Sciweavers

CCS
2015
ACM
8 years 1 months ago
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Despite the security community’s best effort, the number of serious vulnerabilities discovered in software is increasing rapidly. In theory, security audits should find and re...
Henning Perl, Sergej Dechand, Matthew Smith 0001, ...
CCS
2015
ACM
8 years 1 months ago
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges
Bitcoin exchanges function like banks, securely holding their customers’ bitcoins on their behalf. Several exchanges have suffered catastrophic losses with customers permanently...
Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau...
CCS
2015
ACM
8 years 1 months ago
CCFI: Cryptographically Enforced Control Flow Integrity
Ali José Mashtizadeh, Andrea Bittau, Dan Bo...
CCS
2015
ACM
8 years 1 months ago
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins
We show that equivocation, i.e., making conflicting statements to others in a distributed protocol, can be monetarily disincentivized by the use of crypto-currencies such as Bitc...
Tim Ruffing, Aniket Kate, Dominique Schröder
CCS
2015
ACM
8 years 1 months ago
Privacy-Preserving Deep Learning
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unpreced...
Reza Shokri, Vitaly Shmatikov
CCS
2015
ACM
8 years 1 months ago
Per-Input Control-Flow Integrity
Control-Flow Integrity (CFI) is an effective approach to mitigating control-flow hijacking attacks. Conventional CFI techniques statically extract a control-flow graph (CFG) fro...
Ben Niu, Gang Tan
CCS
2015
ACM
8 years 1 months ago
MalGene: Automatic Extraction of Malware Analysis Evasion Signature
Automated dynamic malware analysis is a common approach for detecting malicious software. However, many malware samples identify the presence of the analysis environment and evade...
Dhilung Kirat, Giovanni Vigna
CCS
2015
ACM
8 years 1 months ago
iRiS: Vetting Private API Abuse in iOS Applications
With the booming sale of iOS devices, the number of iOS applications has increased significantly in recent years. To protect the security of iOS users, Apple requires every iOS a...
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, ...
CCS
2015
ACM
8 years 1 months ago
Automated Symbolic Proofs of Observational Equivalence
Many cryptographic security definitions can be naturally formulated as observational equivalence properties. However, existing automated tools for verifying the observational equ...
David A. Basin, Jannik Dreier, Ralf Sasse