Sciweavers

CCS
2015
ACM
8 years 3 months ago
Android Root and its Providers: A Double-Edged Sword
Android root is the voluntary and legitimate process of gaining the highest privilege and full control over a user’s Android device. To facilitate the popular demand, a unique A...
Hang Zhang, Dongdong She, Zhiyun Qian
CCS
2015
ACM
8 years 3 months ago
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authenticat
Group signatures (GSs) is an elegant approach for providing privacy-preserving authentication. Unfortunately, modern GS schemes have limited practical value for use in large netwo...
Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kai...
CCS
2015
ACM
8 years 3 months ago
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App
The Android OS not only dominates 78.6% of the worldwide smartphone market in 2014, but importantly has been widely used for mission critical tasks (e.g., medical devices, auto/ai...
Heqing Huang, Sencun Zhu, Kai Chen 0012, Peng Liu ...
CCS
2015
ACM
8 years 3 months ago
Protecting Locations with Differential Privacy under Temporal Correlations
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and location-based applications. While spatial transformation techniques such as lo...
Yonghui Xiao, Li Xiong
CCS
2015
ACM
8 years 3 months ago
Software Watermarking using Return-Oriented Programming
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that l...
Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Ch...
CCS
2015
ACM
8 years 3 months ago
Discover and Tame Long-running Idling Processes in Enterprise Systems
Reducing attack surface is an effective preventive measure to strengthen security in large systems. However, it is challenging to apply this idea in an enterprise environment whe...
Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Jung...
CCS
2015
ACM
8 years 3 months ago
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
To reduce costs, organizations may outsource data storage and data processing to third-party clouds. This raises confidentiality concerns, since the outsourced data may have sens...
Omar Chowdhury, Deepak Garg 0001, Limin Jia, Anupa...
CCS
2015
ACM
8 years 3 months ago
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
The ubiquity of modern smartphones means that nearly everyone has easy access to a camera at all times. In the event of a crime, the photographic evidence that these cameras leave...
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu,...
CCS
2015
ACM
8 years 3 months ago
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as Fac...
Daniel Fett, Ralf Küsters, Guido Schmitz
CCS
2015
ACM
8 years 3 months ago
Location-restricted Services Access Control Leveraging Pinpoint Waveforming
We propose a novel wireless technique named pinpoint waveforming to achieve the location-restricted service access control, i.e., providing wireless services to users at eligible ...
Tao Wang, Yao Liu, Qingqi Pei, Tao Hou