Sciweavers

CCS
2015
ACM
8 years 7 months ago
Discover and Tame Long-running Idling Processes in Enterprise Systems
Reducing attack surface is an effective preventive measure to strengthen security in large systems. However, it is challenging to apply this idea in an enterprise environment whe...
Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Jung...
CCS
2015
ACM
8 years 7 months ago
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
To reduce costs, organizations may outsource data storage and data processing to third-party clouds. This raises confidentiality concerns, since the outsourced data may have sens...
Omar Chowdhury, Deepak Garg 0001, Limin Jia, Anupa...
CCS
2015
ACM
8 years 7 months ago
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
The ubiquity of modern smartphones means that nearly everyone has easy access to a camera at all times. In the event of a crime, the photographic evidence that these cameras leave...
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu,...
CCS
2015
ACM
8 years 7 months ago
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as Fac...
Daniel Fett, Ralf Küsters, Guido Schmitz
CCS
2015
ACM
8 years 7 months ago
Location-restricted Services Access Control Leveraging Pinpoint Waveforming
We propose a novel wireless technique named pinpoint waveforming to achieve the location-restricted service access control, i.e., providing wireless services to users at eligible ...
Tao Wang, Yao Liu, Qingqi Pei, Tao Hou
CCS
2015
ACM
8 years 7 months ago
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this genre, our attack does not require the attacker to ins...
Yossef Oren, Vasileios P. Kemerlis, Simha Sethumad...
CCS
2015
ACM
8 years 7 months ago
Characterizing Network-Based Moving Target Defenses
The moving target defense (MTD) strategy allows defenders to limit the effectiveness of attacker reconnaissance and exploitation. Many academic works have created MTDs in differe...
Marc Green, Douglas C. MacFarland, Doran R. Smesta...
CCS
2015
ACM
8 years 7 months ago
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Malware remains an important security threat, as miscreants continue to deliver a variety of malicious programs to hosts around the world. At the heart of all the malware delivery...
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla B...
CCS
2015
ACM
8 years 7 months ago
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking
Modern password guessing attacks adopt sophisticated probabilistic techniques that allow for orders of magnitude less guesses to succeed compared to brute force. Unfortunately, be...
Matteo Dell'Amico, Maurizio Filippone
CCS
2015
ACM
8 years 7 months ago
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users
Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band whe...
Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yancha...