Skip to main content

Showing 1–17 of 17 results for author: Sherman, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2108.06247  [pdf, other

    cs.AI

    Optical Adversarial Attack

    Authors: Abhiram Gnanasambandam, Alex M. Sherman, Stanley H. Chan

    Abstract: We introduce OPtical ADversarial attack (OPAD). OPAD is an adversarial attack in the physical space aiming to fool image classifiers without physically touching the objects (e.g., moving or painting the objects). The principle of OPAD is to use structured illumination to alter the appearance of the target objects. The system consists of a low-cost projector, a camera, and a computer. The challenge… ▽ More

    Submitted 15 August, 2021; v1 submitted 13 August, 2021; originally announced August 2021.

    Comments: ICCV Workshop 2021

  2. arXiv:2105.10794  [pdf, other

    cs.CR

    AOT: Anonymization by Oblivious Transfer

    Authors: Farid Javani, Alan T. Sherman

    Abstract: We introduce AOT, an anonymous communication system based on mix network architecture that uses oblivious transfer (OT) to deliver messages. Using OT to deliver messages helps AOT resist blending ($n-1$) attacks and helps AOT preserve receiver anonymity, even if a covert adversary controls all nodes in AOT. AOT comprises three levels of nodes, where nodes at each level perform a different function… ▽ More

    Submitted 22 May, 2021; originally announced May 2021.

  3. arXiv:2104.07310  [pdf, other

    eess.AS cs.SD

    Investigating the Utility of Multimodal Conversational Technology and Audiovisual Analytic Measures for the Assessment and Monitoring of Amyotrophic Lateral Sclerosis at Scale

    Authors: Michael Neumann, Oliver Roesler, Jackson Liscombe, Hardik Kothare, David Suendermann-Oeft, David Pautler, Indu Navar, Aria Anvar, Jochen Kumm, Raquel Norel, Ernest Fraenkel, Alexander V. Sherman, James D. Berry, Gary L. Pattee, Jun Wang, Jordan R. Green, Vikram Ramanarayanan

    Abstract: We propose a cloud-based multimodal dialog platform for the remote assessment and monitoring of Amyotrophic Lateral Sclerosis (ALS) at scale. This paper presents our vision, technology setup, and an initial investigation of the efficacy of the various acoustic and visual speech metrics automatically extracted by the platform. 82 healthy controls and 54 people with ALS (pALS) were instructed to int… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

  4. arXiv:2103.07180  [pdf, other

    cs.CR cs.HC

    Phrase-Verified Voting: Verifiable Low-Tech Remote Boardroom Voting

    Authors: Enka Blanchard, Ryan Robucci, Ted Selker, Alan Sherman

    Abstract: We present Phrase-Verified Voting, a voter-verifiable remote voting system assembled from commercial off-the-shelf software for small private elections. The system is transparent and enables each voter to verify that the tally includes their ballot selection without requiring any understanding of cryptography. This paper describes the system and its use in fall 2020, to vote remotely in promotion… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

  5. arXiv:2010.02421  [pdf, other

    cs.CR

    BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer

    Authors: Farid Javani, Alan T. Sherman

    Abstract: A boardroom election is an election with a small number of voters carried out with public communications. We present BVOT, a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally information is available before the polls close), and dispute-freeness (voters can observe that all voters correctly followed the protocol). BVOT works by using a multiparty threshold homomorph… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

  6. arXiv:2007.14916  [pdf, other

    cs.CR

    Boardroom Voting: Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room

    Authors: Enka Blanchard, Ted Selker, Alan T. Sherman

    Abstract: A boardroom election is an election that takes place in a single room -- the boardroom -- in which all voters can see and hear each other. We present an initial exploration of boardroom elections with ballot privacy and voter verifiability that use only "low-tech cryptography" without using computers to mark or collect ballots. Specifically, we define the problem, introduce several building blocks… ▽ More

    Submitted 18 March, 2021; v1 submitted 29 July, 2020; originally announced July 2020.

    Comments: 16 pages

  7. arXiv:2004.05248  [pdf, other

    cs.CR cs.CY

    Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity

    Authors: Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti

    Abstract: We reflect on our ongoing journey in the educational Cybersecurity Assessment Tools (CATS) Project to create two concept inventories for cybersecurity. We identify key steps in this journey and important questions we faced. We explain the decisions we made and discuss the consequences of those decisions, highlighting what worked well and what might have gone better. The CATS Project is creating… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

    Comments: Invited paper for the 2020 National Cyber Summit, June 2-4, 2020, in Huntsville, AL

  8. arXiv:2003.07421  [pdf, other

    cs.CR

    Formal Methods Analysis of the Secure Remote Password Protocol

    Authors: Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig, Ian Blumenfeld

    Abstract: We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed Password Authenticated Key Exchange (PAKE) protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a pr… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

  9. arXiv:1909.04230  [pdf

    cs.HC

    Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments

    Authors: Travis Scheponik, Enis Golaszewski, Geoffrey Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, Alan T. Sherman

    Abstract: We present and analyze results from a pilot study that explores how crowdsourcing can be used in the process of generating distractors (incorrect answer choices) in multiple-choice concept inventories (conceptual tests of understanding). To our knowledge, we are the first to propose and study this approach. Using Amazon Mechanical Turk, we collected approximately 180 open-ended responses to severa… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

  10. arXiv:1908.06964  [pdf

    cs.CR cs.CC cs.DS cs.SC math.NT

    PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion Manuscripts

    Authors: Dhananjay Phatak, Alan T. Sherman, Steven D. Houston, Andrew Henry

    Abstract: In this set of three companion manuscripts/articles, we unveil our new results on primality testing and reveal new primality testing algorithms enabled by those results. The results have been classified (and referred to) as lemmas/corollaries/claims whenever we have complete analytic proof(s); otherwise the results are introduced as conjectures. In Part/Article 1, we start with the Baseline Prim… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

    Comments: a set of 3 companion articles.217 (two hundred and seventeen) pages including everything = table of contents, list of figures, list of tables and an acknowledgment at the end. There is no watermark or highlighted text. Only color is in hyper-links and figures

  11. arXiv:1901.09286  [pdf, ps, other

    cs.CR cs.CY

    The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories

    Authors: Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh Verma, Ryan Vrecenar

    Abstract: For two days in February 2018, 17 cybersecurity educators and professionals from government and industry met in a "hackathon" to refine existing draft multiple-choice test items, and to create new ones, for a Cybersecurity Concept Inventory (CCI) and Cybersecurity Curriculum Assessment (CCA) being developed as part of the Cybersecurity Assessment Tools (CATS) Project. We report on the results of t… ▽ More

    Submitted 26 January, 2019; originally announced January 2019.

    Comments: Submitted to IEEE Secuirty & Privacy

  12. arXiv:1811.06078  [pdf, other

    cs.CR

    Phishing in an Academic Community: A Study of User Susceptibility and Behavior

    Authors: Alejandra Diaz, Alan T. Sherman, Anupam Joshi

    Abstract: We present an observational study on the relationship between demographic factors and phishing susceptibility at the University of Maryland, Baltimore County (UMBC). In spring 2018, we delivered phishing attacks to 450 randomly-selected students on three different days (1,350 students total) to examine user click rates and demographics among UMBC's undergraduates. Participants were initially unawa… ▽ More

    Submitted 14 November, 2018; originally announced November 2018.

    Comments: 7 pages, 5 figures, 3 tables, submitted to Cryptologia

  13. arXiv:1811.04794  [pdf, other

    cs.CR

    The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students

    Authors: Alan Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess

    Abstract: May 30-June 2, 2017, Scholarship for Service (SFS) scholars at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted aspect of the UMBC computer systems. During this hands-on study, with complete access to source code, students identified vulnerabilities, devised and implemented exploits, and suggested mitigations. As part of a pioneering program at UMBC to extend… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

    Comments: Full-length report with 18 pages, 4 figures

  14. arXiv:1810.06130  [pdf

    cs.CR

    On the Origins and Variations of Blockchain Technologies

    Authors: Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski

    Abstract: We explore the origins of blockchain technologies to better understand the enduring needs they address. We identify the five key elements of a blockchain, show embodiments of these elements, and examine how these elements come together to yield important properties in selected systems. To facilitate comparing the many variations of blockchains, we also describe the four crucial roles of blockchain… ▽ More

    Submitted 14 October, 2018; originally announced October 2018.

    Comments: 14 pages, 3 tables, includes all references. A short version with ten references will be submitted to IEEE Security & Privacy in October 2018

  15. arXiv:1710.02041  [pdf

    cs.CY

    Civil Asset Forfeiture: A Judicial Perspective

    Authors: Leslie Barrett, Wayne Krug, Zefu Lu, Karin D. Martin, Roberto Martin, Alexandra Ortan, Anu Pradhan, Alexander Sherman, Michael W. Sherman, Ryon Smey, Trent Wenzel

    Abstract: Civil Asset Forfeiture (CAF) is a longstanding and controversial legal process viewed on the one hand as a powerful tool for combating drug crimes and on the other hand as a violation of the rights of US citizens. Data used to support both sides of the controversy to date has come from government sources representing records of the events at the time of occurrence. Court dockets represent litigati… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

    Comments: Presented at the Data For Good Exchange 2017

  16. arXiv:1706.05092  [pdf, ps, other

    cs.CR

    Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project

    Authors: Alan T. Sherman, Linda Oliva, David DeLatte, Enis Golaszewski, Michael Neary, Konstantinos Patsourakos, Dhananjay Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson

    Abstract: We report on the status of our Cybersecurity Assessment Tools (CATS) project that is creating and validating a concept inventory for cybersecurity, which assesses the quality of instruction of any first course in cybersecurity. In fall 2014, we carried out a Delphi process that identified core concepts of cybersecurity. In spring 2016, we interviewed twenty-six students to uncover their understand… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

    Comments: Appears in the proceedings of the 2017 National Cyber Summit (June 6--8, 2017, Huntsville, AL)

  17. arXiv:1703.08859  [pdf, ps, other

    cs.CY cs.CR

    The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research

    Authors: Alan Sherman, M. Dark, A. Chan, R. Chong, T. Morris, L. Oliva, J. Springer, B. Thuraisingham, C. Vatcher, R. Verma, S. Wetzel

    Abstract: Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) fielded a collaborative course to engage students in solving applied cybersecurity research problems. We describe our experiences with this Information Security Research and Education (INSuRE) research collaborative. We explain how we conducted our project-based research course, give examples of stu… ▽ More

    Submitted 26 March, 2017; originally announced March 2017.

    Comments: A shorter version of this paper has been submitted to IEEE Security and Privacy