Sciweavers

ACSAC
2015
IEEE
8 years 13 days ago
A Principled Approach for ROP Defense
Return-Oriented Programming (ROP) is an effective attack technique that can escape modern defenses such as DEP. ROP is based on repeated abuse of existing code snippets ending wi...
Rui Qiao, Mingwei Zhang, R. Sekar
ACSAC
2015
IEEE
8 years 13 days ago
Provenance-based Integrity Protection for Windows
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
Wai-Kit Sze, R. Sekar
ACSAC
2015
IEEE
8 years 13 days ago
Logical Partitions on Many-Core Platforms
Cloud platforms that use logical partitions to allocate dedicated resources to VMs can benefit from small and therefore secure hypervisors. Many-core platforms, with their abunda...
Ramya Jayaram Masti, Claudio Marforio, Kari Kostia...
ACSAC
2015
IEEE
8 years 13 days ago
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
Adam J. Aviv, Devon Budzitowski, Ravi Kuber
ACSAC
2015
IEEE
8 years 13 days ago
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwa...
ACSAC
2015
IEEE
8 years 13 days ago
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may alway...
Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang
ACSAC
2015
IEEE
8 years 13 days ago
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Z...
ACSAC
2015
IEEE
8 years 13 days ago
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications
Android introduced the dynamic code loading (DCL) mechanism to allow for code reuse, to achieve extensibility, to enable updating functionalities, or to boost application startup ...
Luca Falsina, Yanick Fratantonio, Stefano Zanero, ...
ACSAC
2015
IEEE
8 years 13 days ago
Using Channel State Information for Tamper Detection in the Internet of Things
The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tamp...
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, ...
ACSAC
2015
IEEE
8 years 13 days ago
ShrinkWrap: VTable Protection without Loose Ends
As VTable hijacking becomes the primary mode of exploitation against modern browsers, protecting said VTables has recently become a prime research interest. While multiple source-...
István Haller, Enes Göktas, Elias Atha...