Sciweavers

89
Voted
ACSAC
2015
IEEE
9 years 11 months ago
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage
In this work we present a simple, yet effective and practical, scheme to improve the security of stored password hashes, rendering their cracking detectable and insuperable at th...
Mohammed H. Almeshekah, Christopher N. Gutierrez, ...
83
Voted
ACSAC
2015
IEEE
9 years 11 months ago
Privacy-preserving Virtual Machine
: Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent sn...
Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan
99
Voted
ACSAC
2015
IEEE
9 years 11 months ago
Know Your Achilles' Heel: Automatic Detection of Network Critical Services
Administrators need effective tools to quickly and automatically obtain a succinct, yet informative, overview of the status of their networks to make critical administrative deci...
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard...
91
Voted
ACSAC
2015
IEEE
9 years 11 months ago
Cross-Site Framing Attacks
Nethanel Gelernter, Yoel Grinstein, Amir Herzberg
92
Voted
ACSAC
2015
IEEE
9 years 11 months ago
MOSE: Live Migration Based On-the-Fly Software Emulation
Software emulation has been proven useful in many scenarios, such as software testing, malware analysis, and intrusion response. However, fine-grained software emulation (e.g., at...
Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim
206
Voted
ACSAC
2015
IEEE
9 years 11 months ago
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
Thomas Hupperich, Davide Maiorca, Marc Kührer...
81
Voted
ACSAC
2015
IEEE
9 years 11 months ago
Using Visual Challenges to Verify the Integrity of Security Cameras
We propose a new way to verify the integrity and freshness of footage from security cameras by sending visual challenges to the area being monitored by the camera. We study the ef...
Junia Valente, Alvaro A. Cárdenas
89
Voted
ACSAC
2015
IEEE
9 years 11 months ago
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks
Over the past decade many exploit mitigation techniques have been introduced to defend against memory corruption attacks. WˆX, ASLR, and canary-based protections are nowadays wid...
Theofilos Petsios, Vasileios P. Kemerlis, Michalis...
ACS
2015
9 years 11 months ago
Modal Operators on Compact Regular Frames and de Vries Algebras
In [7] we introduced the category MKHaus of modal compact Hausdorff spaces, and showed these were concrete realizations of coalgebras for the Vietoris functor on compact Hausdor...
Guram Bezhanishvili, Nick Bezhanishvili, John Hard...
ACS
2015
9 years 11 months ago
Monads of Regular Theories
We characterize the category of monads on Set and the category of Lawvere theories that are equivalent to the category of regular equational theories.
Stanislaw Szawiel, Marek W. Zawadowski