Sciweavers

CCS
2015
ACM
8 years 6 months ago
Privacy-Preserving Deep Learning
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unpreced...
Reza Shokri, Vitaly Shmatikov
CCS
2015
ACM
8 years 6 months ago
Per-Input Control-Flow Integrity
Control-Flow Integrity (CFI) is an effective approach to mitigating control-flow hijacking attacks. Conventional CFI techniques statically extract a control-flow graph (CFG) fro...
Ben Niu, Gang Tan
CCS
2015
ACM
8 years 6 months ago
MalGene: Automatic Extraction of Malware Analysis Evasion Signature
Automated dynamic malware analysis is a common approach for detecting malicious software. However, many malware samples identify the presence of the analysis environment and evade...
Dhilung Kirat, Giovanni Vigna
CCS
2015
ACM
8 years 6 months ago
iRiS: Vetting Private API Abuse in iOS Applications
With the booming sale of iOS devices, the number of iOS applications has increased significantly in recent years. To protect the security of iOS users, Apple requires every iOS a...
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, ...
CCS
2015
ACM
8 years 6 months ago
Automated Symbolic Proofs of Observational Equivalence
Many cryptographic security definitions can be naturally formulated as observational equivalence properties. However, existing automated tools for verifying the observational equ...
David A. Basin, Jannik Dreier, Ralf Sasse
CCS
2015
ACM
8 years 6 months ago
Measuring Botnets in the Wild: Some New Trends
Today, botnets are still responsible for most large scale attacks on the Internet. Botnets are versatile, they remain the most powerful attack platform by constantly and continuou...
Wentao Chang, Aziz Mohaisen, An Wang, Songqing Che...
CCS
2015
ACM
8 years 6 months ago
Lucky 13 Strikes Back
In this work we show how the Lucky 13 attack can be resurrected in the cloud by gaining access to a virtual machine co-located with the target. Our version of the attack exploits ...
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thoma...
CCS
2015
ACM
8 years 6 months ago
UCognito: Private Browsing without Tears
While private browsing is a standard feature, its implementation has been inconsistent among the major browsers. More seriously, it often fails to provide the adequate or even the...
Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, We...
CCS
2015
ACM
8 years 6 months ago
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers
Performing detailed forensic analysis of real-world web security incidents targeting users, such as social engineering and phishing attacks, is a notoriously challenging and time-...
Christopher Neasbitt, Bo Li, Roberto Perdisci, Lon...
CCS
2015
ACM
8 years 6 months ago
On Passive Data Link Layer Fingerprinting of Aircraft Transponders
In order to meet future demands in increasingly congested airspaces, the world’s aviation authorities are currently upgrading their air-traffic management systems. The Automatic...
Martin Strohmeier, Ivan Martinovic