Sciweavers

CCS
2015
ACM
9 years 11 months ago
TrustLogin: Securing Password-Login on Commodity Operating Systems
With the increasing prevalence of Web 2.0 and cloud computing, password-based logins play an increasingly important role on user-end systems. We use passwords to authenticate ours...
Fengwei Zhang, Kevin Leach, Haining Wang, Angelos ...
CCS
2015
ACM
9 years 11 months ago
Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar...
CCS
2015
ACM
9 years 11 months ago
The Limits of Composable Crypto with Transferable Setup Devices
UC security realized with setup devices imposes that single instances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devi...
Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay
CCS
2015
ACM
9 years 11 months ago
An Empirical Study of Web Vulnerability Discovery Ecosystems
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect ...
Mingyi Zhao, Jens Grossklags, Peng Liu
CCS
2015
ACM
9 years 11 months ago
Practical Context-Sensitive CFI
Current Control-Flow Integrity (CFI) implementations track control edges individually, insensitive to the context of preceding edges. Recent work demonstrates that this leaves suf...
Victor van der Veen, Dennis Andriesse, Enes Gö...