Sciweavers

CCS
2015
ACM
8 years 1 months ago
Defeating IMSI Catchers
IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a m...
Fabian van den Broek, Roel Verdult, Joeri de Ruite...
CCS
2015
ACM
8 years 1 months ago
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physi...
Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar ...
CCS
2015
ACM
8 years 1 months ago
Secure Deduplication of Encrypted Data without Additional Independent Servers
Encrypting data on client-side before uploading it to a cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard pra...
Jian Liu, N. Asokan, Benny Pinkas
CCS
2015
ACM
8 years 1 months ago
Exploiting Temporal Dynamics in Sybil Defenses
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromis...
Changchang Liu, Peng Gao, Matthew K. Wright, Prate...
CCS
2015
ACM
8 years 1 months ago
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
—An implicit goal of Bitcoin’s reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin’s securi...
Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elai...
CCS
2015
ACM
8 years 1 months ago
Deniable Key Exchanges for Secure Messaging
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness of existing solutions is the ...
Nik Unger, Ian Goldberg
CCS
2015
ACM
8 years 1 months ago
I Know Where You are: Proofs of Presence Resilient to Malicious Provers
In the recent years, new services and businesses leveraging location-based services (LBS) are rapidly emerging. On the other hand this has raised the incentive of users to cheat a...
Markus Miettinen, N. Asokan, Farinaz Koushanfar, T...
CCS
2015
ACM
8 years 1 months ago
Fraud Detection through Graph-Based User Behavior Modeling
How do anomalies, fraud, and spam effect our models of normal user behavior? How can we modify our models to catch fraudsters? In this tutorial we will answer these questions con...
Alex Beutel, Leman Akoglu, Christos Faloutsos
CCS
2015
ACM
8 years 1 months ago
Android Rooting: Methods, Detection, and Evasion
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. While useful, rooting weakens the security of Android...
San-Tsai Sun, Andrea Cuadros, Konstantin Beznosov
CCS
2015
ACM
8 years 1 months ago
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications
Bugs in the authorisation logic of web applications can expose the data of one user to another. Such data disclosure vulnerabilities are common—they can be caused by a single om...
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe...