Sciweavers

ACSAC
2015
IEEE
8 years 8 months ago
Using Channel State Information for Tamper Detection in the Internet of Things
The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tamp...
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, ...
ACSAC
2015
IEEE
8 years 8 months ago
ShrinkWrap: VTable Protection without Loose Ends
As VTable hijacking becomes the primary mode of exploitation against modern browsers, protecting said VTables has recently become a prime research interest. While multiple source-...
István Haller, Enes Göktas, Elias Atha...
ACSAC
2015
IEEE
8 years 8 months ago
Entity-Based Access Control: supporting more expressive access control policies
Access control is an important part of security that restricts the actions that users can perform on resources. Policy models specify how these restrictions are formulated in poli...
Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wou...
ACSAC
2015
IEEE
8 years 8 months ago
BareDroid: Large-Scale Analysis of Android Apps on Real Devices
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on emulators, such as the Google’s Bouncer and Andru...
Simone Mutti, Yanick Fratantonio, Antonio Bianchi,...
ACSAC
2015
IEEE
8 years 8 months ago
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks
As information-centric networks are deployed in increasingly diverse settings, there is a growing need to protect the privacy of participants. We describe the design, implementati...
Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, A...
ACSAC
2015
IEEE
8 years 8 months ago
Proactive Security Analysis of Changes in Virtualized Infrastructures
The pervasiveness of cloud computing can be attributed to its scale and elasticity. However, the operational complexity of the underlying cloud infrastructure is high, due to its ...
Sören Bleikertz, Carsten Vogel, Thomas Gro&sz...
ACSAC
2015
IEEE
8 years 8 months ago
PARS: A Uniform and Open-source Password Analysis and Research System
In this paper, we introduce an open-source and modular password analysis and research system, PARS, which provides a uniform, comprehensive and scalable research platform for pass...
Shouling Ji, Shukun Yang, Ting Wang, Changchang Li...
ACSAC
2015
IEEE
8 years 8 months ago
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
Although Machine Learning (ML) based approaches have shown promise for Android malware detection, a set of critical challenges remain unaddressed. Some of those challenges arise i...
Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Hern...
ACSAC
2015
IEEE
8 years 8 months ago
Evaluating the Flexibility of the Java Sandbox
The ubiquitously-installed Java Runtime Environment (JRE) provides a complex, flexible set of mechanisms that support the execution of untrusted code inside a secure sandbox. How...
Zack Coker, Michael Maass, Tianyuan Ding, Claire L...
ACSAC
2015
IEEE
8 years 8 months ago
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at th...
Mohammed H. Almeshekah, Christopher N. Gutierrez, ...