Sciweavers

CCS
2015
ACM
8 years 1 months ago
Measuring Botnets in the Wild: Some New Trends
Today, botnets are still responsible for most large scale attacks on the Internet. Botnets are versatile, they remain the most powerful attack platform by constantly and continuou...
Wentao Chang, Aziz Mohaisen, An Wang, Songqing Che...
CCS
2015
ACM
8 years 1 months ago
Lucky 13 Strikes Back
In this work we show how the Lucky 13 attack can be resurrected in the cloud by gaining access to a virtual machine co-located with the target. Our version of the attack exploits ...
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thoma...
CCS
2015
ACM
8 years 1 months ago
UCognito: Private Browsing without Tears
While private browsing is a standard feature, its implementation has been inconsistent among the major browsers. More seriously, it often fails to provide the adequate or even the...
Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, We...
CCS
2015
ACM
8 years 1 months ago
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers
Performing detailed forensic analysis of real-world web security incidents targeting users, such as social engineering and phishing attacks, is a notoriously challenging and time-...
Christopher Neasbitt, Bo Li, Roberto Perdisci, Lon...
CCS
2015
ACM
8 years 1 months ago
On Passive Data Link Layer Fingerprinting of Aircraft Transponders
In order to meet future demands in increasingly congested airspaces, the world’s aviation authorities are currently upgrading their air-traffic management systems. The Automatic...
Martin Strohmeier, Ivan Martinovic
CCS
2015
ACM
8 years 1 months ago
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
The capabilities of modern devices, coupled with the almost ubiquitous availability of Internet connectivity, have resulted in photos being shared online at an unprecedented scale...
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopo...
CCS
2015
ACM
8 years 1 months ago
Drops for Stuff: An Analysis of Reshipping Mule Scams
Credit card fraud has seen rampant increase in the past years, as customers use credit cards and similar financial instruments frequently. Both online and brick-and-mortar outfi...
Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gian...
CCS
2015
ACM
8 years 1 months ago
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations
In this paper, we report the first large-scale, systematic study on the security qualities of emerging push-messaging services, focusing on their app-side service integrations. W...
Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen 0...
CCS
2015
ACM
8 years 1 months ago
HORNET: High-speed Onion Routing at the Network Layer
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next-generation network architectures. HORNET is designed as a low-latency onion ro...
Chen Chen, Daniele Enrico Asoni, David Barrera, Ge...
CCS
2015
ACM
8 years 1 months ago
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
This paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a databas...
Oswaldo Olivo, Isil Dillig, Calvin Lin