Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
A multi-cloud based privacy-preserving data publishing scheme for the internet of things Lei Yang, Abdulmalik Humayed, Fengjun Li |
A multi-cloud based privacy-preserving data publishing scheme for the internet of things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Life-experience passwords (LEPs) Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic |
Life-experience passwords (LEPs) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan |
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ELAR: extremely lightweight auditing and repairing for cloud security Tran Phuong Thao, Kazumasa Omote |
ELAR: extremely lightweight auditing and repairing for cloud security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reliably determining data leakage in the presence of strong attackers Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel |
Reliably determining data leakage in the presence of strong attackers Details |
|
Author Comments:
The dataset we used for the results in 8.2 contained sensitive information, therefore we cannot share it. The code is not available anymore, however it was a script implementing the formula discussed in Section 7.3.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Mark R. Beaumont, Jim McCarthy, Toby C. Murray |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ShieldFS: a self-healing, ransomware-aware filesystem Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi |
ShieldFS: a self-healing, ransomware-aware filesystem Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
RevProbe: detecting silent reverse proxies in malicious server infrastructures Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero |
RevProbe: detecting silent reverse proxies in malicious server infrastructures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu |
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
HERCULE: attack story reconstruction via community discovery on correlated log graph Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu |
HERCULE: attack story reconstruction via community discovery on correlated log graph Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Catching predators at watering holes: finding and understanding strategically compromised websites Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li |
Catching predators at watering holes: finding and understanding strategically compromised websites Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
You can promote, but you can't hide: large-scale abused app detection in mobile app stores Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang |
You can promote, but you can't hide: large-scale abused app detection in mobile app stores Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Code obfuscation against symbolic execution attacks Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner |
Code obfuscation against symbolic execution attacks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Trace-free memory data structure forensics via past inference and future speculations Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz |
Trace-free memory data structure forensics via past inference and future speculations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CPAC: securing critical infrastructure with cyber-physical access control Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler |
CPAC: securing critical infrastructure with cyber-physical access control Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Swords and shields: a study of mobile game hacks and existing defenses Yuan Tian, Eric Y. Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague |
Swords and shields: a study of mobile game hacks and existing defenses Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EvilCoder: automated bug insertion Jannik Pewny, Thorsten Holz |
EvilCoder: automated bug insertion Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios Nicholas Chang-Fong, Aleksander Essex |
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VulPecker: an automated vulnerability detection system based on code similarity analysis Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu |
VulPecker: an automated vulnerability detection system based on code similarity analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VTPin: practical VTable hijacking protection for binaries Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos |
VTPin: practical VTable hijacking protection for binaries Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Multi-receiver GPS spoofing detection: error models and realization Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper |
Multi-receiver GPS spoofing detection: error models and realization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Timing-based reconnaissance and defense in software-defined networks John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller |
Timing-based reconnaissance and defense in software-defined networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Device fingerprinting for augmenting web authentication: classification and analysis of methods Furkan Alaca, Paul C. van Oorschot |
Device fingerprinting for augmenting web authentication: classification and analysis of methods Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FASE: functionality-aware security enforcement Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara |
FASE: functionality-aware security enforcement Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CASTLE: CA signing in a touch-less environment Stephanos Matsumoto, Samuel Steffen, Adrian Perrig |
CASTLE: CA signing in a touch-less environment Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Location-enhanced authentication using the IoT: because you cannot be in two places at once Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis |
Location-enhanced authentication using the IoT: because you cannot be in two places at once Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Intelligent, automated red team emulation Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf |
Intelligent, automated red team emulation Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Bootstrapping and maintaining trust in the cloud Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd |
Bootstrapping and maintaining trust in the cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CoKey: fast token-based cooperative cryptography Julian Horsch, Sascha Wessel, Claudia Eckert |
CoKey: fast token-based cooperative cryptography Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptive encrypted traffic fingerprinting with bi-directional dependence Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani M. Thuraisingham |
Adaptive encrypted traffic fingerprinting with bi-directional dependence Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using image saliency and regions of interest to encourage stronger graphical passwords Mohammad N. AlShehri, Heather Crawford |
Using image saliency and regions of interest to encourage stronger graphical passwords Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Formal security analysis of smart embedded systems Farid Molazem Tabrizi, Karthik Pattabiraman |
Formal security analysis of smart embedded systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A security analysis of automated chinese turing tests Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan |
A security analysis of automated chinese turing tests Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media Bo Chen, Shijie Jia, Luning Xia, Peng Liu |
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games Manar Mohamed, Nitesh Saxena |
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Amplifying side channels through performance degradation Thomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, Yuval Yarom |
Amplifying side channels through performance degradation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Auror: defending against poisoning attacks in collaborative deep learning systems Shiqi Shen, Shruti Tople, Prateek Saxena |
Auror: defending against poisoning attacks in collaborative deep learning systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inferring browser activity and status through remote monitoring of storage usage Hyungsub Kim, Sangho Lee, Jong Kim |
Inferring browser activity and status through remote monitoring of storage usage Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Spicy: a unified deep packet inspection framework for safely dissecting all your data Robin Sommer, Johanna Amann, Seth Hall |
Spicy: a unified deep packet inspection framework for safely dissecting all your data Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Pileus: protecting user resources from vulnerable cloud services Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger |
Pileus: protecting user resources from vulnerable cloud services Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar |
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cypider: building community-based cyber-defense infrastructure for android malware detection ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb |
Cypider: building community-based cyber-defense infrastructure for android malware detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decomposition of MAC address structure for granular device inference Jeremy Martin, Erik C. Rye, Robert Beverly |
Decomposition of MAC address structure for granular device inference Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Thang Hoang, Attila Altay Yavuz, Jorge Guajardo |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
LMP: light-weighted memory protection with hardware assistance Wei Huang, Zhen Huang, Dhaval Miyani, David Lie |
LMP: light-weighted memory protection with hardware assistance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding and defending the binder attack surface in Android Huan Feng, Kang G. Shin |
Understanding and defending the binder attack surface in Android Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|