Sciweavers

129
Voted
CCS
2008
ACM
15 years 1 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
78
Voted
CCS
2008
ACM
15 years 1 months ago
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
David Dagon, Manos Antonakakis, Paul Vixie, Tatuya...
103
Voted
CCS
2008
ACM
15 years 2 months ago
A formal security policy for xenon
John McDermott, Leo Freitas
95
Voted
CCS
2008
ACM
15 years 2 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
109
Voted
CCS
2008
ACM
15 years 2 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
120
Voted
CCS
2008
ACM
15 years 2 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
98
Voted
CCS
2008
ACM
15 years 2 months ago
Adaptive distributed mechanism against flooding network attacks based on machine learning
Josep Lluis Berral, Nicolás Poggi, Javier A...
98
Voted
CCS
2008
ACM
15 years 2 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
85
Voted
CCS
2008
ACM
15 years 2 months ago
POSH: a generalized captcha with security applications
Waseem Daher, Ran Canetti
102
Voted
CCS
2008
ACM
15 years 2 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal