Sciweavers

CCS
2015
ACM
8 years 3 months ago
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this genre, our attack does not require the attacker to ins...
Yossef Oren, Vasileios P. Kemerlis, Simha Sethumad...
CCS
2015
ACM
8 years 3 months ago
Characterizing Network-Based Moving Target Defenses
The moving target defense (MTD) strategy allows defenders to limit the effectiveness of attacker reconnaissance and exploitation. Many academic works have created MTDs in differe...
Marc Green, Douglas C. MacFarland, Doran R. Smesta...
CCS
2015
ACM
8 years 3 months ago
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Malware remains an important security threat, as miscreants continue to deliver a variety of malicious programs to hosts around the world. At the heart of all the malware delivery...
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla B...
CCS
2015
ACM
8 years 3 months ago
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking
Modern password guessing attacks adopt sophisticated probabilistic techniques that allow for orders of magnitude less guesses to succeed compared to brute force. Unfortunately, be...
Matteo Dell'Amico, Maurizio Filippone
CCS
2015
ACM
8 years 3 months ago
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users
Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band whe...
Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yancha...
CCS
2015
ACM
8 years 3 months ago
Clean Application Compartmentalization with SOAAP
Application compartmentalization, a vulnerability mitigation technique employed in programs such as OpenSSH and the Chromium web browser, decomposes software into isolated compone...
Khilan Gudka, Robert N. M. Watson, Jonathan Anders...
CCS
2015
ACM
8 years 3 months ago
Fast Garbling of Circuits Under Standard Assumptions
Protocols for secure computation enable mutually distrustful parties to jointly compute on their private inputs without revealing anything but the result. Over recent years, secur...
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pink...
CCS
2015
ACM
8 years 3 months ago
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
To understand the gap between theory and practice for oblivious cloud storage, we experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3. We replay ...
Vincent Bindschaedler, Muhammad Naveed 0001, Xiaor...
CCS
2015
ACM
8 years 3 months ago
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
Despite a series of attacks, mifare Classic is still the world’s most widely deployed contactless smartcard on the market. The Classic uses a proprietary stream cipher crypto1 t...
Carlo Meijer, Roel Verdult
CCS
2015
ACM
8 years 3 months ago
Authenticating Privately over Public Wi-Fi Hotspots
Wi-Fi connectivity using open hotspots hosted on untrusted Access Points (APs) has been a staple of mobile network deployments for many years as mobile providers seek to offload s...
Aldo Cassola, Erik-Oliver Blass, Guevara Noubir