Sciweavers

205
Voted
ACSAC
2015
IEEE
9 years 10 months ago
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwa...
195
Voted
ACSAC
2015
IEEE
9 years 10 months ago
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
Thomas Hupperich, Davide Maiorca, Marc Kührer...
113
Voted
ACSAC
2015
IEEE
9 years 10 months ago
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Z...
108
Voted
ACSAC
2015
IEEE
9 years 10 months ago
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
Adam J. Aviv, Devon Budzitowski, Ravi Kuber
107
Voted
ACSAC
2015
IEEE
9 years 10 months ago
Provenance-based Integrity Protection for Windows
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
Wai-Kit Sze, R. Sekar
Security Privacy
Top of PageReset Settings