Sciweavers

OOPSLA
2015
Springer
8 years 3 months ago
Probability type inference for flexible approximate programming
In approximate computing, programs gain efficiency by allowing occasional errors. Controlling the probabilistic effects of this approximation remains a key challenge. We propose ...
Brett Boston, Adrian Sampson, Dan Grossman, Luis C...
OOPSLA
2015
Springer
8 years 3 months ago
Scrap your boilerplate with object algebras
ng complex Abstract Syntax Trees (ASTs) typically requires large amounts of tedious boilerplate code. For many operations most of the code simply walks the structure, and only a s...
Haoyuan Zhang, Zewei Chu, Bruno C. d. S. Oliveira,...
ACSAC
2015
IEEE
8 years 3 months ago
A Principled Approach for ROP Defense
Return-Oriented Programming (ROP) is an effective attack technique that can escape modern defenses such as DEP. ROP is based on repeated abuse of existing code snippets ending wi...
Rui Qiao, Mingwei Zhang, R. Sekar
ACSAC
2015
IEEE
8 years 3 months ago
Provenance-based Integrity Protection for Windows
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
Wai-Kit Sze, R. Sekar
ACSAC
2015
IEEE
8 years 3 months ago
Logical Partitions on Many-Core Platforms
Cloud platforms that use logical partitions to allocate dedicated resources to VMs can benefit from small and therefore secure hypervisors. Many-core platforms, with their abunda...
Ramya Jayaram Masti, Claudio Marforio, Kari Kostia...
ACSAC
2015
IEEE
8 years 3 months ago
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
Adam J. Aviv, Devon Budzitowski, Ravi Kuber
ACSAC
2015
IEEE
8 years 3 months ago
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwa...
ACSAC
2015
IEEE
8 years 3 months ago
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may alway...
Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang
ACSAC
2015
IEEE
8 years 3 months ago
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Z...
ACSAC
2015
IEEE
8 years 3 months ago
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications
Android introduced the dynamic code loading (DCL) mechanism to allow for code reuse, to achieve extensibility, to enable updating functionalities, or to boost application startup ...
Luca Falsina, Yanick Fratantonio, Stefano Zanero, ...