Sciweavers

CCS
2015
ACM
8 years 3 days ago
The Clock is Still Ticking: Timing Attacks in the Modern Web
Web-based timing attacks have been known for over a decade, and it has been shown that, under optimal network conditions, an adversary can use such an attack to obtain information...
Tom van Goethem, Wouter Joosen, Nick Nikiforakis
CCS
2015
ACM
8 years 3 days ago
Transparent Data Deduplication in the Cloud
Cloud storage providers such as Dropbox and Google drive heavily rely on data deduplication to save storage costs by only storing one copy of each uploaded file. Although recent ...
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O...
CCS
2015
ACM
8 years 3 days ago
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers
The increase of Distributed Denial-of-Service (DDoS) attacks in volume, frequency, and complexity, combined with the constant required alertness for mitigating web application thr...
Thomas Vissers, Tom van Goethem, Wouter Joosen, Ni...
CCS
2015
ACM
8 years 3 days ago
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Exploitation of memory-corruption vulnerabilities in widelyused software has been a threat for over two decades and no end seems to be in sight. Since performance and backwards co...
Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
CCS
2015
ACM
8 years 3 days ago
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation leaks physical information about their internal secrets. Because of their efficie...
Olivier Pereira, François-Xavier Standaert,...
CCS
2015
ACM
8 years 3 days ago
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Given the increasing adoption of Bitcoin, the number of transactions and the block sizes within the system are only expected to increase. To sustain its correct operation in spite...
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame...
CCS
2015
ACM
8 years 3 days ago
GUITAR: Piecing Together Android App GUIs from Memory Images
An Android app’s graphical user interface (GUI) displays rich semantic and contextual information about the smartphone’s owner and app’s execution. Such information provides...
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu,...
CCS
2015
ACM
8 years 3 days ago
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls
New regulations mandating firms to share information on security breaches and security practices with authorities are high on the policy agenda around the globe. These initiative...
Stefan Laube, Rainer Böhme
CCS
2015
ACM
8 years 3 days ago
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks
Off-path packet injection attacks are still serious threats to the Internet and network security. In recent years, a number of studies have discovered new variations of packet inj...
Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru...
CCS
2015
ACM
8 years 3 days ago
Entangled Encodings and Data Entanglement
Giuseppe Ateniese, Özgür Dagdelen, Ivan ...