Sciweavers

CCS
2015
ACM
9 years 11 months ago
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
This paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a databas...
Oswaldo Olivo, Isil Dillig, Calvin Lin
CCS
2015
ACM
9 years 11 months ago
Defeating IMSI Catchers
IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a m...
Fabian van den Broek, Roel Verdult, Joeri de Ruite...
CCS
2015
ACM
9 years 11 months ago
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physi...
Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar ...
CCS
2015
ACM
9 years 11 months ago
Secure Deduplication of Encrypted Data without Additional Independent Servers
Encrypting data on client-side before uploading it to a cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard pra...
Jian Liu, N. Asokan, Benny Pinkas
CCS
2015
ACM
9 years 11 months ago
Exploiting Temporal Dynamics in Sybil Defenses
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromis...
Changchang Liu, Peng Gao, Matthew K. Wright, Prate...