Sciweavers

86
Voted
NDSS
2015
IEEE
9 years 11 months ago
VTint: Protecting Virtual Function Tables' Integrity
—In the recent past, a number of approaches have been proposed to protect certain types of control data in a program, such as return addresses saved on the stack, rendering most ...
Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaof...
130
Voted
NDSS
2015
IEEE
9 years 11 months ago
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines
—Return-oriented programming (ROP) has become the dominant form of vulnerability exploitation in both user and kernel space. Many defenses against ROP exploits exist, which can s...
Michalis Athanasakis, Elias Athanasopoulos, Michal...
NDSS
2015
IEEE
9 years 11 months ago
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces
—A credit network models trust between agents in a distributed environment and enables payments between arbitrary pairs of agents. With their flexible design and robustness agai...
Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, ...
78
Voted
NDSS
2015
IEEE
9 years 11 months ago
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks
—Some recent research presented evidence of blocks of IP addresses being stolen by BGP hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in ...
Pierre-Antoine Vervier, Olivier Thonnard, Marc Dac...
75
Voted
NDSS
2015
IEEE
9 years 11 months ago
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
—We report on a user study that provides evidence that spaced repetition and a specific mnemonic technique enable users to successfully recall multiple strong passwords over tim...
Jeremiah Blocki, Saranga Komanduri, Lorrie Faith C...