CCS A*

171 papers

YearTitle / Authors
2014(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
2014A Computationally Complete Symbolic Attacker for Equivalence Properties.
Gergei Bana, Hubert Comon-Lundh
2014A Critical Evaluation of Website Fingerprinting Attacks.
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt
2014A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning.
Nektarios Leontiadis, Tyler Moore, Nicolas Christin
2014A New Additive Homomorphic Encryption based on the co-ACD Problem.
Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo
2014A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg
2014A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel.
Anil Kurmus, Robby Zippel
2014A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation.
Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone
2014A11y Attacks: Exploiting Accessibility in Operating Systems.
Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee
2014ALETHEIA: Improving the Usability of Static Security Analysis.
Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Y. Aravkin
2014ALITHEIA: Towards Practical Verifiable Graph Processing.
Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz
2014ARMlock: Hardware-based Fault Isolation for ARM.
Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang
2014ARPKI: Attack Resilient Public-Key Infrastructure.
David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski
2014ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
DaeHee Jang, Hojoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang
2014AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu
2014Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang
2014Algebraic MACs and Keyed-Verification Anonymous Credentials.
Melissa Chase, Sarah Meiklejohn, Greg Zaverucha
2014Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps.
Fengguo Wei, Sankardas Roy, Xinming Ou, Robby
2014An Epidemiological Study of Malware Encounters in a Large Enterprise.
Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels
2014Are You Ready to Lock?
Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner
2014AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen
2014Automating Information Flow Analysis of Low Level Code.
Musard Balliu, Mads Dam, Roberto Guanciale
2014Beware, Your Hands Reveal Your Secrets!
Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha
2014Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Lorenzo De Carli, Robin Sommer, Somesh Jha
2014Blind Recognition of Touched Keys on Mobile Devices.
Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao
2014Blind Transmitter Authentication for Spectrum Security and Enforcement.
Vireshwar Kumar, Jung-Min Park, Kaigui Bian
2014Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering.
Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner
2014CCS'14 Co-Located Workshop Summary for SPSM 2014.
Kapil Singh, Zhenkai Liang
2014CCSW 2014: Sixth ACM Cloud Computing Security Workshop.
Alina Oprea, Reihaneh Safavi-Naini
2014Characterization of Real-Life PRNGs under Partial State Corruption.
Mario Cornejo, Sylvain Ruhault
2014Characterizing Large-Scale Click Fraud in ZeroAccess.
Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker
2014ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces.
Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms
2014Client-Controlled Cloud Encryption.
Florian Kerschbaum
2014Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis
2014Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
Xing Jin, Xunchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri
2014Code Reuse Attacks in PHP: Automated POP Chain Generation.
Johannes Dahse, Nikolai Krein, Thorsten Holz
2014Collaborative Verification of Information Flow for a High-Assurance App Store.
Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu
2014Community-Enhanced De-anonymization of Online Social Networks.
Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn
2014Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Kurt Thomas, Frank Li, Chris Grier, Vern Paxson
2014Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani
2014Context-free Attacks Using Keyboard Acoustic Emanations.
Tong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu
2014Controlled Functional Encryption.
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter
2014Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
2014DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans.
Jie Zhang, Feng Yuan, Qiang Xu
2014Deanonymisation of Clients in Bitcoin P2P Network.
Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov
2014Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.
Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick N. Lawlor, David M. Liebovitz, Bradley A. Malin
2014Demo Overview: Privacy-Enhancing Features of IdentiDroid.
Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino
2014Deniable Liaisons.
Abhinav Narain, Nick Feamster, Alex C. Snoeren
2014Detection of On-Road Vehicles Emanating GPS Interference.
Gorkem Kar, Hossen Asiful Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu
2014Dialing Back Abuse on Phone Verified Accounts.
Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy
2014Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Anupam Das, Nikita Borisov, Matthew Caesar
2014Efficiently Verifiable Computation on Encrypted Data.
Dario Fiore, Rosario Gennaro, Valerio Pastro
2014Exciting Security Research Opportunity: Next-generation Internet.
Adrian Perrig
2014Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis
2014Fail-Secure Access Control.
Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin
2014Formatted Encryption Beyond Regular Languages.
Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha
2014Founding Digital Currency on Secure Computation.
Karim El Defrawy, Joshua Lampkins
2014Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014).
Frederik Armknecht, Jorge Guajardo
2014From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser
2014Fully Secure and Fast Signing from Obfuscation.
Kim Ramchen, Brent Waters
2014Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel
2014Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith
2014How to Use Bitcoin to Incentivize Correct Computations.
Ranjit Kumaresan, Iddo Bentov
2014Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen
2014Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation.
Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong
2014Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code.
Jeff Seibert, Hamed Okkhravi, Eric Söderström
2014Integrity, Consistency, and Verification of Remote Computation.
Christian Cachin
2014Location Privacy Protection for Smartphone Users.
Kassem Fawaz, Kang G. Shin
2014MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications.
Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan
2014MTD 2014: First ACM Workshop on Moving Target Defense.
Sushil Jajodia, Kun Sun
2014Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, Xiaofeng Wang, Xinhui Han
2014Mechanized Network Origin and Path Authenticity Proofs.
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig
2014Moving Targets: Security and Rapid-Release in Firefox.
Sandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith
2014Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
2014Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Marc Fischlin, Felix Günther
2014OAuth Demystified for Mobile Application Developers.
Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague
2014Oblivious Data Structures.
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
2014On The Security of Mobile Cockpit Information Systems.
Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan A. Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko
2014Optimal Average-Complexity Ideal-Security Order-Preserving Encryption.
Florian Kerschbaum, Axel Schröpfer
2014Optimal Geo-Indistinguishable Mechanisms for Location Privacy.
Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi
2014Optimizing Obfuscation: Avoiding Barrington's Theorem.
Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
2014Outsourced Proofs of Retrievability.
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter
2014POSTER: A Hybrid Botnet Ecological Environment.
Dai Yumei, Liang Yu, Li Ke
2014POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System.
Ke Li, Chaoge Liu, Xiang Cui
2014POSTER: A Measurement Framework to Quantify Software Protections.
Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens
2014POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework.
Zhenbang Liu, Hengming Zou
2014POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting.
Dong Li, Fangjiao Zhang, Chaoge Liu
2014POSTER: AdHoneyDroid - Capture Malicious Android Advertisements.
Dongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han
2014POSTER: An E2E Trusted Cloud Infrastructure.
Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu
2014POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip
2014POSTER: Analyzing Access Control Policies with SMT.
Fatih Turkmen, Jerry den Hartog, Nicola Zannone
2014POSTER: Android System Broadcast Actions Broadcasts Your Privacy.
Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah
2014POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng
2014POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification.
Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang
2014POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
Lei Jin, Balaji Palanisamy, James B. D. Joshi
2014POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
2014POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data.
Yu Zhang, Songfeng Lu
2014POSTER: Enhancing Security and Privacy with Google Glass.
Johannes Krupp, Dominique Schröder, Mark Simkin
2014POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Fuchun Guo, Willy Susilo, Yi Mu
2014POSTER: Fingerprinting the Publicly Available Sandboxes.
Ke Liu, Shuai Lu, Chaoge Liu
2014POSTER: How Distributed Are Today's DDoS Attacks?
An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen
2014POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren
2014POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering.
Hongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Yong Wang
2014POSTER: Misuseablity Analysis for IT Infrastructure.
Asaf Shabtai, Yuval Elovici
2014POSTER: On the Capability of DNS Cache Poisoning Attacks.
Zheng Wang
2014POSTER: On the Resilience of DNS Infrastructure.
Haya Schulmann, Shiran Ezra
2014POSTER: Password Entering and Transmission Security.
Gamze Canova, Melanie Volkamer, Simon Weiler
2014POSTER: Positioning Attack on Proximity-Based People Discovery.
Huan Feng, Kang G. Shin
2014POSTER: Proactive Blacklist Update for Anti-Phishing.
Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng
2014POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
Asmaa Sallam, Elisa Bertino
2014POSTER: Quasi-ID: In fact, I am a human.
Milivoj Simeonovski
2014POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang
2014POSTER: Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs.
Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, Chung-Tsai Su
2014POSTER: Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies.
Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe
2014POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan.
Mitsuhiro Hatada, Masato Terada, Tatsuya Mori
2014POSTER: Study of Software Plugin-based Malware.
Yu Liang, Zhiqiao Li, Xiang Cui
2014POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang
2014POSTER: TLS Proxies: Friend or Foe?
Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala
2014POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine.
Jie Lin, Chuanyi Liu, Binxing Fang
2014POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities.
Jiayi Ye, Chao Zhang, Xinhui Han
2014POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng
2014POSTER: When and How to Implicitly Authenticate Smartphone Users.
Aaron Atwater, Hassan Khan, Urs Hengartner
2014PixelVault: Using GPUs for Securing Cryptographic Operations.
Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis
2014PoliCert: Secure and Flexible TLS Certificate Management.
Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig
2014Practical UC security with a Global Random Oracle.
Ran Canetti, Abhishek Jain, Alessandra Scafuro
2014PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks.
Tariq Elahi, George Danezis, Ian Goldberg
2014Privacy Beyond Confidentiality.
Christopher W. Clifton
2014Private-by-Design Advertising Meets the Real World.
Alexey Reznichenko, Paul Francis
2014Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014
Gail-Joon Ahn, Moti Yung, Ninghui Li
2014Quantifying Web-Search Privacy.
Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders
2014RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response.
Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova
2014Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging.
Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu
2014Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum
2014RevCast: Fast, Private Certificate Revocation over FM Radio.
Aaron Schulman, Dave Levin, Neil Spring
2014RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity.
Ben Niu, Gang Tan
2014Rosemary: A Robust, Secure, and High-performance Network Operating System.
Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, JaeWoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang
2014Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures.
Min Suk Kang, Virgil D. Gligor
2014S3: A Symbolic String Solver for Vulnerability Detection in Web Applications.
Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar
2014SCORAM: Oblivious RAM for Secure Computation.
Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi
2014SIW 2014: First Workshop on Security Information Workers.
Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle
2014Searchable Encryption with Secure and Efficient Updates.
Florian Hahn, Florian Kerschbaum
2014Second Smart Energy Grid Security Workshop (SEGS 2014).
Klaus Kursawe, Benessa Defend
2014Securing SSL Certificate Verification through Dynamic Linking.
Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi
2014Security Analyses of Click-based Graphical Passwords via Image Point Memorability.
Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang
2014Security Analysis of the Estonian Internet Voting System.
Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman
2014Security Vulnerability in Processor-Interconnect Router Design.
WonJun Song, John Kim, Jae W. Lee, Dennis Abts
2014Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao
2014ShadowCrypt: Encrypted Web Applications for Everyone.
Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song
2014Structural Data De-anonymization: Quantification, Practice, and Implications.
Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah
2014Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation.
Ehab Al-Shaer, Krishna Kant
2014Synthesis of Fault Attacks on Cryptographic Implementations.
Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz
2014System-level Non-interference for Constant-time Cryptography.
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie
2014Taking Authenticated Range Queries to Arbitrary Dimensions.
Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos
2014The Last Mile: An Empirical Study of Timing Channels on seL4.
David A. Cock, Qian Ge, Toby C. Murray, Gernot Heiser
2014The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid.
Mark S. Dittmer, Mahesh V. Tripunitara
2014The Web Never Forgets: Persistent Tracking Mechanisms in the Wild.
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz
2014Toward Robust Hidden Volumes Using Write-Only Oblivious RAM.
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
2014Tutorial: Text Analytics for Security.
William Enck, Tao Xie
2014Uncovering Large Groups of Active Malicious Accounts in Online Social Networks.
Qiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow
2014VerSum: Verifiable Computations over Large Public Logs.
Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich
2014Verifying Curve25519 Software.
Yu-Fang Chen, Chang-Hong Hsu, Hsin-hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang
2014VoIP Fraud: Identifying a Wolf in Sheep's Clothing.
Hemant Sengar
2014Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks.
Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin
2014WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security.
Tomas Sander
2014WPES 2014: 13th Workshop on Privacy in the Electronic Society.
Gail-Joon Ahn, Anupam Datta
2014Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions.
Yi Xu, Jan-Michael Frahm, Fabian Monrose
2014Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
Maliheh Shirvanian, Nitesh Saxena
2014Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security.
Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein
2014World-Driven Access Control for Continuous Sensing.
Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang
2014You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny
2014Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee