Sciweavers

CCS
2015
ACM
9 years 11 months ago
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
—An implicit goal of Bitcoin’s reward structure is to diffuse network influence over a diverse, decentralized population of individual participants. Indeed, Bitcoin’s securi...
Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elai...
CCS
2015
ACM
9 years 11 months ago
Deniable Key Exchanges for Secure Messaging
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness of existing solutions is the ...
Nik Unger, Ian Goldberg
CCS
2015
ACM
9 years 11 months ago
I Know Where You are: Proofs of Presence Resilient to Malicious Provers
In the recent years, new services and businesses leveraging location-based services (LBS) are rapidly emerging. On the other hand this has raised the incentive of users to cheat a...
Markus Miettinen, N. Asokan, Farinaz Koushanfar, T...
CCS
2015
ACM
9 years 11 months ago
Fraud Detection through Graph-Based User Behavior Modeling
How do anomalies, fraud, and spam effect our models of normal user behavior? How can we modify our models to catch fraudsters? In this tutorial we will answer these questions con...
Alex Beutel, Leman Akoglu, Christos Faloutsos
CCS
2015
ACM
9 years 11 months ago
Android Rooting: Methods, Detection, and Evasion
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. While useful, rooting weakens the security of Android...
San-Tsai Sun, Andrea Cuadros, Konstantin Beznosov