Sciweavers

WISA
2010
Springer
13 years 9 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
WISA
2010
Springer
13 years 9 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
TRUSTBUS
2010
Springer
13 years 9 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 9 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 9 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
13 years 9 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 9 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 9 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
SOUPS
2010
ACM
13 years 9 months ago
Influence of user perception, security needs, and social factors on device pairing method choices
Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard
Iulia Ion, Marc Langheinrich, Ponnurangam Kumaragu...
SOCIALCOM
2010
13 years 9 months ago
From Communication to Collaboration: Simulating the Emergence of Inter-organizational Collaboration Network
Inter-organizational networks often have multiple dimensions, each one denoting a type of relationship. In this research, we studied how one dimension of the network, a collaborati...
Kang Zhao, John Yen, Louis-Marie Ngamassi Tchouake...