Sciweavers

112
Voted
CCS
2015
ACM
10 years 27 days ago
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications
Bugs in the authorisation logic of web applications can expose the data of one user to another. Such data disclosure vulnerabilities are common—they can be caused by a single om...
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe...
CCS
2015
ACM
10 years 27 days ago
Automated Proofs of Pairing-Based Cryptography
Gilles Barthe, Benjamin Grégoire, Benedikt ...
CCS
2015
ACM
10 years 27 days ago
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
The cached Internet content served by content delivery networks (CDN) comprises a large fraction of today’s Internet traffic, yet, there is little study on how real-world censor...
John Holowczak, Amir Houmansadr
CCS
2015
ACM
10 years 27 days ago
XiOS: Extended Application Sandboxing on iOS
Until very recently it was widely believed that iOS malware is effectively blocked by Apple’s vetting process and application sandboxing. However, the newly presented severe ma...
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahm...
CCS
2015
ACM
10 years 27 days ago
Surpass: System-initiated User-replaceable Passwords
System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult t...
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstan...