Sciweavers

CCS
2015
ACM
8 years 7 months ago
Clean Application Compartmentalization with SOAAP
Application compartmentalization, a vulnerability mitigation technique employed in programs such as OpenSSH and the Chromium web browser, decomposes software into isolated compone...
Khilan Gudka, Robert N. M. Watson, Jonathan Anders...
CCS
2015
ACM
8 years 7 months ago
Fast Garbling of Circuits Under Standard Assumptions
Protocols for secure computation enable mutually distrustful parties to jointly compute on their private inputs without revealing anything but the result. Over recent years, secur...
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pink...
CCS
2015
ACM
8 years 7 months ago
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
To understand the gap between theory and practice for oblivious cloud storage, we experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3. We replay ...
Vincent Bindschaedler, Muhammad Naveed 0001, Xiaor...
CCS
2015
ACM
8 years 7 months ago
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
Despite a series of attacks, mifare Classic is still the world’s most widely deployed contactless smartcard on the market. The Classic uses a proprietary stream cipher crypto1 t...
Carlo Meijer, Roel Verdult
CCS
2015
ACM
8 years 7 months ago
Authenticating Privately over Public Wi-Fi Hotspots
Wi-Fi connectivity using open hotspots hosted on untrusted Access Points (APs) has been a staple of mobile network deployments for many years as mobile providers seek to offload s...
Aldo Cassola, Erik-Oliver Blass, Guevara Noubir
CCS
2015
ACM
8 years 7 months ago
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate ...
Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
CCS
2015
ACM
8 years 7 months ago
AppPolicyModules: Mandatory Access Control for Third-Party Apps
Android has recently introduced the support for Mandatory Access Control, which extends previous security services relying on the Android Permission Framework and on the kernel-le...
Enrico Bacis, Simone Mutti, Stefano Paraboschi
CCS
2015
ACM
8 years 7 months ago
On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data
Privacy protection of time-series data, such as traces of household electricity usage reported by smart meters, is of much practical importance. Solutions are available to improve...
Chris Y. T. Ma, David K. Y. Yau
CCS
2015
ACM
8 years 7 months ago
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
Two-factor authentication has been widely used due to the vulnerabilities associated with traditional text-based password. One-time password (OTP) plays an indispensable role on a...
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing
CCS
2015
ACM
8 years 7 months ago
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android
In its latest comparison of Android Virus Detectors (AVDs), the independent lab AV-TEST reports that they have around 95% malware detection rate. This only indicates that current ...
Heqing Huang, Kai Chen 0012, Chuangang Ren, Peng L...