Sciweavers

CCS
2015
ACM
9 years 11 months ago
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications
Bugs in the authorisation logic of web applications can expose the data of one user to another. Such data disclosure vulnerabilities are common—they can be caused by a single om...
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe...
CCS
2015
ACM
9 years 11 months ago
Automated Proofs of Pairing-Based Cryptography
Gilles Barthe, Benjamin Grégoire, Benedikt ...
CCS
2015
ACM
9 years 11 months ago
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
The cached Internet content served by content delivery networks (CDN) comprises a large fraction of today’s Internet traffic, yet, there is little study on how real-world censor...
John Holowczak, Amir Houmansadr
CCS
2015
ACM
9 years 11 months ago
XiOS: Extended Application Sandboxing on iOS
Until very recently it was widely believed that iOS malware is effectively blocked by Apple’s vetting process and application sandboxing. However, the newly presented severe ma...
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahm...
CCS
2015
ACM
9 years 11 months ago
Surpass: System-initiated User-replaceable Passwords
System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult t...
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstan...