Skip to main content

Showing 1–4 of 4 results for author: Husain, M I

Searching in archive cs. Search in all archives.
.
  1. arXiv:1205.1462  [pdf, ps, other

    cs.IT cs.CC

    Almost Universal Hash Families are also Storage Enforcing

    Authors: Mohammad Iftekhar Husain, Steve Ko, Atri Rudra, Steve Uurtamo

    Abstract: We show that every almost universal hash function also has the storage enforcement property. Almost universal hash functions have found numerous applications and we show that this new storage enforcement property allows the application of almost universal hash functions in a wide range of remote verification tasks: (i) Proof of Secure Erasure (where we want to remotely erase and securely update th… ▽ More

    Submitted 7 May, 2012; originally announced May 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1104.3025

  2. arXiv:1202.5282  [pdf, ps, other

    cs.CR cs.OS

    How to Bypass Verified Boot Security in Chromium OS

    Authors: Mohammad Iftekhar Husain, Lokesh Mandvekar, Chunming Qiao, Ramalingam Sridhar

    Abstract: Verified boot is an interesting feature of Chromium OS that supposedly can detect any modification in the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware or keylogger and still pass the verified boot process. The exploit is… ▽ More

    Submitted 2 June, 2012; v1 submitted 23 February, 2012; originally announced February 2012.

    Comments: Update information about Chromium OS. Added new and advanced exploits. Added mitigation techniques and evaluation

  3. arXiv:1108.5148  [pdf, ps, other

    cs.CR cs.CC cs.NI

    CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity

    Authors: Mohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar

    Abstract: A common approach for introducing security at the physical layer is to rely on the channel variations of the wireless environment. This type of approach is not always suitable for wireless networks where the channel remains static for most of the network lifetime. For these scenarios, a channel independent physical layer security measure is more appropriate which will rely on a secret known to the… ▽ More

    Submitted 25 August, 2011; originally announced August 2011.

    Comments: 9 pages, 15 figures

  4. arXiv:1104.3025  [pdf, ps, other

    cs.CC

    Storage Enforcement with Kolmogorov Complexity and List Decoding

    Authors: Mohammad Iftekhar Husain, Steve Ko, Atri Rudra, Steve Uurtamo

    Abstract: We consider the following problem that arises in outsourced storage: a user stores her data $x$ on a remote server but wants to audit the server at some later point to make sure it actually did store $x$. The goal is to design a (randomized) verification protocol that has the property that if the server passes the verification with some reasonably high probability then the user can rest assured th… ▽ More

    Submitted 15 April, 2011; originally announced April 2011.

    ACM Class: F.2; E.4; H.3