Sciweavers

CCS
2015
ACM
9 years 11 months ago
POSTER: Computations on Encrypted Data in the Internet of Things Applications
We identify and address two primary challenges for computing on encrypted data in Internet of Things applications: synchronizing encrypted data across devices and selecting an app...
Laurynas Riliskis, Hossein Shafagh, Philip Levis
CCS
2015
ACM
9 years 11 months ago
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
Le Yu, Tao Zhang, Xiapu Luo, Lei Xue
CCS
2015
ACM
9 years 11 months ago
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services provide both client and server anonymity. They protect the location of the serve...
Srdjan Matic, Platon Kotzias, Juan Caballero
CCS
2015
ACM
9 years 11 months ago
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
A general prerequisite for a code reuse attack is that the attacker needs to locate code gadgets that perform the desired operations and then direct the control flow of a vulnerab...
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P...
CCS
2015
ACM
9 years 11 months ago
(Un)linkable Pseudonyms for Governmental Databases
When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identi...
Jan Camenisch, Anja Lehmann