Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CCS
2015
ACM
5 years 7 months ago
A Search Engine Backed by Internet-Wide Scanning
Fast Internet-wide scanning has opened new avenues for security research, ranging from uncovering widespread vulnerabilities in random number generators to tracking the evolving i...
Zakir Durumeric, David Adrian, Ariana Mirian, Mich...
CCS
2015
ACM
5 years 7 months ago
Micropayments for Decentralized Currencies
Electronic financial transactions in the US, even those enabled by Bitcoin, have relatively high transaction costs. As a result, it becomes infeasible to make micropayments, i.e....
Rafael Pass, Abhi Shelat
CCS
2015
ACM
5 years 7 months ago
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs
Recently, proactive strategies have received much attention as they make a system more dynamic and difficult to predict, therefore reducing the impact of adversary attacks. In thi...
Zhuo Lu, Lisa M. Marvel, Cliff Wang
CCS
2015
ACM
5 years 7 months ago
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies
Differential privacy (DP) has become widely accepted as a rigorous definition of data privacy, with stronger privacy guarantees than traditional statistical methods. However, re...
Florian Tramèr, Zhicong Huang, Jean-Pierre ...
CCS
2015
ACM
5 years 7 months ago
The Performance Cost of Shadow Stacks and Stack Canaries
Control flow defenses against ROP either use strict, expensive, but strong protection against redirected RET instructions with shadow stacks, or much faster but weaker protection...
Thurston H. Y. Dang, Petros Maniatis, David Wagner
CCS
2015
ACM
5 years 7 months ago
k-Anonymization by Freeform Generalization
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s record from published attributes with high probability, and (ii) provide hig...
Katerina Doka, Mingqiang Xue, Dimitrios Tsoumakos,...
CCS
2015
ACM
5 years 7 months ago
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting
Although studies have shown that at least one in ten Web pages contains a client-side XSS vulnerability, the prevalent causes for this class of Cross-Site Scripting have not been ...
Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebasti...
CCS
2015
ACM
5 years 7 months ago
A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems
Moving Target Defenses (MTD) have been touted as a game changing approach to computer security that eliminates the static nature of current computer systems – an attacker’s bi...
Rui Zhuang, Alexandru G. Bardas, Scott A. DeLoach,...
CCS
2015
ACM
5 years 7 months ago
Supporting Privacy-Conscious App Update Decisions with User Reviews
Smartphone app updates are critical to user security and privacy. New versions may fix important security bugs, which is why users should usually update their apps. However, occas...
Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick T...
CCS
2015
ACM
5 years 7 months ago
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
Code-reuse attacks continue to evolve and remain a severe threat to modern software. Recent research has proposed a variety of defenses with differing security, efficiency, and p...
Stephen J. Crane, Stijn Volckaert, Felix Schuster,...
books