scispace - formally typeset
J

Jon Oberheide

Researcher at University of Michigan

Publications -  33
Citations -  3119

Jon Oberheide is an academic researcher from University of Michigan. The author has contributed to research in topics: Authentication protocol & Authentication. The author has an hindex of 20, co-authored 33 publications receiving 3068 citations.

Papers
More filters
Book ChapterDOI

Characterizing Dark DNS Behavior

TL;DR: The concept of dark DNS is introduced, the DNS queries associated with darknet addresses, and the data collected from a large operational network by a dark DNS sensor are characterized, to discuss the implications of sensor evasion via DNS reconnaissance and emphasize the importance of reverse DNS authority when deploying darknet sensors.
Patent

System and method for digital user authentication

TL;DR: In this paper, the preferred embodiment can function to secure the digital signature process by splitting or dividing the user's private key into two or more portions, each of which require independent authorization from the user in order to create the signature.

PolyPack: an automated online packing service for optimal antivirus evasion

TL;DR: It is shown that PolyPack provides 258% more effective evasion of antivirus engines than using an average packer and out-evades the best evaluated packer (Themida) for over 40% of the binary samples.
Patent

System and method for applying digital fingerprints in multi-factor authentication

TL;DR: In this paper, a method for multi-factor authentication with a first client includes receiving a request associated with the first client, initiating an authentication transaction, generating a digital fingerprint based on a set of client properties collected in association with the client, identifying a second client from data associated with authentication transaction and generating a concern metric based on the analysis; notifying an entity that the login request may have originated from an unauthorized source.
Patent

Method for distributed trust authentication

TL;DR: In this paper, the authors proposed a distributed trust authentication method for authenticated users attempting to access one or more service providers operating on a network, which includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first response to the primary authentication, and combining the first and second partial digital signatures to form a composite digital signature, and validating the composite signature.