Sciweavers

CCS
2015
ACM
9 years 11 months ago
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication
The Tor network has established itself as de-facto standard for anonymous communication on the Internet, providing an increased level of privacy to over a million users worldwide....
Daniel Arp, Fabian Yamaguchi, Konrad Rieck
CCS
2015
ACM
9 years 11 months ago
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Despite the security community’s best effort, the number of serious vulnerabilities discovered in software is increasing rapidly. In theory, security audits should find and re...
Henning Perl, Sergej Dechand, Matthew Smith 0001, ...
CCS
2015
ACM
9 years 11 months ago
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges
Bitcoin exchanges function like banks, securely holding their customers’ bitcoins on their behalf. Several exchanges have suffered catastrophic losses with customers permanently...
Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau...
CCS
2015
ACM
9 years 11 months ago
CCFI: Cryptographically Enforced Control Flow Integrity
Ali José Mashtizadeh, Andrea Bittau, Dan Bo...