Sciweavers

CCS
2015
ACM
8 years 8 months ago
Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar...
CCS
2015
ACM
8 years 8 months ago
The Limits of Composable Crypto with Transferable Setup Devices
UC security realized with setup devices imposes that single instances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devi...
Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay
CCS
2015
ACM
8 years 8 months ago
An Empirical Study of Web Vulnerability Discovery Ecosystems
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect ...
Mingyi Zhao, Jens Grossklags, Peng Liu
CCS
2015
ACM
8 years 8 months ago
Practical Context-Sensitive CFI
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive to the context of preceding edges. Recent work demonstrates that this leaves suf...
Victor van der Veen, Dennis Andriesse, Enes Gö...
CCS
2015
ACM
8 years 8 months ago
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy
Firewall configuration is a critical activity for the Supervisory Control and Data Acquisition (SCADA) networks that control power stations, water distribution, factory automatio...
Dinesha Ranathunga, Matthew Roughan, Phil Kernick,...
CCS
2015
ACM
8 years 8 months ago
Subversion-Resilient Signature Schemes
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is i...
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
SAFECOMP
2015
Springer
8 years 8 months ago
Informing Assurance Case Review Through a Formal Interpretation of GSN Core Logic
Abstract. A formalization of a logical subset of Goal Structuring Notation (GSN) arguments is presented. The aim is to reveal the conditions which must be true in order to guarante...
Victor Bandur, John McDermid
SAFECOMP
2015
Springer
8 years 8 months ago
Is Current Incremental Safety Assurance Sound?
Abstract. Incremental design is an essential part of engineering. Without it, engineering would not likely be an economic, nor an effective, aid to economic progress. Further, eng...
Valentin Cassano, Silviya Grigorova, Neeraj Kumar ...
SAFECOMP
2015
Springer
8 years 8 months ago
Sequential and Parallel Attack Tree Modelling
The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many s...
Florian Arnold, Dennis Guck, Rajesh Kumar, Mari&eu...