Sciweavers

CCS
2015
ACM
8 years 1 months ago
Automated Proofs of Pairing-Based Cryptography
Gilles Barthe, Benjamin Grégoire, Benedikt ...
CCS
2015
ACM
8 years 1 months ago
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
The cached Internet content served by content delivery networks (CDN) comprises a large fraction of today’s Internet traffic, yet, there is little study on how real-world censor...
John Holowczak, Amir Houmansadr
CCS
2015
ACM
8 years 1 months ago
XiOS: Extended Application Sandboxing on iOS
Until very recently it was widely believed that iOS malware is effectively blocked by Apple’s vetting process and application sandboxing. However, the newly presented severe ma...
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahm...
CCS
2015
ACM
8 years 1 months ago
Surpass: System-initiated User-replaceable Passwords
System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult t...
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstan...
CCS
2015
ACM
8 years 1 months ago
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions of confidentiality and integrity. Although various AE schemes are known, there ...
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
CCS
2015
ACM
8 years 1 months ago
A Search Engine Backed by Internet-Wide Scanning
Fast Internet-wide scanning has opened new avenues for security research, ranging from uncovering widespread vulnerabilities in random number generators to tracking the evolving i...
Zakir Durumeric, David Adrian, Ariana Mirian, Mich...
CCS
2015
ACM
8 years 1 months ago
Micropayments for Decentralized Currencies
Electronic financial transactions in the US, even those enabled by Bitcoin, have relatively high transaction costs. As a result, it becomes infeasible to make micropayments, i.e....
Rafael Pass, Abhi Shelat
CCS
2015
ACM
8 years 1 months ago
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs
Recently, proactive strategies have received much attention as they make a system more dynamic and difficult to predict, therefore reducing the impact of adversary attacks. In thi...
Zhuo Lu, Lisa M. Marvel, Cliff Wang
CCS
2015
ACM
8 years 1 months ago
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies
Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger privacy guarantees than traditional statistical methods. However, re...
Florian Tramèr, Zhicong Huang, Jean-Pierre ...
CCS
2015
ACM
8 years 1 months ago
The Performance Cost of Shadow Stacks and Stack Canaries
Control flow defenses against ROP either use strict, expensive, but strong protection against redirected RET instructions with shadow stacks, or much faster but weaker protection...
Thurston H. Y. Dang, Petros Maniatis, David Wagner