The Experts below are selected from a list of 48 Experts worldwide ranked by ideXlab platform
Liviu Itoafa - One of the best experts on this subject based on the ideXlab platform.
-
Live Forensics – Extracting Credentials on Windows and Linux Systems
2016Co-Authors: Liviu ItoafaAbstract:Abstract: ’Post-mortem ’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows ’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them. As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (Protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings, and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application
-
live forensics extracting credentials on windows and linux systems
Journal of Mobile Embedded and Distributed Systems, 2012Co-Authors: Liviu ItoafaAbstract:’Post-mortem’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them. As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (Protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients ...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings , and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application.
Irene Damico - One of the best experts on this subject based on the ideXlab platform.
-
decoherence Protected Storage of exciton qubits through ultrafast multipulse control
Physical Review B, 2008Co-Authors: Thomas E Hodgson, Lorenza Viola, Irene DamicoAbstract:We quantitatively investigate the usefulness and viability of the scheme developed by Viola and Lloyd [Phys. Rev. A 58, 2733 (1998)] to control dephasing in the context of exciton-based quantum computation with self-assembled quantum dots. We demonstrate that optical coherence of a confined exciton qubit exposed to phonon-induced dephasing can be substantially enhanced through the application of a simple periodic sequence of control pulses. The shape of the quantum dot has a significant effect on the dephasing properties. Remarkably, we find that quantum dots with parameters optimized for implementing quantum computation are among the most susceptible to dephasing, yet periodic decoupling is most efficient for exactly that type of dot. We also show that the presence of an electric field, which is a necessary ingredient for many exciton-based quantum computing schemes, may further increase the control efficiency. Our results suggest that dynamical decoupling may be a method of choice for robust Storage of exciton qubits during idle stages of quantum algorithms.
Dengguo Feng - One of the best experts on this subject based on the ideXlab platform.
-
type based analysis of Protected Storage in the tpm
International Conference on Information and Communication Security, 2013Co-Authors: Jianxiong Shao, Dengguo FengAbstract:The Trusted Platform Module (TPM) is designed to enable trustworthy computation and communication over open networks. The TPM provides a way to store cryptographic keys and other sensitive values in its shielded memory and act as Root of Trust for Storage (RTS). The TPM interacts with applications via a predefined set of commands (an API). In this paper, we give an abstraction model for the TPM 2.0 specification concentrating on Protected Storage part. With identification and formalization of their secrecy properties, we devise a type system with asymmetric cryptographic primitives to statically enforce and prove their security.
Thomas E Hodgson - One of the best experts on this subject based on the ideXlab platform.
-
decoherence Protected Storage of exciton qubits through ultrafast multipulse control
Physical Review B, 2008Co-Authors: Thomas E Hodgson, Lorenza Viola, Irene DamicoAbstract:We quantitatively investigate the usefulness and viability of the scheme developed by Viola and Lloyd [Phys. Rev. A 58, 2733 (1998)] to control dephasing in the context of exciton-based quantum computation with self-assembled quantum dots. We demonstrate that optical coherence of a confined exciton qubit exposed to phonon-induced dephasing can be substantially enhanced through the application of a simple periodic sequence of control pulses. The shape of the quantum dot has a significant effect on the dephasing properties. Remarkably, we find that quantum dots with parameters optimized for implementing quantum computation are among the most susceptible to dephasing, yet periodic decoupling is most efficient for exactly that type of dot. We also show that the presence of an electric field, which is a necessary ingredient for many exciton-based quantum computing schemes, may further increase the control efficiency. Our results suggest that dynamical decoupling may be a method of choice for robust Storage of exciton qubits during idle stages of quantum algorithms.
Michal R Wrobel - One of the best experts on this subject based on the ideXlab platform.
-
operating system security by integrity checking and recovery using write Protected Storage
Iet Information Security, 2014Co-Authors: J Kaczmarek, Michal R WrobelAbstract:An integrity checking and recovery (ICAR) system is presented here, which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write-Protected Storage to eliminate the threat of unauthorised modification. A buffering mechanism was designed and implemented in the system to increase operation performance. Additionally, the system supplies user tools for cryptographic hash generation and security database management. The system is implemented as a kernel extension, compliant with the Linux security model. Experimental evaluation of the system was performed and showed an approximate 10% performance degradation in secured file access compared to regular access.