Sciweavers

CCS
2015
ACM
8 years 7 days ago
Seeing through Network-Protocol Obfuscation
Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors ...
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas R...
CCS
2015
ACM
8 years 7 days ago
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
Opaque predicates have been widely used to insert superfluous branches for control flow obfuscation. Opaque predicates can be seamlessly applied together with other obfuscation ...
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu
CCS
2015
ACM
8 years 7 days ago
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector
Insider attack has become a major threat in financial sector and is a very serious and pervasive security problem. Currently, there is no insider threat ontology in this domain a...
Gökhan Kul, Shambhu Upadhyaya
CCS
2015
ACM
8 years 7 days ago
When Good Becomes Evil: Keystroke Inference with Smartwatch
One rising trend in today’s consumer electronics is the wearable devices, e.g., smartwatches. With tens of millions of smartwatches shipped, however, the security implications o...
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehua...
CCS
2015
ACM
8 years 7 days ago
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript
Whitelisting has become a common practice to ensure execution of trusted application code. However, its effectiveness in protecting client-side web application code has not yet be...
Pratik Soni, Enrico Budianto, Prateek Saxena
CCS
2015
ACM
8 years 7 days ago
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Adversaries exploit memory corruption vulnerabilities to hijack a program’s control flow and gain arbitrary code execution. One promising mitigation, control-flow integrity (C...
Mauro Conti, Stephen Crane, Lucas Davi, Michael Fr...
CCS
2015
ACM
8 years 7 days ago
Inference Attacks on Property-Preserving Encrypted Databases
Many encrypted database (EDB) systems have been proposed in the last few years as cloud computing has grown in popularity and data breaches have increased. The stateof-the-art EDB...
Muhammad Naveed, Seny Kamara, Charles V. Wright
CCS
2015
ACM
8 years 7 days ago
Security Metrics for the Android Ecosystem
The security of Android depends on the timely delivery of updates to fix critical vulnerabilities. In this paper we map the complex network of players in the Android ecosystem wh...
Daniel R. Thomas, Alastair R. Beresford, Andrew C....
CCS
2015
ACM
8 years 7 days ago
Frequency-Hiding Order-Preserving Encryption
Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. This makes its performance and functionality very suitable ...
Florian Kerschbaum