Sciweavers

CCS
2015
ACM
10 years 27 days ago
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
This paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a databas...
Oswaldo Olivo, Isil Dillig, Calvin Lin
CCS
2015
ACM
10 years 27 days ago
Defeating IMSI Catchers
IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a m...
Fabian van den Broek, Roel Verdult, Joeri de Ruite...
CCS
2015
ACM
10 years 27 days ago
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physi...
Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar ...
CCS
2015
ACM
10 years 27 days ago
Secure Deduplication of Encrypted Data without Additional Independent Servers
Encrypting data on client-side before uploading it to a cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard pra...
Jian Liu, N. Asokan, Benny Pinkas
CCS
2015
ACM
10 years 27 days ago
Exploiting Temporal Dynamics in Sybil Defenses
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromis...
Changchang Liu, Peng Gao, Matthew K. Wright, Prate...