Sciweavers

CCS
2015
ACM
8 years 10 days ago
Thwarting Fake OSN Accounts by Predicting their Victims
Traditional defense mechanisms for fighting against automated fake accounts in online social networks are victim-agnostic. Even though victims of fake accounts play an important ...
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov,...
CCS
2015
ACM
8 years 10 days ago
Leakage-Abuse Attacks Against Searchable Encryption
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently a...
David Cash, Paul Grubbs, Jason Perry, Thomas Riste...
CCS
2015
ACM
8 years 10 days ago
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
Vulnerabilities that disclose executable memory pages enable a new class of powerful code reuse attacks that build the attack payload at runtime. In this work, we present Heisenby...
Adrian Tang, Simha Sethumadhavan, Salvatore J. Sto...
CCS
2015
ACM
8 years 10 days ago
Armadillo: A Compilation Chain for Privacy Preserving Applications
In this work we present Armadillo a compilation chain used for compiling applications written in a high-level language (C++) to work on encrypted data. The back-end of the compila...
Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
CCS
2015
ACM
8 years 10 days ago
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity
Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, How...
CCS
2015
ACM
8 years 10 days ago
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Authenticated encryption schemes guarantee both privacy and integrity, and have become the default level of encryption in modern protocols. One of the most popular authenticated e...
Shay Gueron, Yehuda Lindell
CCS
2015
ACM
8 years 10 days ago
Software Protection with Code Mobility
The analysis of binary code is a common step of Man-At-The-End attacks to identify code sections crucial to implement attacks, such as identifying private key hidden in the code, ...
Alessandro Cabutto, Paolo Falcarin, Bert Abrath, B...
CCS
2015
ACM
8 years 10 days ago
SEDA: Scalable Embedded Device Attestation
Today, large numbers of smart interconnected devices provide safety and security critical services for energy grids, industrial control systems, gas and oil search robots, home/of...
N. Asokan, Franz Ferdinand Brasser, Ahmad Ibrahim,...
CCS
2015
ACM
8 years 10 days ago
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS
On modern operating systems, applications under the same user are separated from each other, for the purpose of protecting them against malware and compromised programs. Given the...
Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang...
CCS
2015
ACM
8 years 10 days ago
TrustLogin: Securing Password-Login on Commodity Operating Systems
With the increasing prevalence of Web 2.0 and cloud computing, password-based logins play an increasingly important role on user-end systems. We use passwords to authenticate ours...
Fengwei Zhang, Kevin Leach, Haining Wang, Angelos ...