Sciweavers

CCS
2015
ACM
8 years 7 months ago
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
The capabilities of modern devices, coupled with the almost ubiquitous availability of Internet connectivity, have resulted in photos being shared online at an unprecedented scale...
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopo...
CCS
2015
ACM
8 years 7 months ago
Drops for Stuff: An Analysis of Reshipping Mule Scams
Credit card fraud has seen rampant increase in the past years, as customers use credit cards and similar financial instruments frequently. Both online and brick-and-mortar outfi...
Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gian...
CCS
2015
ACM
8 years 7 months ago
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations
In this paper, we report the first large-scale, systematic study on the security qualities of emerging push-messaging services, focusing on their app-side service integrations. W...
Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen 0...
CCS
2015
ACM
8 years 7 months ago
HORNET: High-speed Onion Routing at the Network Layer
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next-generation network architectures. HORNET is designed as a low-latency onion ro...
Chen Chen, Daniele Enrico Asoni, David Barrera, Ge...
CCS
2015
ACM
8 years 7 months ago
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
This paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a databas...
Oswaldo Olivo, Isil Dillig, Calvin Lin
CCS
2015
ACM
8 years 7 months ago
Defeating IMSI Catchers
IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a m...
Fabian van den Broek, Roel Verdult, Joeri de Ruite...
CCS
2015
ACM
8 years 7 months ago
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physi...
Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar ...
CCS
2015
ACM
8 years 7 months ago
Secure Deduplication of Encrypted Data without Additional Independent Servers
Encrypting data on client-side before uploading it to a cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard pra...
Jian Liu, N. Asokan, Benny Pinkas
CCS
2015
ACM
8 years 7 months ago
Exploiting Temporal Dynamics in Sybil Defenses
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromis...
Changchang Liu, Peng Gao, Matthew K. Wright, Prate...
CCS
2015
ACM
8 years 7 months ago
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
—An implicit goal of Bitcoin’s reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin’s securi...
Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elai...