Sciweavers

206
Voted
CCS
2015
ACM
9 years 10 months ago
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
Le Yu, Tao Zhang, Xiapu Luo, Lei Xue
194
Voted
CCS
2015
ACM
9 years 10 months ago
Constant Communication ORAM with Small Blocksize
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, w...
Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
180
Voted
CCS
2015
ACM
9 years 10 months ago
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic “fairy-ring dance” construction that transforms any secure two-party...
Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahan...
178
Voted
CCS
2015
ACM
9 years 10 months ago
Adaptive Just-In-Time Code Diversification
We present a method to regenerate diversified code dynamically in a Java bytecode JIT compiler, and to update the diversification frequently during the execution of the program. T...
Abhinav Jangda, Mohit Mishra, Bjorn De Sutter
176
Voted
CCS
2015
ACM
9 years 10 months ago
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services provide both client and server anonymity. They protect the location of the serve...
Srdjan Matic, Platon Kotzias, Juan Caballero
Security Privacy
Top of PageReset Settings