Sciweavers

137
Voted
CODASPY
2016
10 years 1 months ago
Remix: On-demand Live Randomization
Code randomization is an effective defense against code reuse attacks. It scrambles program code to prevent attackers from locating useful functions or gadgets. The key to secure...
Yue Chen, Zhi Wang, David Whalley, Long Lu
120
Voted
CODASPY
2016
10 years 1 months ago
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks
In recent years, simple password-based authentication systems have increasingly proven ineffective for many classes of real-world devices. As a result, many researchers have conc...
Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Co...
133
Voted
CODASPY
2016
10 years 1 months ago
An Authorization Service for Collaborative Situation Awareness
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, ...
136
Voted
CODASPY
2016
10 years 1 months ago
On the Origin of Mobile Apps: Network Provenance for Android Applications
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
Ryan Stevens, Jonathan Crussell, Hao Chen 0003
CODASPY
2016
10 years 1 months ago
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cris...