Sciweavers

CCS
2015
ACM
9 years 11 months ago
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript
Whitelisting has become a common practice to ensure execution of trusted application code. However, its effectiveness in protecting client-side web application code has not yet be...
Pratik Soni, Enrico Budianto, Prateek Saxena
CCS
2015
ACM
9 years 11 months ago
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Adversaries exploit memory corruption vulnerabilities to hijack a program’s control flow and gain arbitrary code execution. One promising mitigation, control-flow integrity (C...
Mauro Conti, Stephen Crane, Lucas Davi, Michael Fr...
CCS
2015
ACM
9 years 11 months ago
Inference Attacks on Property-Preserving Encrypted Databases
Many encrypted database (EDB) systems have been proposed in the last few years as cloud computing has grown in popularity and data breaches have increased. The stateof-the-art EDB...
Muhammad Naveed, Seny Kamara, Charles V. Wright
CCS
2015
ACM
9 years 11 months ago
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhan...
CCS
2015
ACM
9 years 11 months ago
Security Metrics for the Android Ecosystem
The security of Android depends on the timely delivery of updates to fix critical vulnerabilities. In this paper we map the complex network of players in the Android ecosystem wh...
Daniel R. Thomas, Alastair R. Beresford, Andrew C....