Sciweavers

CCS
2010
ACM
13 years 7 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
CCS
2010
ACM
13 years 7 months ago
Spectrum based fraud detection in social networks
Xiaowei Ying, Xintao Wu, Daniel Barbará
CCS
2010
ACM
13 years 7 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
CCS
2010
ACM
13 years 7 months ago
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
Secure "pairing" of wireless devices based on auxiliary or out-ofband (OOB)
Tzipora Halevi, Nitesh Saxena
CCS
2010
ACM
13 years 7 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
CCS
2010
ACM
13 years 7 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
CCS
2010
ACM
13 years 7 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
ESORICS
2008
Springer
13 years 8 months ago
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques
The evaluation of privacy-preserving techniques for LBS is often based on simulations of mostly random user movements that only partially capture real deployment scenarios. We clai...
Sergio Mascetti, Dario Freni, Claudio Bettini, Xia...
CRITIS
2009
13 years 8 months ago
Web Browser Security Update Effectiveness
Thomas Dübendorfer, Stefan Frei