Skip to main content

Showing 1–4 of 4 results for author: Khouzani, M

Searching in archive math. Search in all archives.
.
  1. arXiv:1505.02325  [pdf, other

    cs.GT cs.CR math.OC

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report)

    Authors: MHR Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa

    Abstract: Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it is a password for user authentication or a secret key for a cryptographic primitive, picking it requires the user to trade-off usability costs with resistance against an adversary: a simple password is easier to remember but is also easier to guess; likewise, a shorter cryptographic key may require fewer co… ▽ More

    Submitted 9 May, 2015; originally announced May 2015.

    Comments: This manuscript is the extended version of our conference paper: "Picking vs. Guessing Secrets: A Game-Theoretic Analysis", in 28th IEEE Computer Security Foundations Symposium (CSF 2015), Verona, Italy, July 2015

    MSC Class: 91A05; 91A80 ACM Class: K.6.5

  2. arXiv:1403.1642  [pdf, other

    eess.SY cs.DC cs.NI math.OC

    Optimal Energy-Aware Epidemic Routing in DTNs

    Authors: Soheil Eshghi, MHR. Khouzani, Saswati Sarkar, Ness B. Shroff, Santosh S. Venkatesh

    Abstract: In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy leve… ▽ More

    Submitted 2 June, 2015; v1 submitted 6 March, 2014; originally announced March 2014.

    Comments: 17 pages, 9 figures

  3. arXiv:1403.1639  [pdf, other

    cs.CR cs.NI cs.SI eess.SY math.OC

    Optimal Patching in Clustered Malware Epidemics

    Authors: Soheil Eshghi, MHR. Khouzani, Saswati Sarkar, Santosh S. Venkatesh

    Abstract: Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc. can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies th… ▽ More

    Submitted 6 March, 2014; originally announced March 2014.

    Comments: 18 pages, 6 figures

  4. arXiv:1203.1687  [pdf, other

    eess.SY math.OC

    An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?

    Authors: M. H. R. Khouzani, Soumya Sen, Ness B. Shroff

    Abstract: Recent incidents of cybersecurity violations have revealed the importance of having firewalls and other intrusion detection systems to monitor traffic entering and leaving access networks. But the adoption of such security measures is often stymied by `free-riding' effects and `shortsightedness' among Internet service providers (ISPs). In this work, we develop an analytical framework that not only… ▽ More

    Submitted 7 March, 2012; originally announced March 2012.

    Comments: 9 pages, 1 figure, technical report (detailed version) of a conference submission