Sciweavers

CCS
2015
ACM
8 years 7 months ago
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext
In this paper we present an identity-set-based broadcast encryption scheme with three working modes: set membership (Include-mode), all member (All-mode), and negative membership ...
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
CCS
2015
ACM
8 years 7 months ago
Insecurity of Voice Solution VoLTE in LTE Mobile Networks
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit...
Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan,...
CCS
2015
ACM
8 years 7 months ago
Authorization Federation in IaaS Multi Cloud
As more and more organizations move to cloud, it is inevitable that cross-organizational collaboration will need to be supported in the cloud. In this paper, we explore models for...
Navid Pustchi, Ram Krishnan, Ravi S. Sandhu
CCS
2015
ACM
8 years 7 months ago
GRECS: Graph Encryption for Approximate Shortest Distance Queries
We propose graph encryption schemes that efficiently support approximate shortest distance queries on large-scale encrypted graphs. Shortest distance queries are one of the most f...
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Ko...
CCS
2015
ACM
8 years 7 months ago
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günthe...
CCS
2015
ACM
8 years 7 months ago
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
We examine the problem of aggregating the results of multiple anti-virus (AV) vendors’ detectors into a single authoritative ground-truth label for every binary. To do so, we ad...
Alex Kantchelian, Michael Carl Tschantz, Sadia Afr...
CCS
2015
ACM
8 years 7 months ago
Demystifying Incentives in the Consensus Computer
Cryptocurrencies like Bitcoin and the more recent Ethereum system allow users to specify scripts in transactions and contracts to support applications beyond simple cash transacti...
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek S...
CCS
2015
ACM
8 years 7 months ago
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices
More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people’s devices. Although t...
Yihang Song, Urs Hengartner
CCS
2015
ACM
8 years 7 months ago
Timely Rerandomization for Mitigating Memory Disclosures
Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of memor...
David Bigelow, Thomas Hobson, Robert Rudd, William...
CCS
2015
ACM
8 years 7 months ago
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, intrusion detection s...
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, X...