Sciweavers

ACSAC
2015
IEEE
10 years 1 days ago
Evaluating the Flexibility of the Java Sandbox
The ubiquitously-installed Java Runtime Environment (JRE) provides a complex, flexible set of mechanisms that support the execution of untrusted code inside a secure sandbox. How...
Zack Coker, Michael Maass, Tianyuan Ding, Claire L...
ACSAC
2015
IEEE
10 years 1 days ago
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at th...
Mohammed H. Almeshekah, Christopher N. Gutierrez, ...
ACSAC
2015
IEEE
10 years 1 days ago
Privacy-preserving Virtual Machine
: Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent sn...
Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan
ACSAC
2015
IEEE
10 years 1 days ago
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
Administrators need effective tools to quickly and automatically obtain a succinct, yet informative, overview of the status of their networks to make critical administrative deci...
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard...
ACSAC
2015
IEEE
10 years 1 days ago
Cross-Site Framing Attacks
Nethanel Gelernter, Yoel Grinstein, Amir Herzberg