Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis |
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Observing and Preventing Leakage in MapReduce Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, Divya Sharma |
Observing and Preventing Leakage in MapReduce Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Surpass: System-initiated User-replaceable Passwords Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan |
Surpass: System-initiated User-replaceable Passwords Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tampering with the Delivery of Blocks and Transactions in Bitcoin Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun |
Tampering with the Delivery of Blocks and Transactions in Bitcoin Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Seeing through Network-Protocol Obfuscation Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton |
Seeing through Network-Protocol Obfuscation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee |
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Fabian van den Broek, Roel Verdult, Joeri de Ruiter |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web Daniel Fett, Ralf Küsters, Guido Schmitz |
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager, Jörg Schwenk, Juraj Somorovsky |
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Exploiting Temporal Dynamics in Sybil Defenses Changchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal |
Exploiting Temporal Dynamics in Sybil Defenses Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities Tianyue Luo, Chen Ni, Qing Han, Mutian Yang, JingZheng Wu, Yanjun Wu |
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inference Attacks on Property-Preserving Encrypted Databases Muhammad Naveed, Seny Kamara, Charles V. Wright |
Inference Attacks on Property-Preserving Encrypted Databases Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu, N. Asokan, Benny Pinkas |
Secure Deduplication of Encrypted Data without Additional Independent Servers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Trusted Display on Untrusted Commodity Platforms Miao Yu, Virgil D. Gligor, Zongwei Zhou |
Trusted Display on Untrusted Commodity Platforms Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Privacy-Preserving Deep Learning Reza Shokri, Vitaly Shmatikov |
Privacy-Preserving Deep Learning Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
JingZheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz |
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia |
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han |
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
MTD 2015: Second ACM Workshop on Moving Target Defense George Cybenko, Dijiang Huang |
MTD 2015: Second ACM Workshop on Moving Target Defense Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou |
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated Proofs of Pairing-Based Cryptography Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt |
Automated Proofs of Pairing-Based Cryptography Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites Samuel Jackson, Scott Kerlin, Jeremy Straub |
POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li |
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Fast and Secure Three-party Computation: The Garbled Circuit Approach Payman Mohassel, Mike Rosulek, Ye Zhang |
Fast and Secure Three-party Computation: The Garbled Circuit Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance Xiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu |
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch |
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries Yehuda Lindell, Ben Riva |
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith |
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How to Use Bitcoin to Play Decentralized Poker Ranjit Kumaresan, Tal Moran, Iddo Bentov |
How to Use Bitcoin to Play Decentralized Poker Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Dario Catalano, Dario Fiore |
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu |
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada |
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CCSW 2015: The 7th ACM Cloud Computing Security Workshop Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray |
CCSW 2015: The 7th ACM Cloud Computing Security Workshop Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Constant Communication ORAM with Small Blocksize Tarik Moataz, Travis Mayberry, Erik-Oliver Blass |
Constant Communication ORAM with Small Blocksize Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron, Yehuda Lindell |
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions Guillaume Bonfante, José M. Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry |
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound Xiao Wang, T.-H. Hubert Chan, Elaine Shi |
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GRECS: Graph Encryption for Approximate Shortest Distance Queries Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios |
GRECS: Graph Encryption for Approximate Shortest Distance Queries Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated Analysis and Synthesis of Authenticated Encryption Schemes Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff |
Automated Analysis and Synthesis of Authenticated Encryption Schemes Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Demystifying Incentives in the Consensus Computer Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena |
Demystifying Incentives in the Consensus Computer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar |
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks Yasser Shoukry, Paul Martin, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava |
PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inlined Information Flow Monitoring for JavaScript Andrey Chudnov, David A. Naumann |
Inlined Information Flow Monitoring for JavaScript Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Subversion-Resilient Signature Schemes Giuseppe Ateniese, Bernardo Magri, Daniele Venturi |
Subversion-Resilient Signature Schemes Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Face/Off: Preventing Privacy Leakage From Photos in Social Networks Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis |
Face/Off: Preventing Privacy Leakage From Photos in Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations Fengjun Li, Xin Fu, Bo Luo |
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
(Un)linkable Pseudonyms for Governmental Databases Jan Camenisch, Anja Lehmann |
(Un)linkable Pseudonyms for Governmental Databases Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Dynamic Labelling for Analyzing Security Protocols N. V. Narendra Kumar, R. K. Shyamasundar |
POSTER: Dynamic Labelling for Analyzing Security Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi |
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols Peeter Laud, Jaak Randmets |
A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Introduction to Cryptocurrencies Stefan Dziembowski |
Introduction to Cryptocurrencies Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
POSTER: A Password-based Authentication by Splitting Roles of User Interface JungSeung Lee, Han Park, GyeongYong Bang, JooSeok Song |
POSTER: A Password-based Authentication by Splitting Roles of User Interface Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace |
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Context-Sensitive CFI Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida |
Practical Context-Sensitive CFI Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: Computations on Encrypted Data in the Internet of Things Applications Laurynas Riliskis, Hossein Shafagh, Philip Levis |
POSTER: Computations on Encrypted Data in the Internet of Things Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
UCognito: Private Browsing without Tears Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee |
UCognito: Private Browsing without Tears Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Authenticating Privately over Public Wi-Fi Hotspots Aldo Cassola, Erik-Oliver Blass, Guevara Noubir |
Authenticating Privately over Public Wi-Fi Hotspots Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila |
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha |
Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SEDA: Scalable Embedded Device Attestation N. Asokan, Franz Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann |
SEDA: Scalable Embedded Device Attestation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services Srdjan Matic, Platon Kotzias, Juan Caballero |
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang |
DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Lattice Basis Reduction Attack against Physically Unclonable Functions Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik |
Lattice Basis Reduction Attack against Physically Unclonable Functions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MIST 2015: 7th International Workshop on Managing Insider Security Threats Ilsun You, Elisa Bertino |
MIST 2015: 7th International Workshop on Managing Insider Security Threats Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han |
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang |
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Certified PUP: Abuse in Authenticode Code Signing Platon Kotzias, Srdjan Matic, Richard Rivera, Juan Caballero |
Certified PUP: Abuse in Authenticode Code Signing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fast Garbling of Circuits Under Standard Assumptions Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas |
Fast Garbling of Circuits Under Standard Assumptions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu |
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration Soo-Jin Moon, Vyas Sekar, Michael K. Reiter |
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Location-restricted Services Access Control Leveraging Pinpoint Waveforming Tao Wang, Yao Liu, Qingqi Pei, Tao Hou |
Location-restricted Services Access Control Leveraging Pinpoint Waveforming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Program Analysis for Mobile Application Integrity and Privacy Enforcement Marco Pistoia |
Program Analysis for Mobile Application Integrity and Privacy Enforcement Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature Manh Huynh, Phuc Nguyen, Marco Gruteser, Tam Vu |
POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu |
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: WinOver Enterprise Dark Data Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha |
POSTER: WinOver Enterprise Dark Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated Synthesis of Optimized Circuits for Secure Computation Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni |
Automated Synthesis of Optimized Circuits for Secure Computation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
GUITAR: Piecing Together Android App GUIs from Memory Images Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu |
GUITAR: Piecing Together Android App GUIs from Memory Images Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan |
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths Details |
|
Author Comments:
A systematic overview of program anomaly detection: Shu, Xiaokui, Danfeng Daphne Yao, and Barbara G. Ryder. "A formal framework for program anomaly detection." International Symposium on Recent Advances in Intrusion Detection. Springer International Publishing, 2015.
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content John Holowczak, Amir Houmansadr |
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu |
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy Xing Liu, Wei Wang, Jiqiang Liu |
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking Matteo Dell'Amico, Maurizio Filippone |
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
An Empirical Study of Web Vulnerability Discovery Ecosystems Mingyi Zhao, Jens Grossklags, Peng Liu |
An Empirical Study of Web Vulnerability Discovery Ecosystems Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos |
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lihua Wang, Takuya Hayashi, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Lightweight Streaming Authenticated Data Structures Chia-Mu Yu |
POSTER: Lightweight Streaming Authenticated Data Structures Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes Joseph A. Akinyele, Christina Garman, Susan Hohenberger |
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Timely Rerandomization for Mitigating Memory Disclosures David Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi |
Timely Rerandomization for Mitigating Memory Disclosures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis |
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield |
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang |
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Frequency-Hiding Order-Preserving Encryption Florian Kerschbaum |
Frequency-Hiding Order-Preserving Encryption Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
WPES 2015: The 14th Workshop on Privacy in the Electronic Society Nicholas Hopper, Rob Jansen |
WPES 2015: The 14th Workshop on Privacy in the Electronic Society Details |
|
Author Comments:
This is a summary of the WPES workshop and not a research paper.
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015) Jorge Guajardo, Stefan Katzenbeisser |
Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015) Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Publication does not represent original research
Verification:
Authors have
verified
information
|
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content Aggelos Kiayias, Qiang Tang |
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh |
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Florian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN Zheng Wang |
POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
POSTER: A Logic Based Network Forensics Model for Evidence Analysis Anoop Singhal, Changwei Liu, Duminda Wijesekera |
POSTER: A Logic Based Network Forensics Model for Evidence Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity Sven Schäge |
TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Page Table Manipulation Attack JungSeung Lee, HyoungMin Ham, InHwan Kim, JooSeok Song |
POSTER: Page Table Manipulation Attack Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures Matt Fredrikson, Somesh Jha, Thomas Ristenpart |
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices Glenn Wurster, David Lie |
SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Edward W. Felten |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Author has
verified
information
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A Search Engine Backed by Internet-Wide Scanning Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, J. Alex Halderman |
A Search Engine Backed by Internet-Wide Scanning Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis |
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Transparent Data Deduplication in the Cloud Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef |
Transparent Data Deduplication in the Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Blackboard-Based Electronic Warfare System Jeremy Straub |
POSTER: Blackboard-Based Electronic Warfare System Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications Deguang Kong, Lei Cen, Hongxia Jin |
AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
IntegriDB: Verifiable SQL for Outsourced Databases Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou |
IntegriDB: Verifiable SQL for Outsourced Databases Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks Jonghyuk Song, Sangho Lee, Jong Kim |
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks Details |
|
Author Comments:
We present a novel method to detect crowdturfing in OSNs.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins Tim Ruffing, Aniket Kate, Dominique Schröder |
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Towards Automatic Generation of Security-Centric Descriptions for Android Apps Mu Zhang, Yue Duan, Qian Feng, Heng Yin |
Towards Automatic Generation of Security-Centric Descriptions for Android Apps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Clean Application Compartmentalization with SOAAP Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson |
Clean Application Compartmentalization with SOAAP Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimal Distributed Password Verification Jan Camenisch, Anja Lehmann, Gregory Neven |
Optimal Distributed Password Verification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript Pratik Soni, Enrico Budianto, Prateek Saxena |
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards Carlo Meijer, Roel Verdult |
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos |
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence Mathias Lécuyer, Riley Spahn, Yannis Spiliopolous, Augustin Chaintreau, Roxana Geambasu, Daniel J. Hsu |
Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Symbolic Execution of Obfuscated Code Babak Yadegari, Saumya Debray |
Symbolic Execution of Obfuscated Code Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
HORNET: High-speed Onion Routing at the Network Layer Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig |
HORNET: High-speed Onion Routing at the Network Layer Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols? Moti Yung |
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols? Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Depeng Li, Sachin Shetty |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Protecting Locations with Differential Privacy under Temporal Correlations Yonghui Xiao, Li Xiong |
Protecting Locations with Differential Privacy under Temporal Correlations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Using Unit Testing to Detect Sanitization Flaws Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford |
POSTER: Using Unit Testing to Detect Sanitization Flaws Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns |
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Insecurity of Voice Solution VoLTE in LTE Mobile Networks Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang |
Insecurity of Voice Solution VoLTE in LTE Mobile Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DEMO: Action Recommendation for Cyber Resilience Luke Rodriguez, Darren S. Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray |
DEMO: Action Recommendation for Cyber Resilience Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras |
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi |
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko |
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith |
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Moat: Verifying Confidentiality of Enclave Programs Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani |
Moat: Verifying Confidentiality of Enclave Programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Drops for Stuff: An Analysis of Reshipping Mule Scams Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna |
Drops for Stuff: An Analysis of Reshipping Mule Scams Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Nethanel Gelernter, Amir Herzberg |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications Oswaldo Olivo, Isil Dillig, Calvin Lin |
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Deniable Key Exchanges for Secure Messaging Nik Unger, Ian Goldberg |
Deniable Key Exchanges for Secure Messaging Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives Olivier Pereira, François-Xavier Standaert, Srinivas Vivek |
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated Symbolic Proofs of Observational Equivalence David A. Basin, Jannik Dreier, Ralf Sasse |
Automated Symbolic Proofs of Observational Equivalence Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
iRiS: Vetting Private API Abuse in iOS Applications Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu |
iRiS: Vetting Private API Abuse in iOS Applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Android Root and its Providers: A Double-Edged Sword Hang Zhang, Dongdong She, Zhiyun Qian |
Android Root and its Providers: A Double-Edged Sword Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Fraud Detection through Graph-Based User Behavior Modeling Alex Beutel, Leman Akoglu, Christos Faloutsos |
Fraud Detection through Graph-Based User Behavior Modeling Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières |
CCFI: Cryptographically Enforced Control Flow Integrity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Roshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens He Sun, Kun Sun, Yuewu Wang, Jiwu Jing |
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Micropayments for Decentralized Currencies Rafael Pass, Abhi Shelat |
Micropayments for Decentralized Currencies Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
MalGene: Automatic Extraction of Malware Analysis Evasion Signature Dhilung Kirat, Giovanni Vigna |
MalGene: Automatic Extraction of Malware Analysis Evasion Signature Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fast Non-Malleable Commitments Hai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald |
Fast Non-Malleable Commitments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo |
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
White-Box Cryptography Revisited: Space-Hard Ciphers Andrey Bogdanov, Takanori Isobe |
White-Box Cryptography Revisited: Space-Hard Ciphers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim |
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART) Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky |
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART) Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Qian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Per-Input Control-Flow Integrity Ben Niu, Gang Tan |
Per-Input Control-Flow Integrity Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman |
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Leakage-Abuse Attacks Against Searchable Encryption David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart |
Leakage-Abuse Attacks Against Searchable Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security Tomas Sander, Moti Yung |
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks Mihir Bellare, Joseph Jaeger, Daniel Kane |
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang |
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
When Good Becomes Evil: Keystroke Inference with Smartwatch Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang |
When Good Becomes Evil: Keystroke Inference with Smartwatch Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng |
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Clock is Still Ticking: Timing Attacks in the Modern Web Tom van Goethem, Wouter Joosen, Nick Nikiforakis |
The Clock is Still Ticking: Timing Attacks in the Modern Web Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|