Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang |
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Proximity Verification for Contactless Access Control and Authentication Systems Aanjhan Ranganathan, Boris Danev, Srdjan Capkun |
Proximity Verification for Contactless Access Control and Authentication Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MOSE: Live Migration Based On-the-Fly Software Emulation Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim |
MOSE: Live Migration Based On-the-Fly Software Emulation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
BareDroid: Large-Scale Analysis of Android Apps on Real Devices Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna |
BareDroid: Large-Scale Analysis of Android Apps on Real Devices Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies Maarten Decat, Bert Lagaisse, Wouter Joosen |
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Nethanel Gelernter, Yoel Grinstein, Amir Herzberg |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MorphDroid: Fine-grained Privacy Verification Pietro Ferrara, Omer Tripp, Marco Pistoia |
MorphDroid: Fine-grained Privacy Verification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi |
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli |
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Soteria: Offline Software Protection within Low-cost Embedded Devices Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede |
Soteria: Offline Software Protection within Low-cost Embedded Devices Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Defeating ROP Through Denial of Stack Pivot Aravind Prakash, Heng Yin |
Defeating ROP Through Denial of Stack Pivot Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases Simone Mutti, Enrico Bacis, Stefano Paraboschi |
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases Details |
Author Comments:
SQLite is the most widely deployed in-process library that implements a SQL database engine. It offers high storage efficiency, fast query operation and small memory needs. Due to the fact that a complete SQLite database is stored in a single cross-platform disk file and SQLite does not support multiple users, anyone who has direct access to the file can read the whole database content. SELinux was originally developed as a Mandatory Access Control (MAC) mechanism for Linux to demonstrate how to overcome DAC limitations. However, SELinux provides per-file protection, thus the database file is treated as an atomic unit, impeding the definition of a fine-grained mandatory access control (MAC) policy for database objects.
We introduce SeSQLite, an SQLite extension that integrates SELinux access controls into SQLite with minimal performance and storage overhead. SeSQLite implements labeling and access control at both schema level (for tables and columns) and row level. This permits the management of a fine-grained access policy for database objects. A prototype has been implemented and it has been used to improve the security of Android Content Providers.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A Principled Approach for ROP Defense Rui Qiao, Mingwei Zhang, R. Sekar |
A Principled Approach for ROP Defense Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ShrinkWrap: VTable Protection without Loose Ends István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos |
ShrinkWrap: VTable Protection without Loose Ends Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
PARS: A Uniform and Open-source Password Analysis and Research System Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah |
PARS: A Uniform and Open-source Password Analysis and Research System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Provenance-based Integrity Protection for Windows Wai-Kit Sze, R. Sekar |
Provenance-based Integrity Protection for Windows Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten |
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
JaTE: Transparent and Efficient JavaScript Confinement Tung Tran, Riccardo Pelizzi, R. Sekar |
JaTE: Transparent and Efficient JavaScript Confinement Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Adam J. Aviv, Devon Budzitowski, Ravi Kuber |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services Chen Cao, Neng Gao, Peng Liu, Ji Xiang |
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng |
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Logical Partitions on Many-Core Platforms Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun |
Logical Partitions on Many-Core Platforms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Security and Usability of Crypto Phones Maliheh Shirvanian, Nitesh Saxena |
On the Security and Usability of Crypto Phones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu |
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Vulnerability Assessment of OAuth Implementations in Android Applications Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu |
Vulnerability Assessment of OAuth Implementations in Android Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Handling Reboots and Mobility in 802.15.4 Security Konrad-Felix Krentz, Christoph Meinel |
Handling Reboots and Mobility in 802.15.4 Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Defending Against Malicious USB Firmware with GoodUSB Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler |
Defending Against Malicious USB Firmware with GoodUSB Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MobiPluto: File System Friendly Deniable Storage for Mobile Devices Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang |
MobiPluto: File System Friendly Deniable Storage for Mobile Devices Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis |
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Know Your Achilles' Heel: Automatic Detection of Network Critical Services Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel |
Know Your Achilles' Heel: Automatic Detection of Network Critical Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud |
Combining Differential Privacy and Secure Multiparty Computation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford |
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani |
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Visual Challenges to Verify the Integrity of Security Cameras Junia Valente, Alvaro A. Cárdenas |
Using Visual Challenges to Verify the Integrity of Security Cameras Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing Peter Mayer, Melanie Volkamer |
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Mingwei Zhang, R. Sekar |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Covert Botnet Command and Control Using Twitter Nick Pantic, Mohammad Iftekhar Husain |
Covert Botnet Command and Control Using Twitter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Proactive Security Analysis of Changes in Virtualized Infrastructures Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim |
Proactive Security Analysis of Changes in Virtualized Infrastructures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara |
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning Details |
|
Author Comments:
TBOMK we did not archive data, scripts, and results from our experiments.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Using Channel State Information for Tamper Detection in the Internet of Things Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick |
Using Channel State Information for Tamper Detection in the Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy-preserving Virtual Machine Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan |
Privacy-preserving Virtual Machine Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics Letitia W. Li, Guillaume Duc, Renaud Pacalet |
Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Evaluating the Flexibility of the Java Sandbox Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine |
Evaluating the Flexibility of the Java Sandbox Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Entity-Based Access Control: supporting more expressive access control policies Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen |
Entity-Based Access Control: supporting more expressive access control policies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato |
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PIE: Parser Identification in Embedded Systems Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti |
PIE: Parser Identification in Embedded Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|