Sciweavers

ACSAC
2015
IEEE
10 years 10 days ago
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks
As information-centric networks are deployed in increasingly diverse settings, there is a growing need to protect the privacy of participants. We describe the design, implementati...
Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, A...
ACSAC
2015
IEEE
10 years 10 days ago
Proactive Security Analysis of Changes in Virtualized Infrastructures
The pervasiveness of cloud computing can be attributed to its scale and elasticity. However, the operational complexity of the underlying cloud infrastructure is high, due to its ...
Sören Bleikertz, Carsten Vogel, Thomas Gro&sz...
ACSAC
2015
IEEE
10 years 10 days ago
PARS: A Uniform and Open-source Password Analysis and Research System
In this paper, we introduce an open-source and modular password analysis and research system, PARS, which provides a uniform, comprehensive and scalable research platform for pass...
Shouling Ji, Shukun Yang, Ting Wang, Changchang Li...
ACSAC
2015
IEEE
10 years 10 days ago
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
Although Machine Learning (ML) based approaches have shown promise for Android malware detection, a set of critical challenges remain unaddressed. Some of those challenges arise i...
Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Hern...
ACSAC
2015
IEEE
10 years 10 days ago
Evaluating the Flexibility of the Java Sandbox
The ubiquitously-installed Java Runtime Environment (JRE) provides a complex, flexible set of mechanisms that support the execution of untrusted code inside a secure sandbox. How...
Zack Coker, Michael Maass, Tianyuan Ding, Claire L...
ACSAC
2015
IEEE
10 years 10 days ago
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at th...
Mohammed H. Almeshekah, Christopher N. Gutierrez, ...
ACSAC
2015
IEEE
10 years 10 days ago
Privacy-preserving Virtual Machine
: Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent sn...
Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan
ACSAC
2015
IEEE
10 years 10 days ago
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
Administrators need effective tools to quickly and automatically obtain a succinct, yet informative, overview of the status of their networks to make critical administrative deci...
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard...
ACSAC
2015
IEEE
10 years 10 days ago
Cross-Site Framing Attacks
Nethanel Gelernter, Yoel Grinstein, Amir Herzberg
ACSAC
2015
IEEE
10 years 10 days ago
MOSE: Live Migration Based On-the-Fly Software Emulation
Software emulation has been proven useful in many scenarios, such as software testing, malware analysis, and intrusion response. However, fine-grained software emulation (e.g., at...
Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim