Sciweavers

ACSAC
2015
IEEE
10 years 10 days ago
Logical Partitions on Many-Core Platforms
Cloud platforms that use logical partitions to allocate dedicated resources to VMs can benefit from small and therefore secure hypervisors. Many-core platforms, with their abunda...
Ramya Jayaram Masti, Claudio Marforio, Kari Kostia...
ACSAC
2015
IEEE
10 years 10 days ago
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
Adam J. Aviv, Devon Budzitowski, Ravi Kuber
ACSAC
2015
IEEE
10 years 10 days ago
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwa...
ACSAC
2015
IEEE
10 years 10 days ago
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may alway...
Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang
ACSAC
2015
IEEE
10 years 10 days ago
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Z...
ACSAC
2015
IEEE
10 years 10 days ago
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications
Android introduced the dynamic code loading (DCL) mechanism to allow for code reuse, to achieve extensibility, to enable updating functionalities, or to boost application startup ...
Luca Falsina, Yanick Fratantonio, Stefano Zanero, ...
ACSAC
2015
IEEE
10 years 10 days ago
Using Channel State Information for Tamper Detection in the Internet of Things
The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tamp...
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, ...
ACSAC
2015
IEEE
10 years 10 days ago
ShrinkWrap: VTable Protection without Loose Ends
As VTable hijacking becomes the primary mode of exploitation against modern browsers, protecting said VTables has recently become a prime research interest. While multiple source-...
István Haller, Enes Göktas, Elias Atha...
ACSAC
2015
IEEE
10 years 10 days ago
Entity-Based Access Control: supporting more expressive access control policies
Access control is an important part of security that restricts the actions that users can perform on resources. Policy models specify how these restrictions are formulated in poli...
Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wou...
ACSAC
2015
IEEE
10 years 10 days ago
BareDroid: Large-Scale Analysis of Android Apps on Real Devices
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on emulators, such as the Google’s Bouncer and Andru...
Simone Mutti, Yanick Fratantonio, Antonio Bianchi,...