Sciweavers

ACSAC
2015
IEEE
8 years 8 months ago
Privacy-preserving Virtual Machine
: Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent sn...
Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan
ACSAC
2015
IEEE
8 years 8 months ago
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
Administrators need effective tools to quickly and automatically obtain a succinct, yet informative, overview of the status of their networks to make critical administrative deci...
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard...
ACSAC
2015
IEEE
8 years 8 months ago
Cross-Site Framing Attacks
Nethanel Gelernter, Yoel Grinstein, Amir Herzberg
ACSAC
2015
IEEE
8 years 8 months ago
MOSE: Live Migration Based On-the-Fly Software Emulation
Software emulation has been proven useful in many scenarios, such as software testing, malware analysis, and intrusion response. However, fine-grained software emulation (e.g., at...
Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim
ACSAC
2015
IEEE
8 years 8 months ago
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
Thomas Hupperich, Davide Maiorca, Marc Kührer...
ACSAC
2015
IEEE
8 years 8 months ago
Using Visual Challenges to Verify the Integrity of Security Cameras
We propose a new way to verify the integrity and freshness of footage from security cameras by sending visual challenges to the area being monitored by the camera. We study the ef...
Junia Valente, Alvaro A. Cárdenas
ACSAC
2015
IEEE
8 years 8 months ago
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks
Over the past decade many exploit mitigation techniques have been introduced to defend against memory corruption attacks. WˆX, ASLR, and canary-based protections are nowadays wid...
Theofilos Petsios, Vasileios P. Kemerlis, Michalis...
ACISP
2015
Springer
8 years 8 months ago
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Digital signatures are one of the most extensively used cryptographic primitives today. It is well-understood that they guarantee practical security only if the corresponding veri...
Felix Günther, Bertram Poettering
ACISP
2015
Springer
8 years 8 months ago
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper...
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar ...
ACISP
2015
Springer
8 years 8 months ago
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazu...