Sciweavers

CCS
2015
ACM
8 years 2 months ago
k-Anonymization by Freeform Generalization
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s record from published attributes with high probability, and (ii) provide hig...
Katerina Doka, Mingqiang Xue, Dimitrios Tsoumakos,...
CCS
2015
ACM
8 years 2 months ago
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting
Although studies have shown that at least one in ten Web pages contains a client-side XSS vulnerability, the prevalent causes for this class of Cross-Site Scripting have not been ...
Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebasti...
CCS
2015
ACM
8 years 2 months ago
A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems
Moving Target Defenses (MTD) have been touted as a game changing approach to computer security that eliminates the static nature of current computer systems – an attacker’s bi...
Rui Zhuang, Alexandru G. Bardas, Scott A. DeLoach,...
CCS
2015
ACM
8 years 2 months ago
Supporting Privacy-Conscious App Update Decisions with User Reviews
Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps. However, occas...
Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick T...
CCS
2015
ACM
8 years 2 months ago
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
Code-reuse attacks continue to evolve and remain a severe threat to modern software. Recent research has proposed a variety of defenses with differing security, efficiency, and p...
Stephen J. Crane, Stijn Volckaert, Felix Schuster,...
CCS
2015
ACM
8 years 2 months ago
Seeing through Network-Protocol Obfuscation
Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors ...
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas R...
CCS
2015
ACM
8 years 2 months ago
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
Opaque predicates have been widely used to insert superfluous branches for control flow obfuscation. Opaque predicates can be seamlessly applied together with other obfuscation ...
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu
CCS
2015
ACM
8 years 2 months ago
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector
Insider attack has become a major threat in financial sector and is a very serious and pervasive security problem. Currently, there is no insider threat ontology in this domain a...
Gökhan Kul, Shambhu Upadhyaya
CCS
2015
ACM
8 years 2 months ago
When Good Becomes Evil: Keystroke Inference with Smartwatch
One rising trend in today’s consumer electronics is the wearable devices, e.g., smartwatches. With tens of millions of smartwatches shipped, however, the security implications o...
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehua...
CCS
2015
ACM
8 years 2 months ago
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript
Whitelisting has become a common practice to ensure execution of trusted application code. However, its effectiveness in protecting client-side web application code has not yet be...
Pratik Soni, Enrico Budianto, Prateek Saxena