Sciweavers

CCS
2015
ACM
8 years 9 days ago
Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar...
CCS
2015
ACM
8 years 9 days ago
The Limits of Composable Crypto with Transferable Setup Devices
UC security realized with setup devices imposes that single instances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devi...
Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay
CCS
2015
ACM
8 years 9 days ago
An Empirical Study of Web Vulnerability Discovery Ecosystems
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect ...
Mingyi Zhao, Jens Grossklags, Peng Liu
CCS
2015
ACM
8 years 9 days ago
Practical Context-Sensitive CFI
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive to the context of preceding edges. Recent work demonstrates that this leaves suf...
Victor van der Veen, Dennis Andriesse, Enes Gö...
CCS
2015
ACM
8 years 9 days ago
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy
Firewall configuration is a critical activity for the Supervisory Control and Data Acquisition (SCADA) networks that control power stations, water distribution, factory automatio...
Dinesha Ranathunga, Matthew Roughan, Phil Kernick,...
CCS
2015
ACM
8 years 9 days ago
Subversion-Resilient Signature Schemes
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is i...
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi