Sciweavers

CCS
2015
ACM
8 years 4 months ago
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Authenticated encryption schemes guarantee both privacy and integrity, and have become the default level of encryption in modern protocols. One of the most popular authenticated e...
Shay Gueron, Yehuda Lindell
CCS
2015
ACM
8 years 4 months ago
Software Protection with Code Mobility
The analysis of binary code is a common step of Man-At-The-End attacks to identify code sections crucial to implement attacks, such as identifying private key hidden in the code, ...
Alessandro Cabutto, Paolo Falcarin, Bert Abrath, B...
CCS
2015
ACM
8 years 4 months ago
SEDA: Scalable Embedded Device Attestation
Today, large numbers of smart interconnected devices provide safety and security critical services for energy grids, industrial control systems, gas and oil search robots, home/of...
N. Asokan, Franz Ferdinand Brasser, Ahmad Ibrahim,...
CCS
2015
ACM
8 years 4 months ago
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS
On modern operating systems, applications under the same user are separated from each other, for the purpose of protecting them against malware and compromised programs. Given the...
Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang...
CCS
2015
ACM
8 years 4 months ago
TrustLogin: Securing Password-Login on Commodity Operating Systems
With the increasing prevalence of Web 2.0 and cloud computing, password-based logins play an increasingly important role on user-end systems. We use passwords to authenticate ours...
Fengwei Zhang, Kevin Leach, Haining Wang, Angelos ...
CCS
2015
ACM
8 years 4 months ago
Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar...
CCS
2015
ACM
8 years 4 months ago
The Limits of Composable Crypto with Transferable Setup Devices
UC security realized with setup devices imposes that single instances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devi...
Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay
CCS
2015
ACM
8 years 4 months ago
An Empirical Study of Web Vulnerability Discovery Ecosystems
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect ...
Mingyi Zhao, Jens Grossklags, Peng Liu
CCS
2015
ACM
8 years 4 months ago
Practical Context-Sensitive CFI
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive to the context of preceding edges. Recent work demonstrates that this leaves suf...
Victor van der Veen, Dennis Andriesse, Enes Gö...
CCS
2015
ACM
8 years 4 months ago
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy
Firewall configuration is a critical activity for the Supervisory Control and Data Acquisition (SCADA) networks that control power stations, water distribution, factory automatio...
Dinesha Ranathunga, Matthew Roughan, Phil Kernick,...