ACM Computer and Communications Security, CCS 2014


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses

Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg

A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions

Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David M. Liebovitz, Bradley A. Malin

Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Fingerprinting the Publicly Available Sandboxes

Ke Liu, Shuai Lu, Chaoge Liu

POSTER: Fingerprinting the Publicly Available Sandboxes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Founding Digital Currency on Secure Computation

Karim El Defrawy, Joshua Lampkins

Founding Digital Currency on Secure Computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detection of On-Road Vehicles Emanating GPS Interference

Gorkem Kar, Hossen A. Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu

Detection of On-Road Vehicles Emanating GPS Interference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices

Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Private-by-Design Advertising Meets the Real World

Alexey Reznichenko, Paul Francis

Private-by-Design Advertising Meets the Real World

Details
Discussion Comments: 0
Verification: Authors have not verified information

PixelVault: Using GPUs for Securing Cryptographic Operations

Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis

PixelVault: Using GPUs for Securing Cryptographic Operations

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs

Asmaa Sallam, Elisa Bertino

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions

Yi Xu, Jan-Michael Frahm, Fabian Monrose

Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal Average-Complexity Ideal-Security Order-Preserving Encryption

Florian Kerschbaum, Axel Schröpfer

Optimal Average-Complexity Ideal-Security Order-Preserving Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mechanized Network Origin and Path Authenticity Proofs

Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig

Mechanized Network Origin and Path Authenticity Proofs

Details
Discussion Comments: 0
Verification: Authors have not verified information

SCORAM: Oblivious RAM for Secure Computation

Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi

SCORAM: Oblivious RAM for Secure Computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Proactive Blacklist Update for Anti-Phishing

Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng

POSTER: Proactive Blacklist Update for Anti-Phishing

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Epidemiological Study of Malware Encounters in a Large Enterprise

Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels

An Epidemiological Study of Malware Encounters in a Large Enterprise

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deanonymisation of Clients in Bitcoin P2P Network

Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov

Deanonymisation of Clients in Bitcoin P2P Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

S3: A Symbolic String Solver for Vulnerability Detection in Web Applications

Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar

S3: A Symbolic String Solver for Vulnerability Detection in Web Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fail-Secure Access Control

Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin

Fail-Secure Access Control

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Last Mile: An Empirical Study of Timing Channels on seL4

David Cock, Qian Ge, Toby C. Murray, Gernot Heiser

The Last Mile: An Empirical Study of Timing Channels on seL4

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation

Xing Jin, Xuchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri

Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy Beyond Confidentiality

Christopher W. Clifton

Privacy Beyond Confidentiality

Details
Discussion Comments: 0
Verification: Author has not verified information

A Computationally Complete Symbolic Attacker for Equivalence Properties

Gergei Bana, Hubert Comon-Lundh

A Computationally Complete Symbolic Attacker for Equivalence Properties

Details
Discussion Comments: 0
Verification: Authors have not verified information

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response

Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response

Details
Discussion Comments: 0
Verification: Authors have not verified information

On The Security of Mobile Cockpit Information Systems

Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko

On The Security of Mobile Cockpit Information Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

PoliCert: Secure and Flexible TLS Certificate Management

Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig

PoliCert: Secure and Flexible TLS Certificate Management

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks

Lei Jin, Balaji Palanisamy, James B. D. Joshi

POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems

Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin Heaslip

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption

Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo

POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security Vulnerability in Processor-Interconnect Router Design

WonJun Song, John Kim, Jae W. Lee, Dennis Abts

Security Vulnerability in Processor-Interconnect Router Design

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan

Mitsuhiro Hatada, Masato Terada, Tatsuya Mori

POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan

Details
Discussion Comments: 0
Verification: Authors have not verified information

AutoCog: Measuring the Description-to-permission Fidelity in Android Applications

Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen

AutoCog: Measuring the Description-to-permission Fidelity in Android Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Location Privacy Protection for Smartphone Users

Kassem Fawaz, Kang G. Shin

Location Privacy Protection for Smartphone Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deniable Liaisons

Abhinav Narain, Nick Feamster, Alex C. Snoeren

Deniable Liaisons

Details
Discussion Comments: 0
Verification: Authors have not verified information

Integrity, Consistency, and Verification of Remote Computation

Christian Cachin

Integrity, Consistency, and Verification of Remote Computation

Details
Discussion Comments: 0
Verification: Author has not verified information

Toward Robust Hidden Volumes Using Write-Only Oblivious RAM

Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu

Toward Robust Hidden Volumes Using Write-Only Oblivious RAM

Details
Discussion Comments: 0
Verification: Authors have not verified information

Uncovering Large Groups of Active Malicious Accounts in Online Social Networks

Qiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow

Uncovering Large Groups of Active Malicious Accounts in Online Social Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Moving Targets: Security and Rapid-Release in Firefox

Sandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith

Moving Targets: Security and Rapid-Release in Firefox

Details
Discussion Comments: 0
Verification: Authors have not verified information

System-level Non-interference for Constant-time Cryptography

Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie

System-level Non-interference for Constant-time Cryptography

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Study of Software Plugin-based Malware

Yu Liang, Zhiqiao Li, Xiang Cui

POSTER: Study of Software Plugin-based Malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting

Dong Li, Fangjiao Zhang, Chaoge Liu

POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: AdHoneyDroid - Capture Malicious Android Advertisements

Dongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han

POSTER: AdHoneyDroid - Capture Malicious Android Advertisements

Details
Discussion Comments: 0
Verification: Authors have not verified information

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks

Tariq Elahi, George Danezis, Ian Goldberg

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid

Mark S. Dittmer, Mahesh V. Tripunitara

The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization

Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang

POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Demo Overview: Privacy-Enhancing Features of IdentiDroid

Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino

Demo Overview: Privacy-Enhancing Features of IdentiDroid

Details
Discussion Comments: 0
Verification: Authors have not verified information

Structural Data De-anonymization: Quantification, Practice, and Implications

Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah

Structural Data De-anonymization: Quantification, Practice, and Implications

Details
Discussion Comments: 0
Verification: Authors have not verified information

WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security

Tomas Sander

WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security

Details
Discussion Comments: 0
Verification: Author has not verified information

Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps

Fengguo Wei, Sankardas Roy, Xinming Ou, Robby

Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are You Ready to Lock?

Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner

Are You Ready to Lock?

Details
Discussion Comments: 0
Verification: Authors have not verified information

ALITHEIA: Towards Practical Verifiable Graph Processing

Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz

ALITHEIA: Towards Practical Verifiable Graph Processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services

Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification

Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang

POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel

Anil Kurmus, Robby Zippel

A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Password Entering and Transmission Security

Gamze Canova, Melanie Volkamer, Simon Weiler

POSTER: Password Entering and Transmission Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Positioning Attack on Proximity-Based People Discovery

Huan Feng, Kang G. Shin

POSTER: Positioning Attack on Proximity-Based People Discovery

Details
Discussion Comments: 0
Verification: Authors have not verified information

Collaborative Verification of Information Flow for a High-Assurance App Store

Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu

Collaborative Verification of Information Flow for a High-Assurance App Store

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exciting Security Research Opportunity: Next-generation Internet

Adrian Perrig

Exciting Security Research Opportunity: Next-generation Internet

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: LocMask: A Location Privacy Protection Framework in Android System

Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren

POSTER: LocMask: A Location Privacy Protection Framework in Android System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Securing SSL Certificate Verification through Dynamic Linking

Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi

Securing SSL Certificate Verification through Dynamic Linking

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords

Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords

Details
Discussion Comments: 0
Verification: Authors have not verified information

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficiently Verifiable Computation on Encrypted Data

Dario Fiore, Rosario Gennaro, Valerio Pastro

Efficiently Verifiable Computation on Encrypted Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results

Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers

Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith

Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP

Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang

POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Enhancing Security and Privacy with Google Glass

Johannes Krupp, Dominique Schröder, Mark Simkin

POSTER: Enhancing Security and Privacy with Google Glass

Details
Discussion Comments: 0
Verification: Authors have not verified information

Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code

Jeff Seibert, Hamed Okkhravi, Eric Söderström

Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Formatted Encryption Beyond Regular Languages

Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha

Formatted Encryption Beyond Regular Languages

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data

Yu Zhang, Songfeng Lu

POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Consequences of Connectivity: Characterizing Account Hijacking on Twitter

Kurt Thomas, Frank Li, Chris Grier, Vern Paxson

Consequences of Connectivity: Characterizing Account Hijacking on Twitter

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code Reuse Attacks in PHP: Automated POP Chain Generation

Johannes Dahse, Nikolai Krein, Thorsten Holz

Code Reuse Attacks in PHP: Automated POP Chain Generation

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Verifying Curve25519 Software

Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang

Verifying Curve25519 Software

Details
Discussion Comments: 0
Verification: Authors have not verified information

Second Smart Energy Grid Security Workshop (SEGS 2014)

Klaus Kursawe, Benessa Defend

Second Smart Energy Grid Security Workshop (SEGS 2014)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals

Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption

Fuchun Guo, Willy Susilo, Yi Mu

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

A New Additive Homomorphic Encryption based on the co-ACD Problem

Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo

A New Additive Homomorphic Encryption based on the co-ACD Problem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fully Secure and Fast Signing from Obfuscation

Kim Ramchen, Brent Waters

Fully Secure and Fast Signing from Obfuscation

Details
Discussion Comments: 0
Verification: Authors have not verified information

DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans

Jie Zhang, Feng Yuan, Qiang Xu

DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans

Details
Discussion Comments: 0
Verification: Authors have not verified information

WPES 2014: 13th Workshop on Privacy in the Electronic Society

Gail-Joon Ahn, Anupam Datta

WPES 2014: 13th Workshop on Privacy in the Electronic Society

Details
Discussion Comments: 0
Verification: Authors have not verified information

RevCast: Fast, Private Certificate Revocation over FM Radio

Aaron Schulman, Dave Levin, Neil Spring

RevCast: Fast, Private Certificate Revocation over FM Radio

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical UC security with a Global Random Oracle

Ran Canetti, Abhishek Jain, Alessandra Scafuro

Practical UC security with a Global Random Oracle

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security Analysis of the Estonian Internet Voting System

Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman

Security Analysis of the Estonian Internet Voting System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rosemary: A Robust, Secure, and High-performance Network Operating System

Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang

Rosemary: A Robust, Secure, and High-performance Network Operating System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tutorial: Text Analytics for Security

William Enck, Tao Xie

Tutorial: Text Analytics for Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

VoIP Fraud: Identifying a Wolf in Sheep's Clothing

Hemant Sengar

VoIP Fraud: Identifying a Wolf in Sheep's Clothing

Details
Discussion Comments: 0
Verification: Author has not verified information

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis

Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: How Distributed Are Today's DDoS Attacks?

An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen

POSTER: How Distributed Are Today's DDoS Attacks?

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering

Hongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Yong Wang

POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Client-Controlled Cloud Encryption

Florian Kerschbaum

Client-Controlled Cloud Encryption

Details
Discussion Comments: 0
Verification: Author has not verified information

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising

Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: TLS Proxies: Friend or Foe?

Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala

POSTER: TLS Proxies: Friend or Foe?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components

Anupam Das, Nikita Borisov, Matthew Caesar

Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies

Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe

POSTER: Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs

Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao

Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: On the Capability of DNS Cache Poisoning Attacks

Zheng Wang

POSTER: On the Capability of DNS Cache Poisoning Attacks

Details
Discussion Comments: 0
Verification: Author has not verified information

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World

Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World

Details
Discussion Comments: 0
Verification: Authors have not verified information

Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein

Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal Geo-Indistinguishable Mechanisms for Location Privacy

Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi

Optimal Geo-Indistinguishable Mechanisms for Location Privacy

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

World-Driven Access Control for Continuous Sensing

Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang

World-Driven Access Control for Continuous Sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol

Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila

Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

Outsourced Proofs of Retrievability

Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter

Outsourced Proofs of Retrievability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Taking Authenticated Range Queries to Arbitrary Dimensions

Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos

Taking Authenticated Range Queries to Arbitrary Dimensions

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning

Nektarios Leontiadis, Tyler Moore, Nicolas Christin

A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation

Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Community-Enhanced De-anonymization of Online Social Networks

Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn

Community-Enhanced De-anonymization of Online Social Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN

Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel

Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN

Details
Discussion Comments: 0
Verification: Authors have not verified information

Controlled Functional Encryption

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter

Controlled Functional Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation

Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beware, Your Hands Reveal Your Secrets!

Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha

Beware, Your Hands Reveal Your Secrets!

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: An E2E Trusted Cloud Infrastructure

Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu

POSTER: An E2E Trusted Cloud Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juárez, Arvind Narayanan, Claudia Díaz

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation

Ehab Al-Shaer, Krishna Kant

Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering

Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner

Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation

Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone

A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection

Lorenzo De Carli, Robin Sommer, Somesh Jha

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Context-free Attacks Using Keyboard Acoustic Emanations

Tong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu

Context-free Attacks Using Keyboard Acoustic Emanations

Details
Discussion Comments: 0
Verification: Authors have not verified information

ShadowCrypt: Encrypted Web Applications for Everyone

Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song

ShadowCrypt: Encrypted Web Applications for Everyone

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Synthesis of Fault Attacks on Cryptographic Implementations

Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz

Synthesis of Fault Attacks on Cryptographic Implementations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cross-Tenant Side-Channel Attacks in PaaS Clouds

Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart

Cross-Tenant Side-Channel Attacks in PaaS Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi

(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: When and How to Implicitly Authenticate Smartphone Users

Aaron Atwater, Hassan Khan, Urs Hengartner

POSTER: When and How to Implicitly Authenticate Smartphone Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities

Jiayi Ye, Chao Zhang, Xinhui Han

POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications

Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan

MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Analyzing Access Control Policies with SMT

Fatih Turkmen, Jerry den Hartog, Nicola Zannone

POSTER: Analyzing Access Control Policies with SMT

Details
Discussion Comments: 0
Verification: Authors have not verified information

Algebraic MACs and Keyed-Verification Anonymous Credentials

Melissa Chase, Sarah Meiklejohn, Greg Zaverucha

Algebraic MACs and Keyed-Verification Anonymous Credentials

Details
Discussion Comments: 0
Verification: Authors have not verified information

Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging

Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu

Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing Large-Scale Click Fraud in ZeroAccess

Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker

Characterizing Large-Scale Click Fraud in ZeroAccess

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework

Zhenbang Liu, Hengming Zou

POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

Searchable Encryption with Secure and Efficient Updates

Florian Hahn, Florian Kerschbaum

Searchable Encryption with Secure and Efficient Updates

Details
Discussion Comments: 0
Verification: Authors have not verified information

Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks

Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin

Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: A Measurement Framework to Quantify Software Protections

Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens

POSTER: A Measurement Framework to Quantify Software Protections

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System

Ke Li, Chaoge Liu, Xiang Cui

POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System

Details
Discussion Comments: 0
Verification: Authors have not verified information

ATRA: Address Translation Redirection Attack against Hardware-based External Monitors

DaeHee Jang, Hojoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang

ATRA: Address Translation Redirection Attack against Hardware-based External Monitors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automating Information Flow Analysis of Low Level Code

Musard Balliu, Mads Dam, Roberto Guanciale

Automating Information Flow Analysis of Low Level Code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quantifying Web-Search Privacy

Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders

Quantifying Web-Search Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

OAuth Demystified for Mobile Application Developers

Eric Y. Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague

OAuth Demystified for Mobile Application Developers

Details
Discussion Comments: 0
Verification: Authors have not verified information

MTD 2014: First ACM Workshop on Moving Target Defense

Sushil Jajodia, Kun Sun

MTD 2014: First ACM Workshop on Moving Target Defense

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Quasi-ID: In fact, I am a human

Milivoj Simeonovski

POSTER: Quasi-ID: In fact, I am a human

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: On the Resilience of DNS Infrastructure

Haya Shulman, Shiran Ezra

POSTER: On the Resilience of DNS Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

A11y Attacks: Exploiting Accessibility in Operating Systems

Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee

A11y Attacks: Exploiting Accessibility in Operating Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces

Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms

ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol

Marc Fischlin, Felix Günther

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)

Frederik Armknecht, Jorge Guajardo

Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: A Hybrid Botnet Ecological Environment

Dai Yumei, Liang Yu, Li Ke

POSTER: A Hybrid Botnet Ecological Environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security Analyses of Click-based Graphical Passwords via Image Point Memorability

Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang

Security Analyses of Click-based Graphical Passwords via Image Point Memorability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

Details
Discussion Comments: 0
Verification: Authors have not verified information

ARPKI: Attack Resilient Public-Key Infrastructure

David A. Basin, Cas J. F. Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski

ARPKI: Attack Resilient Public-Key Infrastructure

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

CCSW 2014: Sixth ACM Cloud Computing Security Workshop

Alina Oprea, Reihaneh Safavi-Naini

CCSW 2014: Sixth ACM Cloud Computing Security Workshop

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterization of Real-Life PRNGs under Partial State Corruption

Mario Cornejo, Sylvain Ruhault

Characterization of Real-Life PRNGs under Partial State Corruption

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Android System Broadcast Actions Broadcasts Your Privacy

Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah

POSTER: Android System Broadcast Actions Broadcasts Your Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing Obfuscation: Avoiding Barrington's Theorem

Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai

Optimizing Obfuscation: Avoiding Barrington's Theorem

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Misuseablity Analysis for IT Infrastructure

Asaf Shabtai, Yuval Elovici

POSTER: Misuseablity Analysis for IT Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

SIW 2014: First Workshop on Security Information Workers

Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle

SIW 2014: First Workshop on Security Information Workers

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine

Jie Lin, Chuanyi Liu, Binxing Fang

POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine

Details
Discussion Comments: 0
Verification: Authors have not verified information

CCS'14 Co-Located Workshop Summary for SPSM 2014

Kapil Singh, Zhenkai Liang

CCS'14 Co-Located Workshop Summary for SPSM 2014

Details
Discussion Comments: 0
Verification: Authors have not verified information

VerSum: Verifiable Computations over Large Public Logs

Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich

VerSum: Verifiable Computations over Large Public Logs

Details
Discussion Comments: 0
Verification: Authors have not verified information

How to Use Bitcoin to Incentivize Correct Computations

Ranjit Kumaresan, Iddo Bentov

How to Use Bitcoin to Incentivize Correct Computations

Details
Discussion Comments: 0
Verification: Authors have not verified information

ALETHEIA: Improving the Usability of Static Security Analysis

Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Y. Aravkin

ALETHEIA: Improving the Usability of Static Security Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Blind Recognition of Touched Keys on Mobile Devices

Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao

Blind Recognition of Touched Keys on Mobile Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity

Ben Niu, Gang Tan

RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity

Details
Discussion Comments: 0
Verification: Authors have not verified information

ARMlock: Hardware-based Fault Isolation for ARM

Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang

ARMlock: Hardware-based Fault Isolation for ARM

Details
Discussion Comments: 0
Verification: Authors have not verified information

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones

Maliheh Shirvanian, Nitesh Saxena

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Critical Evaluation of Website Fingerprinting Attacks

Marc Juárez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt

A Critical Evaluation of Website Fingerprinting Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Blind Transmitter Authentication for Spectrum Security and Enforcement

Vireshwar Kumar, Jung-Min Park, Kaigui Bian

Blind Transmitter Authentication for Spectrum Security and Enforcement

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound

Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound

Details
Discussion Comments: 0
Verification: Authors have not verified information

Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures

Min Suk Kang, Virgil D. Gligor

Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Oblivious Data Structures

Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang

Oblivious Data Structures

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs

Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, Chung-Tsai Su

POSTER: Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dialing Back Abuse on Phone Verified Accounts

Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy

Dialing Back Abuse on Phone Verified Accounts

Details
Discussion Comments: 0
Verification: Authors have not verified information