Sciweavers

CCS
2015
ACM
8 years 7 months ago
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms
A storage side channel occurs when an adversary accesses data objects influenced by another, victim computation and infers information about the victim that it is not permitted t...
Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
CCS
2015
ACM
8 years 7 months ago
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM shows th...
Xiao Wang, T.-H. Hubert Chan, Elaine Shi
CCS
2015
ACM
8 years 7 months ago
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
We introduce Falcon codes, a class of authenticated error correcting codes that are based on LT codes and achieve the following properties, for the first time simultaneously: (1)...
Ari Juels, James Kelley, Roberto Tamassia, Nikos T...
CCS
2015
ACM
8 years 7 months ago
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication
The Tor network has established itself as de-facto standard for anonymous communication on the Internet, providing an increased level of privacy to over a million users worldwide....
Daniel Arp, Fabian Yamaguchi, Konrad Rieck
CCS
2015
ACM
8 years 7 months ago
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Despite the security community’s best effort, the number of serious vulnerabilities discovered in software is increasing rapidly. In theory, security audits should find and re...
Henning Perl, Sergej Dechand, Matthew Smith 0001, ...
CCS
2015
ACM
8 years 7 months ago
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges
Bitcoin exchanges function like banks, securely holding their customers’ bitcoins on their behalf. Several exchanges have suffered catastrophic losses with customers permanently...
Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau...
CCS
2015
ACM
8 years 7 months ago
CCFI: Cryptographically Enforced Control Flow Integrity
Ali José Mashtizadeh, Andrea Bittau, Dan Bo...
CCS
2015
ACM
8 years 7 months ago
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins
We show that equivocation, i.e., making conflicting statements to others in a distributed protocol, can be monetarily disincentivized by the use of crypto-currencies such as Bitc...
Tim Ruffing, Aniket Kate, Dominique Schröder