Sciweavers

SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 11 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 11 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 11 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
13 years 11 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
13 years 11 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
SP
2010
IEEE
149views Security Privacy» more  SP 2010»
13 years 11 months ago
On the Incoherencies in Web Browser Access Control Policies
—Web browsers’ access control policies have evolved
Kapil Singh, Alexander Moshchuk, Helen J. Wang, We...
SOUPS
2010
ACM
13 years 11 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
SOUPS
2010
ACM
13 years 11 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
SOUPS
2010
ACM
13 years 11 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
SOUPS
2010
ACM
13 years 11 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley