Sciweavers

ACSAC
2015
IEEE
8 years 15 days ago
Entity-Based Access Control: supporting more expressive access control policies
Access control is an important part of security that restricts the actions that users can perform on resources. Policy models specify how these restrictions are formulated in poli...
Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wou...
ACSAC
2015
IEEE
8 years 15 days ago
BareDroid: Large-Scale Analysis of Android Apps on Real Devices
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on emulators, such as the Google’s Bouncer and Andru...
Simone Mutti, Yanick Fratantonio, Antonio Bianchi,...
ACSAC
2015
IEEE
8 years 15 days ago
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks
As information-centric networks are deployed in increasingly diverse settings, there is a growing need to protect the privacy of participants. We describe the design, implementati...
Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, A...
ACSAC
2015
IEEE
8 years 15 days ago
Proactive Security Analysis of Changes in Virtualized Infrastructures
The pervasiveness of cloud computing can be attributed to its scale and elasticity. However, the operational complexity of the underlying cloud infrastructure is high, due to its ...
Sören Bleikertz, Carsten Vogel, Thomas Gro&sz...
ACSAC
2015
IEEE
8 years 15 days ago
PARS: A Uniform and Open-source Password Analysis and Research System
In this paper, we introduce an open-source and modular password analysis and research system, PARS, which provides a uniform, comprehensive and scalable research platform for pass...
Shouling Ji, Shukun Yang, Ting Wang, Changchang Li...
ACSAC
2015
IEEE
8 years 15 days ago
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
Although Machine Learning (ML) based approaches have shown promise for Android malware detection, a set of critical challenges remain unaddressed. Some of those challenges arise i...
Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Hern...
ACSAC
2015
IEEE
8 years 15 days ago
Evaluating the Flexibility of the Java Sandbox
The ubiquitously-installed Java Runtime Environment (JRE) provides a complex, flexible set of mechanisms that support the execution of untrusted code inside a secure sandbox. How...
Zack Coker, Michael Maass, Tianyuan Ding, Claire L...
ACSAC
2015
IEEE
8 years 15 days ago
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at th...
Mohammed H. Almeshekah, Christopher N. Gutierrez, ...
ACSAC
2015
IEEE
8 years 15 days ago
Privacy-preserving Virtual Machine
: Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent sn...
Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan
ACSAC
2015
IEEE
8 years 15 days ago
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
Administrators need effective tools to quickly and automatically obtain a succinct, yet informative, overview of the status of their networks to make critical administrative deci...
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard...