Sciweavers

91
Voted
NDSS
2015
IEEE
9 years 11 months ago
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
—We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences...
Simon Eberz, Kasper Bonne Rasmussen, Vincent Lende...
NDSS
2015
IEEE
9 years 11 months ago
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms
—Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g., “restaurant”). Such data might reveal some persona...
Igor Bilogrevic, Kévin Huguenin, Stefan Mih...
93
Voted
NDSS
2015
IEEE
9 years 11 months ago
Information Flow Analysis of Android Applications in DroidSafe
—We present DroidSafe, a static information flow analysis tool that reports potential leaks of sensitive information in Android applications. DroidSafe combines a comprehensive,...
Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, ...
86
Voted
NDSS
2015
IEEE
9 years 11 months ago
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
—Until recently, it was widely believed that code randomization (such as fine-grained ASLR) can effectively mitigate code reuse attacks. However, a recent attack strategy, dubbe...
Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeg...
NDSS
2015
IEEE
9 years 11 months ago
Parking Sensors: Analyzing and Detecting Parked Domains
—A parked domain is an undeveloped domain which has no content other than automatically computed advertising banners and links, used to generate profit. Despite the apparent pop...
Thomas Vissers, Wouter Joosen, Nick Nikiforakis