The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many intelligent transportation systems (ITS) in cities with developed economies are making use of mobile technology as data sources (e.g., many crowd-sourced traffic-related applications) to improve the quality and efficiency of transportation networks. Often, these data sources are used to supplement existing traffic monitoring equipment (e.g., ground-loop detectors, traffic cameras), to provide...
In this paper, we address the problem of improving data collection of the education system by presenting School Census Hub (SCH). The SCH concept emerged from field studies with stakeholders in Kenya. The goal of these studies were to help unlocking three key high-level requirements for the design of SCH. i) Budget allocation, allocating budget should be based on a verifiable number of active students...
Mobile devices often operate in resource constrained envi- ronments with intermittent connectivity, bandwidth, bat- tery power, etc. On these devices, existing cooperative con- tent sharing protocols and models (e.g. Peer to Peer and client-server) present major drawbacks. Presently, a user has to maintain the connection between the peers when down- loading content. For instance, when a large multimedia...
Adversaries employ sophisticated fingerprinting techniques to identify Web users and record their browsing history and Web interactions. Fingerprinting leaves no footprint on the browser and is invisible to general Web users, who often lack basic knowledge of it. An analysis of fingerprinting techniques and tools revealed the fingerprinting workflow. This helped define fine-grained properties that...
Several mobile-enabled solutions for education transformation have been deployed in Africa. Drawbacks of these systems include, a predominant focus on disseminating bulk learning content, student outcomes are measured solely on quantitative performance metrics, a lack of instrumentation to capture fine-grained user interaction data, and finally none of them seem to focus on capturing the contextual...
Vulnerable web browser extensions can be used by an attacker to steal users' credentials and lure users into leaking sensitive information to unauthorized parties. Current browser security models and existing JavaScript security solutions are inadequate for preventing JavaScript injection attacks that can exploit such vulnerable extensions. In this paper, we present a runtime protection mechanism...
Most existing work to thwart malicious web pages capture maliciousness viadiscriminative artifacts, learn a model, and detect by leveraging staticand/or dynamic analysis. Unfortunately, there is a two-sided evolution of theartifacts of web pages. On one hand, cybercriminals constantly revamp attackpayloads in malicious web pages. On the other hand, benign web pages evolve toimprove content rendering...
Web applications and server environments hosting them rely on configuration settings that influence their security, usability, and performance. Misconfiguration results in severe security vulnerabilities. Recent trends show that misconfiguration is among the top critical risks in web applications. While effective at uncovering numerous classes of vulnerabilities, generic web application vulnerability...
Attacks such as XSS and SQL injections are still common in browser extensions due to the presence of potential vulnerabilities in extensions and some extensions are also malicious by design. As a consequence, much effort in the past has been spent on detecting vulnerable and malicious browser extensions. These techniques are limited to only detect either new forms of vulnerable or malicious extensions...
Vote verification allows voters or other election participating entities to verify that votes are correctly captured, stored and counted. To facilitate the vote verification process, a number of verification techniques (either physical or digital) have been developed to provide an evidence to voters and other participating entities for the assurance of the integrity of election result. However, we...
During the past few years a huge interests in e-voting has occurred, which resulted in a significant funding for e-voting research and development (R&D) projects with the aim of developing trustworthy e-voting systems. Although it is good that major e-voting development trends are capitalizing on previous R&D efforts in other domains, it is difficult to say that the necessary R&D...
This paper presents a web-based tool to supplement defense against security misconfiguration vulnerabilities in web applications. The tool automatically audits security configuration settings of server environments in web application development and deployment. It also offers features to automatically adjust security configuration settings and quantitatively rates level of safety for server environments...
As the technology for e-voting changes day by day along with an evolution of the regulatory environment, many questions emerge. One of these questions is how to allow voters or any third party to verify votes are correctly captured, stored and counted. This underlines the fact that an e-voting system is not only responsible for ensuring its technical and procedural security, but also must provide...
Malicious websites, when visited by an unsuspecting victim infect her machine to steal invaluable information, redirect her to malicious targets or compromise her system to mount future attacks. While the existing approaches have promising prospects in detecting malicious websites, there are still open issues in effectively and efficiently addressing: filtering of web pages from the wild, coverage...
This paper discusses our approach and experiences on structuring and maintaining requirements for an e-voting system we have built and deployed for elections. Issues related to integrating laws and recommendation for e-voting systems, managing different elections and configurations, supporting a spiral development, yielded problems and approaches to help maintain integrity of requirements and a coherent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.