Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Joji Montelibano
August 2015 - Presentation How We Discovered Thousands of Vulnerable Android Apps in 1 Day

Topics: Vulnerability Analysis

Authors: Joji Montelibano, Will Dormann

In this presentation, we will describe our methodology in discovering these vulnerabilities, and recommend mitigation strategies for both developers and users.

April 2012 - Podcast NIST Catalog of Security and Privacy Controls, Including Insider Threat

Authors: Ron Ross (NIST), Joji Montelibano, Julia H. Allen

In this podcast, participants discuss why security controls, including those for insider threat, are necessary to protect information and information systems.

April 2012 - Technical Report Insider Threat Security Reference Architecture

Topics: Insider Threat

Authors: Joji Montelibano, Andrew P. Moore

In this report, the authors describe the Insider Threat Security Reference Architecture (ITSRA), an enterprise-wide solution to the insider threat.

October 2011 - Technical Note Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination

Topics: Insider Threat

Authors: Michael Hanley, Joji Montelibano

In this report, the authors present an insider threat pattern on how organizations can combat insider theft of intellectual property.

February 2011 - Presentation Combat IT Sabotage: Technical Solutions From The CERT Insider Threat Lab

Topics: Insider Threat

Authors: Dawn Cappelli, Joji Montelibano

In this presentation, the authors discuss crime profiles and countermeasures related to insider IT sabotage.

February 2011 - Technical Note An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases

Topics: Insider Threat

Authors: Michael Hanley, Tyler Dean, Will Schroeder, Matt Houy, Randall F. Trzeciak, Joji Montelibano

In this report, the authors provide an overview of techniques used by malicious insiders to steal intellectual property.