Sciweavers

CCS
2015
ACM
9 years 11 months ago
Authenticating Privately over Public Wi-Fi Hotspots
Wi-Fi connectivity using open hotspots hosted on untrusted Access Points (APs) has been a staple of mobile network deployments for many years as mobile providers seek to offload s...
Aldo Cassola, Erik-Oliver Blass, Guevara Noubir
CCS
2015
ACM
9 years 11 months ago
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate ...
Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
CCS
2015
ACM
9 years 11 months ago
AppPolicyModules: Mandatory Access Control for Third-Party Apps
Android has recently introduced the support for Mandatory Access Control, which extends previous security services relying on the Android Permission Framework and on the kernel-le...
Enrico Bacis, Simone Mutti, Stefano Paraboschi
CCS
2015
ACM
9 years 11 months ago
On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data
Privacy protection of time-series data, such as traces of household electricity usage reported by smart meters, is of much practical importance. Solutions are available to improve...
Chris Y. T. Ma, David K. Y. Yau
CCS
2015
ACM
9 years 11 months ago
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
Two-factor authentication has been widely used due to the vulnerabilities associated with traditional text-based password. One-time password (OTP) plays an indispensable role on a...
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing