Author image not provided
 Gaurav Shah

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article10.67
Citation Count64
Publication count6
Publication years2005-2009
Available for download1
Average downloads per article621.00
Downloads (cumulative)621
Downloads (12 Months)12
Downloads (6 Weeks)3
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


6 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 6 of 6
Sort by:

1 published by ACM
November 2009 CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
Publisher: ACM
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 12,   Downloads (Overall): 621

Full text available: PDFPDF
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countries generally use one of two technologies when they conduct legally-authorized interception of telephones and other communications traffic. The most common of these, designed to comply ...
Keywords: calea, law enforcement wiretaps, wiretapping

August 2009 WOOT'09: Proceedings of the 3rd USENIX conference on Offensive technologies
Publisher: USENIX Association
Citation Count: 4

This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require the ability to send messages ...

January 2009
Citation Count: 0

Covert timing channels have been considered a significant threat in multi-level systems (MLS) because of their capability in aiding information leakage across level boundaries leading to security policy violations. However, their threat in general purpose systems has not been considered in much detail. In fact, under the commonly assumed threat ...

July 2008 EVT'08: Proceedings of the conference on Electronic voting technology
Publisher: USENIX Association
Citation Count: 6

This paper summarizes a security analysis of the DRE and optical scan voting systems manufactured by Election Systems and Software (ES&S), as used in Ohio (and many other jurisdictions inside and outside the US). We found numerous exploitable vulnerabilities in nearly every component of the ES&S system. These vulnerabilities enable ...

July 2006 USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Publisher: USENIX Association
Citation Count: 49

This paper introduces JitterBugs, a class of inline interception mechanisms that covertly transmit data by perturbing the timing of input events likely to affect externally observable network traffic. JitterBugs positioned at input devices deep within the trusted environment (e.g., hidden in cables or connectors) can leak sensitive data without compromising ...

November 2005 NPSEC'05: Proceedings of the First international conference on Secure network protocols
Publisher: IEEE Computer Society
Citation Count: 1

Accounting protocols are used to quantify traffic to support billing, QoS assurances, and other objectives. Current protocols do not provide complete security for this purpose because of the threat of 'cramming' attacks in which unauthenticated parties can introduce traffic that the accounting system attributes incorrectly. In this paper we explain ...

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us