Sciweavers

CCS
2015
ACM
8 years 3 months ago
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the system are only expected to increase. To sustain its correct operation in spite...
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame...
CCS
2015
ACM
8 years 3 months ago
GUITAR: Piecing Together Android App GUIs from Memory Images
An Android app’s graphical user interface (GUI) displays rich semantic and contextual information about the smartphone’s owner and app’s execution. Such information provides...
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu,...
CCS
2015
ACM
8 years 3 months ago
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls
New regulations mandating firms to share information on security breaches and security practices with authorities are high on the policy agenda around the globe. These initiative...
Stefan Laube, Rainer Böhme
CCS
2015
ACM
8 years 3 months ago
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks
Off-path packet injection attacks are still serious threats to the Internet and network security. In recent years, a number of studies have discovered new variations of packet inj...
Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru...
CCS
2015
ACM
8 years 3 months ago
Entangled Encodings and Data Entanglement
Giuseppe Ateniese, Özgür Dagdelen, Ivan ...
CCS
2015
ACM
8 years 3 months ago
Towards Insider Threat Detection Using Psychophysiological Signals
Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information secur...
Yassir Hashem, Hassan Takabi, Mohammad GhasemiGol,...
CCS
2015
ACM
8 years 3 months ago
Detecting Clusters of Fake Accounts in Online Social Networks
Fake accounts are a preferred means for malicious users of online social networks to send spam, commit fraud, or otherwise abuse the system. A single malicious actor may create do...
Cao Xiao, David Mandell Freeman, Theodore Hwa
CCS
2015
ACM
8 years 3 months ago
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between ho...
Joseph A. Akinyele, Christina Garman, Susan Hohenb...
CCS
2015
ACM
8 years 3 months ago
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like P...
Ian D. Foster, Jon Larson, Max Masich, Alex C. Sno...
CCS
2015
ACM
8 years 3 months ago
How to Use Bitcoin to Play Decentralized Poker
Back and Bentov (arXiv 2014) and Andrychowicz et al. (Security and Privacy 2014) introduced techniques to perform secure multiparty computations on Bitcoin. Among other things, th...
Ranjit Kumaresan, Tal Moran, Iddo Bentov