Sciweavers

250
Voted
CCS
2015
ACM
10 years 18 days ago
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
Le Yu, Tao Zhang, Xiapu Luo, Lei Xue
210
Voted
CCS
2015
ACM
10 years 18 days ago
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services provide both client and server anonymity. They protect the location of the serve...
Srdjan Matic, Platon Kotzias, Juan Caballero
206
Voted
CCS
2015
ACM
10 years 18 days ago
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
A general prerequisite for a code reuse attack is that the attacker needs to locate code gadgets that perform the desired operations and then direct the control flow of a vulnerab...
Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P...
195
Voted
CCS
2015
ACM
10 years 18 days ago
(Un)linkable Pseudonyms for Governmental Databases
When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identi...
Jan Camenisch, Anja Lehmann
190
Voted
CCS
2015
ACM
10 years 18 days ago
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
The HIVE hidden volume encryption system was proposed by Blass et al. at ACM-CCS 2014. Even though HIVE has a security proof, this paper demonstrates an attack on its implementatio...
Kenneth G. Paterson, Mario Strefler
CCS
2015
ACM
10 years 18 days ago
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext
In this paper we present an identity-set-based broadcast encryption scheme with three working modes: set membership (Include-mode), all member (All-mode), and negative membership ...
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
CCS
2015
ACM
10 years 18 days ago
Insecurity of Voice Solution VoLTE in LTE Mobile Networks
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit...
Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan,...
CCS
2015
ACM
10 years 18 days ago
Authorization Federation in IaaS Multi Cloud
As more and more organizations move to cloud, it is inevitable that cross-organizational collaboration will need to be supported in the cloud. In this paper, we explore models for...
Navid Pustchi, Ram Krishnan, Ravi S. Sandhu
CCS
2015
ACM
10 years 18 days ago
GRECS: Graph Encryption for Approximate Shortest Distance Queries
We propose graph encryption schemes that efficiently support approximate shortest distance queries on large-scale encrypted graphs. Shortest distance queries are one of the most f...
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Ko...
CCS
2015
ACM
10 years 18 days ago
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günthe...