ACM Computer and Communications Security, CCS 2015


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Where's Wally?: Precise User Discovery Attacks in Location Proximity Services

Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis

Where's Wally?: Precise User Discovery Attacks in Location Proximity Services

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Observing and Preventing Leakage in MapReduce

Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, Divya Sharma

Observing and Preventing Leakage in MapReduce

Details
Discussion Comments: 0
Verification: Authors have not verified information

Surpass: System-initiated User-replaceable Passwords

Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan

Surpass: System-initiated User-replaceable Passwords

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tampering with the Delivery of Blocks and Transactions in Bitcoin

Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun

Tampering with the Delivery of Blocks and Transactions in Bitcoin

Details
Discussion Comments: 0
Verification: Authors have not verified information

Seeing through Network-Protocol Obfuscation

Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton

Seeing through Network-Protocol Obfuscation

Details
Discussion Comments: 0
Verification: Authors have not verified information

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks

Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Defeating IMSI Catchers

Fabian van den Broek, Roel Verdult, Joeri de Ruiter

Defeating IMSI Catchers

Details
Discussion Comments: 0
Verification: Authors have not verified information

SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web

Daniel Fett, Ralf Küsters, Guido Schmitz

SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

Tibor Jager, Jörg Schwenk, Juraj Somorovsky

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting Temporal Dynamics in Sybil Defenses

Changchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal

Exploiting Temporal Dynamics in Sybil Defenses

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities

Tianyue Luo, Chen Ni, Qing Han, Mutian Yang, JingZheng Wu, Yanjun Wu

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inference Attacks on Property-Preserving Encrypted Databases

Muhammad Naveed, Seny Kamara, Charles V. Wright

Inference Attacks on Property-Preserving Encrypted Databases

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Deduplication of Encrypted Data without Additional Independent Servers

Jian Liu, N. Asokan, Benny Pinkas

Secure Deduplication of Encrypted Data without Additional Independent Servers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Trusted Display on Untrusted Commodity Platforms

Miao Yu, Virgil D. Gligor, Zongwei Zhou

Trusted Display on Untrusted Commodity Platforms

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Privacy-Preserving Deep Learning

Reza Shokri, Vitaly Shmatikov

Privacy-Preserving Deep Learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application

JingZheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application

Details
Discussion Comments: 0
Verification: Authors have not verified information

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks

Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation

Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS

Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS

Details
Discussion Comments: 0
Verification: Authors have not verified information

MTD 2015: Second ACM Workshop on Moving Target Defense

George Cybenko, Dijiang Huang

MTD 2015: Second ACM Workshop on Moving Target Defense

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol

Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou

POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated Proofs of Pairing-Based Cryptography

Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt

Automated Proofs of Pairing-Based Cryptography

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites

Samuel Jackson, Scott Kerlin, Jeremy Straub

POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites

Details
Discussion Comments: 0
Verification: Authors have not verified information

WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers

Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li

WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast and Secure Three-party Computation: The Garbled Circuit Approach

Payman Mohassel, Mike Rosulek, Ye Zhang

Fast and Secure Three-party Computation: The Garbled Circuit Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance

Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu

Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance

Details
Discussion Comments: 0
Verification: Authors have not verified information

FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch

FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries

Yehuda Lindell, Ben Riva

Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Secure Chat for the Masses? User-centered Security to the Rescue

Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith

POSTER: Secure Chat for the Masses? User-centered Security to the Rescue

Details
Discussion Comments: 0
Verification: Authors have not verified information

How to Use Bitcoin to Play Decentralized Poker

Ranjit Kumaresan, Tal Moran, Iddo Bentov

How to Use Bitcoin to Play Decentralized Poker

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data

Dario Catalano, Dario Fiore

Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images

Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains

Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada

POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains

Details
Discussion Comments: 0
Verification: Authors have not verified information

CCSW 2015: The 7th ACM Cloud Computing Security Workshop

Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray

CCSW 2015: The 7th ACM Cloud Computing Security Workshop

Details
Discussion Comments: 0
Verification: Authors have not verified information

Constant Communication ORAM with Small Blocksize

Tarik Moataz, Travis Mayberry, Erik-Oliver Blass

Constant Communication ORAM with Small Blocksize

Details
Discussion Comments: 0
Verification: Authors have not verified information

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte

Shay Gueron, Yehuda Lindell

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte

Details
Discussion Comments: 0
Verification: Authors have not verified information

CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions

Guillaume Bonfante, José M. Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry

CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound

Xiao Wang, T.-H. Hubert Chan, Elaine Shi

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound

Details
Discussion Comments: 0
Verification: Authors have not verified information

GRECS: Graph Encryption for Approximate Shortest Distance Queries

Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios

GRECS: Graph Encryption for Approximate Shortest Distance Queries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated Analysis and Synthesis of Authenticated Encryption Schemes

Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff

Automated Analysis and Synthesis of Authenticated Encryption Schemes

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Demystifying Incentives in the Consensus Computer

Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena

Demystifying Incentives in the Consensus Computer

Details
Discussion Comments: 0
Verification: Authors have not verified information

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits

Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits

Details
Discussion Comments: 0
Verification: Authors have not verified information

PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks

Yasser Shoukry, Paul Martin, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava

PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inlined Information Flow Monitoring for JavaScript

Andrey Chudnov, David A. Naumann

Inlined Information Flow Monitoring for JavaScript

Details
Discussion Comments: 0
Verification: Authors have not verified information

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks

Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Subversion-Resilient Signature Schemes

Giuseppe Ateniese, Bernardo Magri, Daniele Venturi

Subversion-Resilient Signature Schemes

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Face/Off: Preventing Privacy Leakage From Photos in Social Networks

Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis

Face/Off: Preventing Privacy Leakage From Photos in Social Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations

Fengjun Li, Xin Fu, Bo Luo

POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations

Details
Discussion Comments: 0
Verification: Authors have not verified information

(Un)linkable Pseudonyms for Governmental Databases

Jan Camenisch, Anja Lehmann

(Un)linkable Pseudonyms for Governmental Databases

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Dynamic Labelling for Analyzing Security Protocols

N. V. Narendra Kumar, R. K. Shyamasundar

POSTER: Dynamic Labelling for Analyzing Security Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions

Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols

Peeter Laud, Jaak Randmets

A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Introduction to Cryptocurrencies

Stefan Dziembowski

Introduction to Cryptocurrencies

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: A Password-based Authentication by Splitting Roles of User Interface

JungSeung Lee, Han Park, GyeongYong Bang, JooSeok Song

POSTER: A Password-based Authentication by Splitting Roles of User Interface

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References

Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations

Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe

POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical Context-Sensitive CFI

Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida

Practical Context-Sensitive CFI

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: Computations on Encrypted Data in the Internet of Things Applications

Laurynas Riliskis, Hossein Shafagh, Philip Levis

POSTER: Computations on Encrypted Data in the Internet of Things Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

UCognito: Private Browsing without Tears

Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee

UCognito: Private Browsing without Tears

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Authenticating Privately over Public Wi-Fi Hotspots

Aldo Cassola, Erik-Oliver Blass, Guevara Noubir

Authenticating Privately over Public Wi-Fi Hotspots

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates

Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates

Details
Discussion Comments: 0
Verification: Authors have not verified information

Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha

Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

SEDA: Scalable Embedded Device Attestation

N. Asokan, Franz Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann

SEDA: Scalable Embedded Device Attestation

Details
Discussion Comments: 0
Verification: Authors have not verified information

CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services

Srdjan Matic, Platon Kotzias, Juan Caballero

CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles

Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang

DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lattice Basis Reduction Attack against Physically Unclonable Functions

Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik

Lattice Basis Reduction Attack against Physically Unclonable Functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

MIST 2015: 7th International Workshop on Managing Insider Security Threats

Ilsun You, Elisa Bertino

MIST 2015: 7th International Workshop on Managing Insider Security Threats

Details
Discussion Comments: 0
Verification: Authors have not verified information

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations

Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations

Details
Discussion Comments: 0
Verification: Authors have not verified information

SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users

Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang

SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Certified PUP: Abuse in Authenticode Code Signing

Platon Kotzias, Srdjan Matic, Richard Rivera, Juan Caballero

Certified PUP: Abuse in Authenticode Code Signing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast Garbling of Circuits Under Standard Assumptions

Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas

Fast Garbling of Circuits Under Standard Assumptions

Details
Discussion Comments: 0
Verification: Authors have not verified information

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App

Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration

Soo-Jin Moon, Vyas Sekar, Michael K. Reiter

Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Location-restricted Services Access Control Leveraging Pinpoint Waveforming

Tao Wang, Yao Liu, Qingqi Pei, Tao Hou

Location-restricted Services Access Control Leveraging Pinpoint Waveforming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Program Analysis for Mobile Application Integrity and Privacy Enforcement

Marco Pistoia

Program Analysis for Mobile Application Integrity and Privacy Enforcement

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature

Manh Huynh, Phuc Nguyen, Marco Gruteser, Tam Vu

POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature

Details
Discussion Comments: 0
Verification: Authors have not verified information

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel

Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: WinOver Enterprise Dark Data

Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha

POSTER: WinOver Enterprise Dark Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated Synthesis of Optimized Circuits for Secure Computation

Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni

Automated Synthesis of Optimized Circuits for Secure Computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

GUITAR: Piecing Together Android App GUIs from Memory Images

Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu

GUITAR: Piecing Together Android App GUIs from Memory Images

Details
Discussion Comments: 0
Verification: Authors have not verified information

Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan

Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

Details
Author Comments: A systematic overview of program anomaly detection: Shu, Xiaokui, Danfeng Daphne Yao, and Barbara G. Ryder. "A formal framework for program anomaly detection." International Symposium on Recent Advances in Intrusion Detection. Springer International Publishing, 2015.
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content

John Holowczak, Amir Houmansadr

CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content

Details
Discussion Comments: 0
Verification: Authors have not verified information

LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code

Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu

LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy

Xing Liu, Wei Wang, Jiqiang Liu

POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Monte Carlo Strength Evaluation: Fast and Reliable Password Checking

Matteo Dell'Amico, Maurizio Filippone

Monte Carlo Strength Evaluation: Fast and Reliable Password Checking

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

An Empirical Study of Web Vulnerability Discovery Ecosystems

Mingyi Zhao, Jens Grossklags, Peng Liu

An Empirical Study of Web Vulnerability Discovery Ecosystems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity

Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity

Lihua Wang, Takuya Hayashi, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai

POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Lightweight Streaming Authenticated Data Structures

Chia-Mu Yu

POSTER: Lightweight Streaming Authenticated Data Structures

Details
Discussion Comments: 0
Verification: Author has not verified information

Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes

Joseph A. Akinyele, Christina Garman, Susan Hohenberger

Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timely Rerandomization for Mitigating Memory Disclosures

David Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi

Timely Rerandomization for Mitigating Memory Disclosures

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications

Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis

The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings

Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield

A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mitigating Storage Side Channels Using Statistical Privacy Mechanisms

Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang

Mitigating Storage Side Channels Using Statistical Privacy Mechanisms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Frequency-Hiding Order-Preserving Encryption

Florian Kerschbaum

Frequency-Hiding Order-Preserving Encryption

Details
Discussion Comments: 0
Verification: Author has not verified information

WPES 2015: The 14th Workshop on Privacy in the Electronic Society

Nicholas Hopper, Rob Jansen

WPES 2015: The 14th Workshop on Privacy in the Electronic Society

Details
Author Comments: This is a summary of the WPES workshop and not a research paper.
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)

Jorge Guajardo, Stefan Katzenbeisser

Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)

Details
Author Comments:
Discussion Comments: 0
Sharing: Publication does not represent original research
Verification: Authors have verified information

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content

Aggelos Kiayias, Qiang Tang

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content

Details
Discussion Comments: 0
Verification: Authors have not verified information

Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges

Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh

Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges

Details
Discussion Comments: 0
Verification: Authors have not verified information

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies

Florian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN

Zheng Wang

POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: A Logic Based Network Forensics Model for Evidence Analysis

Anoop Singhal, Changwei Liu, Duminda Wijesekera

POSTER: A Logic Based Network Forensics Model for Evidence Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity

Sven Schäge

TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity

Details
Discussion Comments: 0
Verification: Author has not verified information

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Page Table Manipulation Attack

JungSeung Lee, HyoungMin Ham, InHwan Kim, JooSeok Song

POSTER: Page Table Manipulation Attack

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson, Somesh Jha, Thomas Ristenpart

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication

Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang

Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices

Glenn Wurster, David Lie

SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Keynote Talk

Edward W. Felten

Keynote Talk

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Author has verified information

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Search Engine Backed by Internet-Wide Scanning

Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, J. Alex Halderman

A Search Engine Backed by Internet-Wide Scanning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Maneuvering Around Clouds: Bypassing Cloud-based Security Providers

Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis

Maneuvering Around Clouds: Bypassing Cloud-based Security Providers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Transparent Data Deduplication in the Cloud

Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef

Transparent Data Deduplication in the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Blackboard-Based Electronic Warfare System

Jeremy Straub

POSTER: Blackboard-Based Electronic Warfare System

Details
Discussion Comments: 0
Verification: Author has not verified information

AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications

Deguang Kong, Lei Cen, Hongxia Jin

AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

IntegriDB: Verifiable SQL for Outsourced Databases

Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou

IntegriDB: Verifiable SQL for Outsourced Databases

Details
Discussion Comments: 0
Verification: Authors have not verified information

CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks

Jonghyuk Song, Sangho Lee, Jong Kim

CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks

Details
Author Comments: We present a novel method to detect crowdturfing in OSNs.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins

Tim Ruffing, Aniket Kate, Dominique Schröder

Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Towards Automatic Generation of Security-Centric Descriptions for Android Apps

Mu Zhang, Yue Duan, Qian Feng, Heng Yin

Towards Automatic Generation of Security-Centric Descriptions for Android Apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Clean Application Compartmentalization with SOAAP

Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson

Clean Application Compartmentalization with SOAAP

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal Distributed Password Verification

Jan Camenisch, Anja Lehmann, Gregory Neven

Optimal Distributed Password Verification

Details
Discussion Comments: 0
Verification: Authors have not verified information

The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript

Pratik Soni, Enrico Budianto, Prateek Saxena

The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards

Carlo Meijer, Roel Verdult

Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards

Details
Discussion Comments: 0
Verification: Authors have not verified information

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)

Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence

Mathias Lécuyer, Riley Spahn, Yannis Spiliopolous, Augustin Chaintreau, Roxana Geambasu, Daniel J. Hsu

Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Symbolic Execution of Obfuscated Code

Babak Yadegari, Saumya Debray

Symbolic Execution of Obfuscated Code

Details
Discussion Comments: 0
Verification: Authors have not verified information

HORNET: High-speed Onion Routing at the Network Layer

Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig

HORNET: High-speed Onion Routing at the Network Layer

Details
Discussion Comments: 0
Verification: Authors have not verified information

From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?

Moti Yung

From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use

Depeng Li, Sachin Shetty

POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use

Details
Discussion Comments: 0
Verification: Authors have not verified information

Protecting Locations with Differential Privacy under Temporal Correlations

Yonghui Xiao, Li Xiong

Protecting Locations with Differential Privacy under Temporal Correlations

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Using Unit Testing to Detect Sanitization Flaws

Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford

POSTER: Using Unit Testing to Detect Sanitization Flaws

Details
Discussion Comments: 0
Verification: Authors have not verified information

From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting

Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns

From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Insecurity of Voice Solution VoLTE in LTE Mobile Networks

Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang

Insecurity of Voice Solution VoLTE in LTE Mobile Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

DEMO: Action Recommendation for Cyber Resilience

Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray

DEMO: Action Recommendation for Cyber Resilience

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics

Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security by Any Other Name: On the Effectiveness of Provider Based Email Security

Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko

Security by Any Other Name: On the Effectiveness of Provider Based Email Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications

John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith

POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Moat: Verifying Confidentiality of Enclave Programs

Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani

Moat: Verifying Confidentiality of Enclave Programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Drops for Stuff: An Analysis of Reshipping Mule Scams

Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna

Drops for Stuff: An Analysis of Reshipping Mule Scams

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Cross-Site Search Attacks

Nethanel Gelernter, Amir Herzberg

Cross-Site Search Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications

Oswaldo Olivo, Isil Dillig, Calvin Lin

Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deniable Key Exchanges for Secure Messaging

Nik Unger, Ian Goldberg

Deniable Key Exchanges for Secure Messaging

Details
Discussion Comments: 0
Verification: Authors have not verified information

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Olivier Pereira, François-Xavier Standaert, Srinivas Vivek

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated Symbolic Proofs of Observational Equivalence

David A. Basin, Jannik Dreier, Ralf Sasse

Automated Symbolic Proofs of Observational Equivalence

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

iRiS: Vetting Private API Abuse in iOS Applications

Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu

iRiS: Vetting Private API Abuse in iOS Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Android Root and its Providers: A Double-Edged Sword

Hang Zhang, Dongdong She, Zhiyun Qian

Android Root and its Providers: A Double-Edged Sword

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fraud Detection through Graph-Based User Behavior Modeling

Alex Beutel, Leman Akoglu, Christos Faloutsos

Fraud Detection through Graph-Based User Behavior Modeling

Details
Discussion Comments: 0
Verification: Authors have not verified information

CCFI: Cryptographically Enforced Control Flow Integrity

Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières

CCFI: Cryptographically Enforced Control Flow Integrity

Details
Discussion Comments: 0
Verification: Authors have not verified information

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions

Roshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions

Details
Discussion Comments: 0
Verification: Authors have not verified information

TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens

He Sun, Kun Sun, Yuewu Wang, Jiwu Jing

TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens

Details
Discussion Comments: 0
Verification: Authors have not verified information

Micropayments for Decentralized Currencies

Rafael Pass, Abhi Shelat

Micropayments for Decentralized Currencies

Details
Discussion Comments: 0
Verification: Authors have not verified information

MalGene: Automatic Extraction of Malware Analysis Evasion Signature

Dhilung Kirat, Giovanni Vigna

MalGene: Automatic Extraction of Malware Analysis Evasion Signature

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast Non-Malleable Commitments

Hai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald

Fast Non-Malleable Commitments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads

Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo

Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads

Details
Discussion Comments: 0
Verification: Authors have not verified information

White-Box Cryptography Revisited: Space-Hard Ciphers

Andrey Bogdanov, Takanori Isobe

White-Box Cryptography Revisited: Space-Hard Ciphers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations

Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky

POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice

Qian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

Per-Input Control-Flow Integrity

Ben Niu, Gang Tan

Per-Input Control-Flow Integrity

Details
Discussion Comments: 0
Verification: Authors have not verified information

SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense

Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman

SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense

Details
Discussion Comments: 0
Verification: Authors have not verified information

Leakage-Abuse Attacks Against Searchable Encryption

David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart

Leakage-Abuse Attacks Against Searchable Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security

Tomas Sander, Moti Yung

WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow

POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks

Mihir Bellare, Joseph Jaeger, Daniel Kane

Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward

Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward

Details
Discussion Comments: 0
Verification: Authors have not verified information

When Good Becomes Evil: Keystroke Inference with Smartwatch

Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang

When Good Becomes Evil: Keystroke Inference with Smartwatch

Details
Discussion Comments: 0
Verification: Authors have not verified information

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication

Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Clock is Still Ticking: Timing Attacks in the Modern Web

Tom van Goethem, Wouter Joosen, Nick Nikiforakis

The Clock is Still Ticking: Timing Attacks in the Modern Web

Details
Discussion Comments: 0
Verification: Authors have not verified information