Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Lori Flynn
March 2015 - Technical Report Making DidFail Succeed: Enhancing the CERT Static Taint Analyzer for Android App Sets

Topics: Secure Coding

Authors: Jonathan Burket, Lori Flynn, Will Klieber, Jonathan Lim, Wei Shen, William Snavely

In this report, the authors describe how the DidFail tool was enhanced to improve its effectiveness.

May 2014 - Conference Paper Android Taint Flow Analysis for App Sets

Topics: Secure Coding

Authors: Will Klieber, Lori Flynn, Amar S. Bhosalee (Carnegie Mellon Heinz School), Limin Jia (Carnegie Mellon University, Department of Electrical and Computer Engineering), Lujo Bauer (Carnegie Mellon University, Department of Electrical and Computer Engineering)

This paper describes a new static taint flow analysis that precisely tracks both inter-component and intra-component data flow in a set of Android applications.

April 2014 - Technical Report International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Palma Buttles-Valdez, Michael C. Theis, George Silowash, Tracy Cassidy, Travis Wright (Carnegie Mellon University, Master of Science in Information Security Policy and Management Program), Randall F. Trzeciak

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”

January 2014 - Technical Note Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase II, Expanded Analysis and Recommendations

Topics: Insider Threat

Authors: Lori Flynn, Greg Porter (Heinz College at Carnegie Mellon University), Chas DiFatta (No Affiliation)

In this report, the authors discuss the countermeasures that cloud service providers use and how they understand the risks posed by insiders.

October 2013 - Conference Paper Four Insider IT Sabotage Mitigation Patterns and an Initial Effectiveness Analysis

Topics: Insider Threat

Authors: Lori Flynn, Jason W. Clark, Andrew P. Moore, Matthew L. Collins, Eleni Tsamitis, Dave Mundie, David McIntire

In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.

August 2013 - Technical Note Best Practices Against Insider Threats in All Nations

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Randall F. Trzeciak, Palma Buttles-Valdez

In this report, the authors summarize best practices for mitigating insider threats in international contexts.

February 2013 - Podcast Mitigating Insider Threat - New and Improved Practices Fourth Edition

Topics: Insider Threat

Authors: George Silowash, Lori Flynn, Julia H. Allen

In this podcast, participants explain how 371 cases of insider attacks led to 4 new and 15 updated best practices for mitigating insider threats.

December 2012 - White Paper Chronological Examination of Insider Threat Sabotage: Preliminary Observations

Topics: Insider Threat

Authors: William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.

December 2012 - Technical Report Common Sense Guide to Mitigating Insider Threats, 4th Edition

Topics: Insider Threat

Authors: George Silowash, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall, Lori Flynn

In this report, the authors define insider threats and outline current insider threat patterns and trends.

October 2012 - Conference Paper Best Practices Against Insider Threats in All Nations

Topics: Insider Threat

Authors: Lori Flynn, Carly L. Huth, Randall F. Trzeciak, Palma Buttles-Valdez

In this paper, the authors summarize best practices for mitigating insider threats in international contexts.