Sciweavers

ACSAC
2015
IEEE
9 years 8 months ago
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
Thomas Hupperich, Davide Maiorca, Marc Kührer...
ACSAC
2015
IEEE
9 years 8 months ago
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Z...
91
Voted
ACSAC
2015
IEEE
9 years 8 months ago
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
Adam J. Aviv, Devon Budzitowski, Ravi Kuber
91
Voted
ACSAC
2015
IEEE
9 years 8 months ago
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may alway...
Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang
88
Voted
ACSAC
2015
IEEE
9 years 8 months ago
Provenance-based Integrity Protection for Windows
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
Wai-Kit Sze, R. Sekar
Security Privacy
Top of PageReset Settings