Sciweavers

CCS
2015
ACM
8 years 1 months ago
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
We examine the problem of aggregating the results of multiple anti-virus (AV) vendors’ detectors into a single authoritative ground-truth label for every binary. To do so, we ad...
Alex Kantchelian, Michael Carl Tschantz, Sadia Afr...
CCS
2015
ACM
8 years 1 months ago
Demystifying Incentives in the Consensus Computer
Cryptocurrencies like Bitcoin and the more recent Ethereum system allow users to specify scripts in transactions and contracts to support applications beyond simple cash transacti...
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek S...
CCS
2015
ACM
8 years 1 months ago
PrivacyGuard: A VPN-based Platform to Detect Information Leakage on Android Devices
More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people’s devices. Although t...
Yihang Song, Urs Hengartner
CCS
2015
ACM
8 years 1 months ago
Timely Rerandomization for Mitigating Memory Disclosures
Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of memor...
David Bigelow, Thomas Hobson, Robert Rudd, William...
CCS
2015
ACM
8 years 1 months ago
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, intrusion detection s...
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, X...
CCS
2015
ACM
8 years 1 months ago
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms
A storage side channel occurs when an adversary accesses data objects influenced by another, victim computation and infers information about the victim that it is not permitted t...
Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
CCS
2015
ACM
8 years 1 months ago
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes both theoretical and practical contributions. From a theoretical perspective, Circuit ORAM shows th...
Xiao Wang, T.-H. Hubert Chan, Elaine Shi
CCS
2015
ACM
8 years 1 months ago
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
We introduce Falcon codes, a class of authenticated error correcting codes that are based on LT codes and achieve the following properties, for the first time simultaneously: (1)...
Ari Juels, James Kelley, Roberto Tamassia, Nikos T...
CCS
2015
ACM
8 years 1 months ago
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication
The Tor network has established itself as de-facto standard for anonymous communication on the Internet, providing an increased level of privacy to over a million users worldwide....
Daniel Arp, Fabian Yamaguchi, Konrad Rieck