Sciweavers

CCS
2015
ACM
8 years 8 months ago
Towards Insider Threat Detection Using Psychophysiological Signals
Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information secur...
Yassir Hashem, Hassan Takabi, Mohammad GhasemiGol,...
CCS
2015
ACM
8 years 8 months ago
Detecting Clusters of Fake Accounts in Online Social Networks
Fake accounts are a preferred means for malicious users of online social networks to send spam, commit fraud, or otherwise abuse the system. A single malicious actor may create do...
Cao Xiao, David Mandell Freeman, Theodore Hwa
CCS
2015
ACM
8 years 8 months ago
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between ho...
Joseph A. Akinyele, Christina Garman, Susan Hohenb...
CCS
2015
ACM
8 years 8 months ago
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
Email as we use it today makes no guarantees about message integrity, authenticity, or confidentiality. Users must explicitly encrypt and sign message contents using tools like P...
Ian D. Foster, Jon Larson, Max Masich, Alex C. Sno...
CCS
2015
ACM
8 years 8 months ago
How to Use Bitcoin to Play Decentralized Poker
Back and Bentov (arXiv 2014) and Andrychowicz et al. (Security and Privacy 2014) introduced techniques to perform secure multiparty computations on Bitcoin. Among other things, th...
Ranjit Kumaresan, Tal Moran, Iddo Bentov
CCS
2015
ACM
8 years 8 months ago
Android Root and its Providers: A Double-Edged Sword
Android root is the voluntary and legitimate process of gaining the highest privilege and full control over a user’s Android device. To facilitate the popular demand, a unique A...
Hang Zhang, Dongdong She, Zhiyun Qian
CCS
2015
ACM
8 years 8 months ago
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authenticat
Group signatures (GSs) is an elegant approach for providing privacy-preserving authentication. Unfortunately, modern GS schemes have limited practical value for use in large netwo...
Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kai...
CCS
2015
ACM
8 years 8 months ago
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App
The Android OS not only dominates 78.6% of the worldwide smartphone market in 2014, but importantly has been widely used for mission critical tasks (e.g., medical devices, auto/ai...
Heqing Huang, Sencun Zhu, Kai Chen 0012, Peng Liu ...
CCS
2015
ACM
8 years 8 months ago
Protecting Locations with Differential Privacy under Temporal Correlations
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and location-based applications. While spatial transformation techniques such as lo...
Yonghui Xiao, Li Xiong
CCS
2015
ACM
8 years 8 months ago
Software Watermarking using Return-Oriented Programming
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). Our design formats watermarking code into well-crafted data arrangements that l...
Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Ch...