Sciweavers

RAID
2015
Springer
9 years 11 months ago
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users
Abstract. Handheld devices today do not continuously verify the identity of the user while sensitive activities are performed. This enables attackers, who can either compromise the...
Rahul Murmuria, Angelos Stavrou, Daniel Barbar&aac...
RAID
2015
Springer
9 years 11 months ago
Counteracting Data-Only Malware with Code Pointer Examination
As new code-based defense technologies emerge, attackers move to data-only malware, which is capable of infecting a system without introducing any new code. To manipulate the contr...
Thomas Kittel, Sebastian Vogl, Julian Kirsch, Clau...
110
Voted
RAID
2015
Springer
9 years 11 months ago
WYSISNWIV: What You Scan Is Not What I Visit
Abstract. A variety of attacks, including remote-code execution exploits, malware, and phishing, are delivered to users over the web. Users are lured to malicious websites in vario...
Qilang Yang, Dimitrios Damopoulos, Georgios Portok...
RAID
2015
Springer
9 years 11 months ago
Demystifying the IP Blackspace
A small part of the IPv4 address space has still not been assigned for use to any organization. However, some of this IP space is announced through BGP, and is, therefore, globally...
Quentin Jacquemart, Pierre-Antoine Vervier, Guilla...
RAID
2015
Springer
9 years 11 months ago
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
Cache attacks, which exploit differences in timing to perform covert or side channels, are now well understood. Recent works leverage the last level cache to perform cache attacks...
Clémentine Maurice, Nicolas Le Scouarnec, C...