—It is becoming a global trend for company employees equipped with mobile devices to access company’s assets. Besides enterprise apps, lots of personal apps from various untrus...
Abstract—Many mechanisms have been proposed and deployed to prevent exploits against software vulnerabilities. Among them, W⊕X is one of the most effective and efficient. W⊕...
Abstract—While solutions for file system encryption can prevent an adversary from determining the contents of files, in situations where a user wishes to hide the existence of ...
Timothy Peters, Mark Gondree, Zachary N. J. Peters...
—We have conducted the first in-depth empirical study of two important new web security features: strict transport security (HSTS) and public-key pinning. Both have been added t...
Abstract—We use cryptographic techniques to study zone enumeration in DNSSEC. DNSSEC is designed to prevent attackers from tampering with domain name system (DNS) messages. The c...
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos...
—Typosquatting is the act of purposefully registering a domain name that is a mistype of a popular domain name. It is a concept that has been known and studied for over 15 years,...
Pieter Agten, Wouter Joosen, Frank Piessens, Nick ...
—In cyber attack analysis, it is often highly desirable to understand the meaning of an unknown file or network message in the absence of their consumer (i.e. the program that p...
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim...
—Many system components and network applications are written in languages that are prone to memory corruption vulnerabilities. There have been countless cases where simple mistak...
Abstract—ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive resources safe. However, to properly control acc...
Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong K...
—We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences...
Simon Eberz, Kasper Bonne Rasmussen, Vincent Lende...