Sciweavers

Share
NDSS
2015
IEEE
3 years 5 months ago
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
—We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences...
Simon Eberz, Kasper Bonne Rasmussen, Vincent Lende...
NDSS
2015
IEEE
3 years 5 months ago
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms
—Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g., “restaurant”). Such data might reveal some persona...
Igor Bilogrevic, Kévin Huguenin, Stefan Mih...
NDSS
2015
IEEE
3 years 5 months ago
Information Flow Analysis of Android Applications in DroidSafe
—We present DroidSafe, a static information flow analysis tool that reports potential leaks of sensitive information in Android applications. DroidSafe combines a comprehensive,...
Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, ...
NDSS
2015
IEEE
3 years 5 months ago
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
—Until recently, it was widely believed that code randomization (such as fine-grained ASLR) can effectively mitigate code reuse attacks. However, a recent attack strategy, dubbe...
Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeg...
NDSS
2015
IEEE
3 years 5 months ago
Parking Sensors: Analyzing and Detecting Parked Domains
—A parked domain is an undeveloped domain which has no content other than automatically computed advertising banners and links, used to generate profit. Despite the apparent pop...
Thomas Vissers, Wouter Joosen, Nick Nikiforakis
NDSS
2015
IEEE
3 years 5 months ago
Efficient RAM and control flow in verifiable outsourced computation
Abstract—Recent work on proof-based verifiable computation has resulted in built systems that employ tools from complexity theory and cryptography to address a basic problem in s...
Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, ...
NDSS
2015
IEEE
3 years 5 months ago
Identifying Cross-origin Resource Status Using Application Cache
—HTML5 Application Cache (AppCache) allows web applications to cache their same- and cross-origin resources in the local storage of a web browser to enable offline access. Howev...
Sangho Lee 0001, Hyungsub Kim, Jong Kim
NDSS
2015
IEEE
3 years 5 months ago
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
—Web browsers are a key enabler of a wide range of online services, from shopping and email to banking and health services. Because these services frequently involve handling sen...
Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passa...
NDSS
2015
IEEE
3 years 5 months ago
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries
Abstract—StackArmor is a comprehensive protection technique for stack-based memory error vulnerabilities in binaries. It relies on binary analysis and rewriting strategies to dra...
Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert...
NDSS
2015
IEEE
3 years 5 months ago
Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords
Abstract—We present Knock Yourself Out (KYO), a password generator that enables secure authentication against a computationally unbounded adversary. Master passwords can be surpr...
Benjamin Güldenring, Volker Roth, Lars Ries
books