper] The Case of Using Negative (Deceiving) Information in Data Protection

Mohammed H. Almeshekah and Eugene H. Spafford [Paper] Proceedings of the 9th International Conference on Cyber Warfare and Security ICCWS-2014, ISSN: 2048-9870, Academic Conferences and Publishing International Limited, March 2014 [Poster] 15th Annual Information Security Symposium, CERIAS, Purdue, March, 2014 (Best Poster Award)   ABSTRACT: As the convergence between our physical …

Read More »

Proposal for Better Revocation Model of SSL/TLS Certificates

Mohammed H. Almeshekah Mozilla Corporation, September 2013    ABSTRACT: There are multiple initiatives that have emerged in the past couple of years to address some of the inherit limitation of the CA-based trust model and SSL certificates. One of the these limitations is the current revocation models. In this document we …

Read More »

[Paper] Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford [Paper] SPW’13, in Security Protocols XXI (B. Christianson, J. Malcolm, F. Stajano, and J. Anderson, eds.), vol. 8263 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2013 [Poster] 14th Annual Information Security Symposium, CERIAS, Purdue, March 2013 (3rd Best Paper Award …

Read More »