Sciweavers

84
Voted
CODASPY
2016
9 years 5 months ago
Remix: On-demand Live Randomization
Code randomization is an effective defense against code reuse attacks. It scrambles program code to prevent attackers from locating useful functions or gadgets. The key to secure...
Yue Chen, Zhi Wang, David Whalley, Long Lu
66
Voted
CODASPY
2016
9 years 5 months ago
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks
In recent years, simple password-based authentication systems have increasingly proven ineffective for many classes of real-world devices. As a result, many researchers have conc...
Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Co...
70
Voted
CODASPY
2016
9 years 5 months ago
An Authorization Service for Collaborative Situation Awareness
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, ...
74
Voted
CODASPY
2016
9 years 5 months ago
On the Origin of Mobile Apps: Network Provenance for Android Applications
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
Ryan Stevens, Jonathan Crussell, Hao Chen 0003
55
Voted
CODASPY
2016
9 years 5 months ago
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis, Hassan Jameel Asghar, Emiliano De Cris...
164
Voted
CODASPY
2016
9 years 5 months ago
JSLINQ: Building Secure Applications across Tiers
Musard Balliu, Benjamin Liebe, Daniel Schoepe, And...
77
Voted
IEEEARES
2013
IEEE
10 years 4 months ago
Sensor Data Meets Social Networks Reflecting on Benefits in the Case of a Patient Room
The poster illustrates the idea of integrating digital social media with sensor networks (SoSeMe). In order to achieve tangible, specific results, we concentrate on the scenario o...
Fabienne Kuhn, Andreas Spichiger, Reinhard Riedl
104
Voted
HOST
2013
IEEE
11 years 4 months ago
Cloning Physically Unclonable Functions
—As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are amo...
Clemens Helfmeier, Christian Boit, Dmitry Nedospas...
29
Voted
ESORICS
2013
Springer
11 years 4 months ago
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damg˚ard et al. from Crypto 2012. SPDZ provided various efficiency innovations on both the theoretical and p...
Ivan Damgård, Marcel Keller, Enrique Larraia,...
139
Voted
CSFW
2013
IEEE
11 years 4 months ago
A Theory of Information-Flow Labels
Abstract—The security literature offers a multitude of calculi, languages, and systems for information-flow control, each with some set of labels encoding security policies that...
Benoît Montagu, Benjamin C. Pierce, Randy Pol...