Sciweavers

CODASPY
2016
8 years 20 days ago
Scalable and Secure Logistic Regression via Homomorphic Encryption
Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive data such as private or medical information, cares are necessary. In this pape...
Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phon...
CODASPY
2016
8 years 20 days ago
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authenticatio...
John Maheswaran, Daniel Jackowitz, Ennan Zhai, Dav...
CODASPY
2016
8 years 20 days ago
Toward Large-Scale Vulnerability Discovery using Machine Learning
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. ...
CODASPY
2016
8 years 20 days ago
Risk-based Analysis of Business Process Executions
Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed...
Mahdi Alizadeh, Nicola Zannone
CODASPY
2016
8 years 20 days ago
HoneyMix: Toward SDN-based Intelligent Honeynet
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-J...
CODASPY
2016
8 years 20 days ago
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Once data is released to the Internet, there is little hope to successfully delete it, as it may have been duplicated, reposted, and archived in multiple places. This poses a sign...
Apostolis Zarras, Katharina Kohls, Markus Dür...
CODASPY
2016
8 years 20 days ago
Remix: On-demand Live Randomization
Code randomization is an effective defense against code reuse attacks. It scrambles program code to prevent attackers from locating useful functions or gadgets. The key to secure...
Yue Chen, Zhi Wang, David Whalley, Long Lu
CODASPY
2016
8 years 20 days ago
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks
In recent years, simple password-based authentication systems have increasingly proven ineffective for many classes of real-world devices. As a result, many researchers have conc...
Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Co...
CODASPY
2016
8 years 20 days ago
An Authorization Service for Collaborative Situation Awareness
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, ...
CODASPY
2016
8 years 20 days ago
On the Origin of Mobile Apps: Network Provenance for Android Applications
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
Ryan Stevens, Jonathan Crussell, Hao Chen 0003