Sciweavers

CCS
2015
ACM
9 years 11 months ago
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins
We show that equivocation, i.e., making conflicting statements to others in a distributed protocol, can be monetarily disincentivized by the use of crypto-currencies such as Bitc...
Tim Ruffing, Aniket Kate, Dominique Schröder
CCS
2015
ACM
9 years 11 months ago
Privacy-Preserving Deep Learning
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unpreced...
Reza Shokri, Vitaly Shmatikov
CCS
2015
ACM
9 years 11 months ago
Per-Input Control-Flow Integrity
Control-Flow Integrity (CFI) is an effective approach to mitigating control-flow hijacking attacks. Conventional CFI techniques statically extract a control-flow graph (CFG) fro...
Ben Niu, Gang Tan
CCS
2015
ACM
9 years 11 months ago
MalGene: Automatic Extraction of Malware Analysis Evasion Signature
Automated dynamic malware analysis is a common approach for detecting malicious software. However, many malware samples identify the presence of the analysis environment and evade...
Dhilung Kirat, Giovanni Vigna
CCS
2015
ACM
9 years 11 months ago
iRiS: Vetting Private API Abuse in iOS Applications
With the booming sale of iOS devices, the number of iOS applications has increased significantly in recent years. To protect the security of iOS users, Apple requires every iOS a...
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, ...