In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness of existing solutions is the ...
In the recent years, new services and businesses leveraging location-based services (LBS) are rapidly emerging. On the other hand this has raised the incentive of users to cheat a...
Markus Miettinen, N. Asokan, Farinaz Koushanfar, T...
How do anomalies, fraud, and spam effect our models of normal user behavior? How can we modify our models to catch fraudsters? In this tutorial we will answer these questions con...
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. While useful, rooting weakens the security of Android...
Bugs in the authorisation logic of web applications can expose the data of one user to another. Such data disclosure vulnerabilities are common—they can be caused by a single om...
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe...
The cached Internet content served by content delivery networks (CDN) comprises a large fraction of today’s Internet traffic, yet, there is little study on how real-world censor...
Until very recently it was widely believed that iOS malware is effectively blocked by Apple’s vetting process and application sandboxing. However, the newly presented severe ma...
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahm...
System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult t...
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstan...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions of confidentiality and integrity. Although various AE schemes are known, there ...
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff