Sciweavers

CCS
2015
ACM
9 years 11 months ago
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
Code-reuse attacks continue to evolve and remain a severe threat to modern software. Recent research has proposed a variety of defenses with differing security, efficiency, and p...
Stephen J. Crane, Stijn Volckaert, Felix Schuster,...
CCS
2015
ACM
9 years 11 months ago
Seeing through Network-Protocol Obfuscation
Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors ...
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas R...
CCS
2015
ACM
9 years 11 months ago
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
Opaque predicates have been widely used to insert superfluous branches for control flow obfuscation. Opaque predicates can be seamlessly applied together with other obfuscation ...
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu
CCS
2015
ACM
9 years 11 months ago
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector
Insider attack has become a major threat in financial sector and is a very serious and pervasive security problem. Currently, there is no insider threat ontology in this domain a...
Gökhan Kul, Shambhu Upadhyaya
CCS
2015
ACM
9 years 11 months ago
When Good Becomes Evil: Keystroke Inference with Smartwatch
One rising trend in today’s consumer electronics is the wearable devices, e.g., smartwatches. With tens of millions of smartwatches shipped, however, the security implications o...
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehua...