Sciweavers

CCS
2015
ACM
9 years 11 months ago
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users
Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band whe...
Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yancha...
CCS
2015
ACM
9 years 11 months ago
Clean Application Compartmentalization with SOAAP
Application compartmentalization, a vulnerability mitigation technique employed in programs such as OpenSSH and the Chromium web browser, decomposes software into isolated compone...
Khilan Gudka, Robert N. M. Watson, Jonathan Anders...
CCS
2015
ACM
9 years 11 months ago
Fast Garbling of Circuits Under Standard Assumptions
Protocols for secure computation enable mutually distrustful parties to jointly compute on their private inputs without revealing anything but the result. Over recent years, secur...
Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pink...
CCS
2015
ACM
9 years 11 months ago
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
To understand the gap between theory and practice for oblivious cloud storage, we experimentally evaluate four representative Oblivious RAM (ORAM) designs on Amazon S3. We replay ...
Vincent Bindschaedler, Muhammad Naveed 0001, Xiaor...
CCS
2015
ACM
9 years 11 months ago
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
Despite a series of attacks, mifare Classic is still the world’s most widely deployed contactless smartcard on the market. The Classic uses a proprietary stream cipher crypto1 t...
Carlo Meijer, Roel Verdult