default search action
21st CCS 2014: Scottsdale, AZ, USA
- Gail-Joon Ahn, Moti Yung, Ninghui Li:
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. ACM 2014, ISBN 978-1-4503-2957-6
Session 1A -- Payments & Security
- Karim El Defrawy, Joshua Lampkins:
Founding Digital Currency on Secure Computation. 1-14 - Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of Clients in Bitcoin P2P Network. 15-29 - Ranjit Kumaresan, Iddo Bentov:
How to Use Bitcoin to Incentivize Correct Computations. 30-41
Session 1B -- Code Manipulation
- Johannes Dahse, Nikolai Krein, Thorsten Holz:
Code Reuse Attacks in PHP: Automated POP Chain Generation. 42-53 - Jeff Seibert, Hamed Okkhravi, Eric Söderström:
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code. 54-65 - Xing Jin, Xunchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri:
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation. 66-77
Session 1C -- Operating Systems
- Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang:
Rosemary: A Robust, Secure, and High-performance Network Operating System. 78-89 - Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen:
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. 90-102 - Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee:
A11y Attacks: Exploiting Accessibility in Operating Systems. 103-115
Session 2A -- Advertisement: Security & Privacy
- Alexey Reznichenko, Paul Francis:
Private-by-Design Advertising Meets the Real World. 116-128 - Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. 129-140 - Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. 141-152
Session 2B -- Malware
- Jie Zhang, Feng Yuan, Qiang Xu:
DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans. 153-166 - DaeHee Jang, Hojoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang:
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors. 167-178 - Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu:
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis. 179-190
Session 2C -- Oblivious Computations
- Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. 191-202 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu:
Toward Robust Hidden Volumes Using Write-Only Oblivious RAM. 203-214 - Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang:
Oblivious Data Structures. 215-226
Session 3A -- Location/Web Privacy
- Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg:
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. 227-238 - Kassem Fawaz, Kang G. Shin:
Location Privacy Protection for Smartphone Users. 239-250 - Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Optimal Geo-Indistinguishable Mechanisms for Location Privacy. 251-262 - Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt:
A Critical Evaluation of Website Fingerprinting Attacks. 263-274
Session 3B -- Applications Oriented Cryptosystems
- Florian Kerschbaum, Axel Schröpfer:
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption. 275-286 - Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo:
A New Additive Homomorphic Encryption based on the co-ACD Problem. 287-298 - Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang:
Verifying Curve25519 Software. 299-309 - Florian Hahn, Florian Kerschbaum:
Searchable Encryption with Secure and Efficient Updates. 310-320
Session 3C -- Network Security
- Min Suk Kang, Virgil D. Gligor:
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. 321-333 - Hemant Sengar:
VoIP Fraud: Identifying a Wolf in Sheep's Clothing. 334-345 - Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig:
Mechanized Network Origin and Path Authenticity Proofs. 346-357 - WonJun Song, John Kim, Jae W. Lee, Dennis Abts:
Security Vulnerability in Processor-Interconnect Router Design. 358-368
Session 4A -- SSL/TLS
- Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila:
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. 369-381 - David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. 382-393 - Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. 394-405 - Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig:
PoliCert: Secure and Flexible TLS Certificate Management. 406-417
Session 4B -- Leakage Attacks: Side Channels
- Yi Xu, Jan-Michael Frahm, Fabian Monrose:
Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions. 418-428 - Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang:
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. 429-440 - Anupam Das, Nikita Borisov, Matthew Caesar:
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. 441-452 - Tong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu:
Context-free Attacks Using Keyboard Acoustic Emanations. 453-464
Session 4C -- Attacking Web Accounts
- Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy:
Dialing Back Abuse on Phone Verified Accounts. 465-476 - Qiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow:
Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. 477-488 - Kurt Thomas, Frank Li, Chris Grier, Vern Paxson:
Consequences of Connectivity: Characterizing Account Hijacking on Twitter. 489-500 - Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. 501-512
Session 5A -- Anonymity
- Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. 513-524 - Abhinav Narain, Nick Feamster, Alex C. Snoeren:
Deniable Liaisons. 525-536 - Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn:
Community-Enhanced De-anonymization of Online Social Networks. 537-548
Session 5B -- Hardware Security
- Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner:
Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering. 549-557 - Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang:
ARMlock: Hardware-based Fault Isolation for ARM. 558-569 - David A. Cock, Qian Ge, Toby C. Murray, Gernot Heiser:
The Last Mile: An Empirical Study of Timing Channels on seL4. 570-581
Session 5C -- Secure Computation Protocols
- Benjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum:
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values. 582-596 - Ran Canetti, Abhishek Jain, Alessandra Scafuro:
Practical UC security with a Global Random Oracle. 597-608 - Gergei Bana, Hubert Comon-Lundh:
A Computationally Complete Symbolic Attacker for Equivalence Properties. 609-620
Session 6A -- Transportation Security
- Gorkem Kar, Hossen Asiful Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu:
Detection of On-Road Vehicles Emanating GPS Interference. 621-632 - Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan A. Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko:
On The Security of Mobile Cockpit Information Systems. 633-645
Session 6B -- Cryptographic Obfuscation
- Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai:
Optimizing Obfuscation: Avoiding Barrington's Theorem. 646-658 - Kim Ramchen, Brent Waters:
Fully Secure and Fast Signing from Obfuscation. 659-673
Session 6C -- Web Vulnerabilities
- Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz:
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. 674-689 - Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan:
MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications. 690-701
Keynote Address I
- Adrian Perrig:
Exciting Security Research Opportunity: Next-generation Internet. 702
Session 7A -- Real-World Systems: Analysis & Threats
- Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman:
Security Analysis of the Estonian Internet Voting System. 703-715 - Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel:
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. 716-726 - Chunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu:
Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging. 727-738
Session 7B -- User Aspects
- Sauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong:
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. 739-749 - Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David A. Wagner:
Are You Ready to Lock? 750-761 - Omer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Y. Aravkin:
ALETHEIA: Improving the Usability of Static Security Analysis. 762-774
Session 7C -- Wireless Security
- Yu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin:
Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks. 775-786 - Vireshwar Kumar, Jung-Min Park, Kaigui Bian:
Blind Transmitter Authentication for Spectrum Security and Enforcement. 787-798 - Aaron Schulman, Dave Levin, Neil Spring:
RevCast: Fast, Private Certificate Revocation over FM Radio. 799-810
Session 8A -- Secure Outsourced Computations
- Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos:
Taking Authenticated Range Queries to Arbitrary Dimensions. 819-830 - Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter:
Outsourced Proofs of Retrievability. 831-843 - Dario Fiore, Rosario Gennaro, Valerio Pastro:
Efficiently Verifiable Computation on Encrypted Data. 844-855 - Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz:
ALITHEIA: Towards Practical Verifiable Graph Processing. 856-867
Session 8B -- Mobile Security
- Maliheh Shirvanian, Nitesh Saxena:
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. 868-879 - Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani:
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. 880-891 - Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague:
OAuth Demystified for Mobile Application Developers. 892-903 - Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha:
Beware, Your Hands Reveal Your Secrets! 904-917
Session 8C -- Security of Web Components
- Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis:
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals. 918-929 - Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. 930-941 - Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser:
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. 942-953 - Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone:
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation. 954-965
Session 9A -- Cloud & Search Issues
- Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders:
Quantifying Web-Search Privacy. 966-977 - Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han:
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. 978-989 - Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. 990-1003
Session 9B -- Crypto Implementations
- Mario Cornejo, Sylvain Ruhault:
Characterization of Real-Life PRNGs under Partial State Corruption. 1004-1015 - Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz:
Synthesis of Fault Attacks on Cryptographic Implementations. 1016-1027 - Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song:
ShadowCrypt: Encrypted Web Applications for Everyone. 1028-1039
Session 9C: Data Privacy
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah:
Structural Data De-anonymization: Quantification, Practice, and Implications. 1040-1053 - Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova:
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. 1054-1067 - Tariq Elahi, George Danezis, Ian Goldberg:
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. 1068-1079
Session 10A -- Information Flow
- Musard Balliu, Mads Dam, Roberto Guanciale:
Automating Information Flow Analysis of Low Level Code. 1080-1091 - Michael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu:
Collaborative Verification of Information Flow for a High-Assurance App Store. 1092-1104
Session 10B -- Malware Studies
- Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao:
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. 1105-1116 - Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. 1117-1130
Session 10C -- System-Oriented Crypto Integration
- Giorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis:
PixelVault: Using GPUs for Securing Cryptographic Operations. 1131-1142 - Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith:
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers. 1143-1155
Keynote Address II
- Christopher W. Clifton:
Privacy Beyond Confidentiality. 1156
Session 11A -- Access Control
- Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Fail-Secure Access Control. 1157-1168 - Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. 1169-1181 - Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick N. Lawlor, David M. Liebovitz, Bradley A. Malin:
Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. 1182-1192
Session 11B -- Authentication
- Marc Fischlin, Felix Günther:
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol. 1193-1204 - Melissa Chase, Sarah Meiklejohn, Greg Zaverucha:
Algebraic MACs and Keyed-Verification Anonymous Credentials. 1205-1216 - Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang:
Security Analyses of Click-based Graphical Passwords via Image Point Memorability. 1217-1231
Session 11C -- Web Security Tools
- Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar:
S3: A Symbolic String Solver for Vulnerability Detection in Web Applications. 1232-1243 - Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms:
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces. 1244-1255 - Sandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith:
Moving Targets: Security and Rapid-Release in Firefox. 1256-1266
Session 12A -- Cryptographic Schemes & Techniques
- Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie:
System-level Non-interference for Constant-time Cryptography. 1267-1279 - Daniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha:
Formatted Encryption Beyond Regular Languages. 1292-1303 - Jelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich:
VerSum: Verifiable Computations over Large Public Logs. 1304-1316
Session 12B -- Secure Programming & Apps
- Ben Niu, Gang Tan:
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. 1317-1328 - Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. 1329-1341 - Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny:
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. 1342-1353 - Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen:
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications. 1354-1365
Session 12C -- Systems: Attacks & Security
- Anil Kurmus, Robby Zippel:
A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel. 1366-1377 - Lorenzo De Carli, Robin Sommer, Somesh Jha:
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection. 1378-1390 - Mark S. Dittmer, Mahesh V. Tripunitara:
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid. 1391-1402 - Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao:
Blind Recognition of Touched Keys on Mobile Devices. 1403-1414
Poster Presentations
- Aaron Atwater, Hassan Khan, Urs Hengartner:
POSTER: When and How to Implicitly Authenticate Smartphone Users. 1415-1417 - Gamze Canova, Melanie Volkamer, Simon Weiler:
POSTER: Password Entering and Transmission Security. 1418-1420 - Dai Yumei, Liang Yu, Li Ke:
POSTER: A Hybrid Botnet Ecological Environment. 1421-1423 - Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip:
POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems. 1424-1426 - Huan Feng, Kang G. Shin:
POSTER: Positioning Attack on Proximity-Based People Discovery. 1427-1429 - Fuchun Guo, Willy Susilo, Yi Mu:
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. 1430-1432 - Mitsuhiro Hatada, Masato Terada, Tatsuya Mori:
POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan. 1433-1435 - Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, Chung-Tsai Su:
POSTER: Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs. 1436-1438 - Lei Jin, Balaji Palanisamy, James B. D. Joshi:
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks. 1439-1441 - Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe:
POSTER: Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies. 1442-1444 - Johannes Krupp, Dominique Schröder, Mark Simkin:
POSTER: Enhancing Security and Privacy with Google Glass. 1445-1447 - Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng:
POSTER: Proactive Blacklist Update for Anti-Phishing. 1448-1450 - Dong Li, Fangjiao Zhang, Chaoge Liu:
POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting. 1451-1453 - Ke Li, Chaoge Liu, Xiang Cui:
POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System. 1454-1456 - Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. 1457-1459 - Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. 1460-1462 - Yu Liang, Zhiqiao Li, Xiang Cui:
POSTER: Study of Software Plugin-based Malware. 1463-1465 - Jie Lin, Chuanyi Liu, Binxing Fang:
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. 1466-1468 - Ke Liu, Shuai Lu, Chaoge Liu:
POSTER: Fingerprinting the Publicly Available Sandboxes. 1469-1471 - Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang:
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization. 1472-1474 - Zhenbang Liu, Hengming Zou:
POSTER: A Proactive Cloud-Based Cross-Reference Forensic Framework. 1475-1477 - Hesham Mekky, Aziz Mohaisen, Zhi-Li Zhang:
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification. 1478-1480 - Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino:
Demo Overview: Privacy-Enhancing Features of IdentiDroid. 1481-1483 - Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah:
POSTER: Android System Broadcast Actions Broadcasts Your Privacy. 1484-1486 - Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
POSTER: TLS Proxies: Friend or Foe? 1487-1489 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo:
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption. 1490-1492 - Asmaa Sallam, Elisa Bertino:
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs. 1493-1495 - Asaf Shabtai, Yuval Elovici:
POSTER: Misuseablity Analysis for IT Infrastructure. 1496-1498 - Haya Schulmann, Shiran Ezra:
POSTER: On the Resilience of DNS Infrastructure. 1499-1501 - Milivoj Simeonovski:
POSTER: Quasi-ID: In fact, I am a human. 1502-1504 - Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens:
POSTER: A Measurement Framework to Quantify Software Protections. 1505-1507 - Fatih Turkmen, Jerry den Hartog, Nicola Zannone:
POSTER: Analyzing Access Control Policies with SMT. 1508-1510 - An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen:
POSTER: How Distributed Are Today's DDoS Attacks? 1511-1513 - Dongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han:
POSTER: AdHoneyDroid - Capture Malicious Android Advertisements. 1514-1516 - Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu:
POSTER: An E2E Trusted Cloud Infrastructure. 1517-1519 - Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang:
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP. 1520-1522 - Zheng Wang:
POSTER: On the Capability of DNS Cache Poisoning Attacks. 1523-1525 - Qiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren:
POSTER: LocMask: A Location Privacy Protection Framework in Android System. 1526-1528 - Jiayi Ye, Chao Zhang, Xinhui Han:
POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities. 1529-1531 - Hongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Yong Wang:
POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering. 1532-1534 - Yu Zhang, Songfeng Lu:
POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data. 1535-1537
Tutorials
- Christian Cachin:
Integrity, Consistency, and Verification of Remote Computation. 1538-1539 - William Enck, Tao Xie:
Tutorial: Text Analytics for Security. 1540-1541 - Florian Kerschbaum:
Client-Controlled Cloud Encryption. 1542-1543
Workshop Summaries
- Ehab Al-Shaer, Krishna Kant:
Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation. 1544-1545 - Gail-Joon Ahn, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. 1546-1547 - Frederik Armknecht, Jorge Guajardo:
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014). 1548-1549 - Sushil Jajodia, Kun Sun:
MTD 2014: First ACM Workshop on Moving Target Defense. 1550-1551 - Tomas Sander:
WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security. 1552-1553 - Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle:
SIW 2014: First Workshop on Security Information Workers. 1554 - Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein:
Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security. 1555 - Klaus Kursawe, Benessa Defend:
Second Smart Energy Grid Security Workshop (SEGS 2014). 1556-1557 - Kapil Singh, Zhenkai Liang:
CCS'14 Co-Located Workshop Summary for SPSM 2014. 1558-1559 - Alina Oprea, Reihaneh Safavi-Naini:
CCSW 2014: Sixth ACM Cloud Computing Security Workshop. 1560-1561
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.