Sciweavers

238
Voted
CODASPY
2016
10 years 1 months ago
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authenticatio...
John Maheswaran, Daniel Jackowitz, Ennan Zhai, Dav...
118
Voted
CODASPY
2016
10 years 1 months ago
Toward Large-Scale Vulnerability Discovery using Machine Learning
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. ...
111
Voted
CODASPY
2016
10 years 1 months ago
Risk-based Analysis of Business Process Executions
Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed...
Mahdi Alizadeh, Nicola Zannone
144
Voted
CODASPY
2016
10 years 1 months ago
HoneyMix: Toward SDN-based Intelligent Honeynet
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-J...
167
Voted
CODASPY
2016
10 years 1 months ago
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Once data is released to the Internet, there is little hope to successfully delete it, as it may have been duplicated, reposted, and archived in multiple places. This poses a sign...
Apostolis Zarras, Katharina Kohls, Markus Dür...