J
Jon Oberheide
Researcher at University of Michigan
Publications - 33
Citations - 3119
Jon Oberheide is an academic researcher from University of Michigan. The author has contributed to research in topics: Authentication protocol & Authentication. The author has an hindex of 20, co-authored 33 publications receiving 3068 citations.
Papers
More filters
Proceedings Article
Rethinking antivirus: executable analysis in the network cloud
TL;DR: It is suggested that each end host run a lightweight process to acquire executables entering a system, send them into the network for analysis, and then run or quarantine them based on a threat report returned by the network service.
Patent
System and method for embedded authentication
TL;DR: In this paper, the authors described various systems and methods of embedded authentication, including the preferred embodiment, which can include sending at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embedding interface.
Patent
System and method for verifying status of an authentication device
Jon Oberheide,Douglas Song +1 more
TL;DR: In this paper, the authors propose a system and method that includes receiving a first device profile and associating it with a first application instance that is assigned as an authentication device of a first account; receiving a second device profile for a second application instance, wherein the second instance is making a request on behalf of the first account.
Patent
System and method of notifying mobile devices to complete transactions
TL;DR: In this paper, the authors propose a method to register an authority device for an account on an auth platform, registering the authority device with the initiator, sending the transaction request to the authority devices, and receiving an authority agent response.
Proceedings ArticleDOI
PatchDroid: scalable third-party security patches for Android devices
TL;DR: The PatchDroid system is designed for device-independent patch creation, and uses in-memory patching techniques to address vulnerabilities in both native and managed code, and represents a realistic path towards dramatically reducing the number of exploitable Android devices in the wild.