Skip to main content

Showing 1–11 of 11 results for author: Yadav, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.06159  [pdf, other

    cs.CR

    Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers

    Authors: Anuj Gautam, Tarun Kumar Yadav, Kent Seamons, Scott Ruoti

    Abstract: Password-based authentication faces various security and usability issues. Password managers help alleviate some of these issues by enabling users to manage their passwords effectively. However, malicious client-side scripts and browser extensions can steal passwords after they have been autofilled by the manager into the web page. In this paper, we explore what role the password manager can take… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  2. arXiv:2311.00812  [pdf, other

    cs.CR

    InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users

    Authors: Tarun Yadav, Austin Cook, Justin Hales, Kent Seamons

    Abstract: Billions of secure messaging users have adopted end-to-end encryption (E2EE). Nevertheless, challenges remain. Most communication applications do not provide E2EE, and application silos prevent interoperability. Our qualitative analysis of privacy-conscious users' discussions of E2EE on Reddit reveals concerns about trusting client applications with plaintext, lack of clear indicators about how en… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  3. arXiv:2308.02973  [pdf, other

    cs.CR

    A Security and Usability Analysis of Local Attacks Against FIDO2

    Authors: Tarun Kumar Yadav, Kent Seamons

    Abstract: The FIDO2 protocol aims to strengthen or replace password authentication using public-key cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote attackers that compromise a password or attempt to phish the user. In this paper, we explore threats from local attacks on FIDO2 that have received less attention -- a browser extension compromise and attackers gaining… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  4. arXiv:2306.11766  [pdf, other

    cs.HC

    Agreeing and Disagreeing in Collaborative Knowledge Graph Construction: An Analysis of Wikidata

    Authors: Elisavet Koutsiana, Tushita Yadav, Nitisha Jain, Albert Meroño-Peñuela, Elena Simperl

    Abstract: In this work, we study disagreement in discussions around Wikidata, an online knowledge community that builds the data backend of Wikipedia. Discussions are important in collaborative work as they can increase contributor performance and encourage the emergence of shared norms and practices. While disagreements can play a productive role in discussions, they can also lead to conflicts and controve… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

  5. arXiv:2210.09940  [pdf, other

    cs.CR

    Automatic Detection of Fake Key Attacks in Secure Messaging

    Authors: Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent Seamons

    Abstract: Popular instant messaging applications such as WhatsApp and Signal provide end-to-end encryption for billions of users. They rely on a centralized, application-specific server to distribute public keys and relay encrypted messages between the users. Therefore, they prevent passive attacks but are vulnerable to some active attacks. A malicious or hacked server can distribute fake keys to users to p… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: An extended version of our paper published at ACM CCS 2022

  6. arXiv:1903.09940  [pdf, other

    cs.CV cs.LG

    Variational Inference with Latent Space Quantization for Adversarial Resilience

    Authors: Vinay Kyatham, Mayank Mishra, Tarun Kumar Yadav, Deepak Mishra, Prathosh AP

    Abstract: Despite their tremendous success in modelling high-dimensional data manifolds, deep neural networks suffer from the threat of adversarial attacks - Existence of perceptually valid input-like samples obtained through careful perturbation that lead to degradation in the performance of the underlying model. Major concerns with existing defense mechanisms include non-generalizability across different… ▽ More

    Submitted 6 September, 2019; v1 submitted 24 March, 2019; originally announced March 2019.

  7. Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning

    Authors: Tarun Yadav, Koustav Sadhukhan

    Abstract: TLS protocol is an essential part of secure Internet communication. In past, many attacks have been identified on the protocol. Most of these attacks are due to flaws in protocol implementation. The flaws are due to improper design and implementation of program logic by programmers. One of the widely used implementation of TLS is SChannel which is used in Windows operating system since its incepti… ▽ More

    Submitted 20 February, 2019; originally announced February 2019.

    Comments: 9 pages, 8 figures, 1 table

    Journal ref: Security in Computing and Communications 2018, Communications in Computer and Information Science, Springer

  8. arXiv:1808.01708  [pdf, other

    cs.CY

    Where The Light Gets In: Analyzing Web Censorship Mechanisms in India

    Authors: Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Sharma, Sambuddho Chakravarty

    Abstract: This paper presents a detailed study of the Internet censorship in India. We consolidated a list of potentially blocked websites from various public sources to assess censorship mechanisms used by nine major ISPs. To begin with, we demonstrate that existing censorship detection tools like OONI are grossly inaccurate. We thus developed various techniques and heuristics to correctly assess censorshi… ▽ More

    Submitted 5 August, 2018; originally announced August 2018.

  9. Technical Aspects of Cyber Kill Chain

    Authors: Tarun Yadav, Rao Arvind Mallari

    Abstract: Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on rganizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder tak… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: 7 pages, 1 figure, 4 tables, The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-22915-7_40

  10. Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats

    Authors: Koustav Sadhukhan, Rao Arvind Mallari, Tarun Yadav

    Abstract: Attacks in cyberspace have got attention due to risk at privacy, breach of trust and financial losses for individuals as well as organizations. In recent years, these attacks have become more complex to analyze technically, as well as to detect and prevent from accessing confidential data. Although there are many methodologies and mechanisms which have been suggested for cyber-attack detection and… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

    Comments: 9 Pages, 1 Figure, 2015 International Conference on Computing and Network Communications (CoCoNet), The final publication is available at IEEE Xplore via http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7411183

  11. arXiv:1606.02889  [pdf, other

    cs.DS cs.CC

    Approximation Algorithm for N-distance Minimal Vertex Cover Problem

    Authors: Tarun Yadav, Koustav Sadhukhan, Rao Arvind Mallari

    Abstract: Evolution of large scale networks demand for efficient way of communication in the networks. One way to propagate information in the network is to find vertex cover. In this paper we describe a variant of vertex cover problem naming it N-distance Vertex Minimal Cover(N-MVC) Problem to optimize information propagation throughout the network. A minimum subset of vertices of a unweighted and undirect… ▽ More

    Submitted 9 June, 2016; originally announced June 2016.

    Comments: 5 Pages