Sciweavers

CCS
2015
ACM
8 years 3 months ago
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Adversaries exploit memory corruption vulnerabilities to hijack a program’s control flow and gain arbitrary code execution. One promising mitigation, control-flow integrity (C...
Mauro Conti, Stephen Crane, Lucas Davi, Michael Fr...
CCS
2015
ACM
8 years 3 months ago
Inference Attacks on Property-Preserving Encrypted Databases
Many encrypted database (EDB) systems have been proposed in the last few years as cloud computing has grown in popularity and data breaches have increased. The stateof-the-art EDB...
Muhammad Naveed, Seny Kamara, Charles V. Wright
CCS
2015
ACM
8 years 3 months ago
Security Metrics for the Android Ecosystem
The security of Android depends on the timely delivery of updates to fix critical vulnerabilities. In this paper we map the complex network of players in the Android ecosystem wh...
Daniel R. Thomas, Alastair R. Beresford, Andrew C....
CCS
2015
ACM
8 years 3 months ago
Frequency-Hiding Order-Preserving Encryption
Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. This makes its performance and functionality very suitable ...
Florian Kerschbaum
CCS
2015
ACM
8 years 3 months ago
The Clock is Still Ticking: Timing Attacks in the Modern Web
Web-based timing attacks have been known for over a decade, and it has been shown that, under optimal network conditions, an adversary can use such an attack to obtain information...
Tom van Goethem, Wouter Joosen, Nick Nikiforakis
CCS
2015
ACM
8 years 3 months ago
Transparent Data Deduplication in the Cloud
Cloud storage providers such as Dropbox and Google drive heavily rely on data deduplication to save storage costs by only storing one copy of each uploaded file. Although recent ...
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O...
CCS
2015
ACM
8 years 3 months ago
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers
The increase of Distributed Denial-of-Service (DDoS) attacks in volume, frequency, and complexity, combined with the constant required alertness for mitigating web application thr...
Thomas Vissers, Tom van Goethem, Wouter Joosen, Ni...
CCS
2015
ACM
8 years 3 months ago
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Exploitation of memory-corruption vulnerabilities in widelyused software has been a threat for over two decades and no end seems to be in sight. Since performance and backwards co...
Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
CCS
2015
ACM
8 years 3 months ago
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation leaks physical information about their internal secrets. Because of their efficie...
Olivier Pereira, François-Xavier Standaert,...