Defending Against Web Application Attacks: Approaches, Challenges and Implications
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection, exploit vulnerabilities in web applications that may accept and process data of uncertain origin without proper validation or filtering, allowing the injection and ...
Design and Implementation of the Ascend Secure Processor
This paper presents post-silicon results for the Ascend secure processor, taped out in a 32 nm SOI process. Ascend prevents information leakage over a processor's digital I/O pinsin particular, the processor's requests to external memoryand certifies ...
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation
- Martine De Cock,
- Rafael Dowsley,
- Caleb Horst,
- Raj Katti,
- Anderson C. A. Nascimento,
- Wing-Sea Poon,
- Stacey Truex
Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacy-preserving classification of decision trees, a popular machine learning ...
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources. The uncertainty about the attacker's behaviour makes Bayesian networks suitable to model ...
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of ...
Fault-Tolerant Adaptive Routing in Dragonfly Networks
Dragonfly networks have been widely used in the current high-performance computers or high-end servers. Fault-tolerant routing in dragonfly networks is essential. The rich interconnects provide good fault-tolerance ability for the network. A new ...
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3
Transport Layer Security (TLS) is one of the most widely used Internet protocols for secure communications. TLS 1.3, the next-generation protocol, is currently under development, with the latest candidate being draft-18. For flexibility and ...
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object
- Hojoon Lee,
- Hyungon Moon,
- Ingoo Heo,
- Daehee Jang,
- Jinsoo Jang,
- Kihwan Kim,
- Yunheung Paek,
- Brent Byunghoon Kang
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches have been limited to monitoring the static regions of kernel while the latest rootkits manipulate the ...
Optimal Spot-Checking for Collusion Tolerance in Computer Grids
Many grid-computing systems adopt voting-based techniques to resist sabotage. However, these techniques become ineffective in grid systems subject to collusion behavior, where some malicious resources can collectively sabotage a job execution by ...
Privacy-Aware Caching in Information-Centric Networking
Information-Centric Networking (ICN) is an emerging networking paradigm where named and routable data (content) is the focal point. Users send explicit requests (interests) which specify content by name, and the network handles routing these interests ...
Privacy-Preserving Aggregate Queries for Optimal Location Selection
Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as ...
Privacy-Preserving Multi-Keyword Top-$k$: Similarity Search Over Encrypted Data
Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are ...
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets
Despite the promising potential of network risk management services (e.g., cyber-insurance) to improve information security, their deployment is relatively scarce, primarily due to such service companies being unable to guarantee profitability. As a ...