Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractOctober 2016
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1888–1890https://doi.org/10.1145/2976749.2990489The Internet of Things (IoT) is expected to become a global information and communication infrastructure for cyber physical systems and to bring numerous value-added services for modern society. However, the integration of heterogeneous devices and ...
- posterOctober 2016
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1769–1771https://doi.org/10.1145/2976749.2989059Bitcoin has revolutionized digital currencies and its underlying blockchain has been successfully applied to other domains. To be verifiable by every participating peer, the blockchain maintains every transaction in a persistent, distributed, and tamper-...
- posterOctober 2016
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1784–1786https://doi.org/10.1145/2976749.2989051Ransomware is one of the rising malwares in the crimeware family. It encrypts the user files and demands extortion money. From the perspective of an enterprise it is very crucial to detect and stop a ransomware attack. A well studied technique is to ...
- posterOctober 2016
POSTER: Weighing in eHealth Security
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1832–1834https://doi.org/10.1145/2976749.2989044eHealth devices such as smart scales and wearable fitness trackers are a key part of many health technology solutions. However, these eHealth devices can be vulnerable to privacy and security related attacks. In this poster, we propose a security ...
- posterOctober 2016
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1745–1747https://doi.org/10.1145/2976749.2989043Although symmetric ciphers may provide strong computational security, a key leakage makes the encrypted data vulnerable. In a distributed storage environment, reinforcement of data protection consists of dispersing data over multiple servers in a way ...
- posterOctober 2016
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1799–1801https://doi.org/10.1145/2976749.2989042Public cloud vendors have been offering varies big data computing services. However, runtime integrity is one of the major concerns that hinders the adoption of those services. In this paper, we focus on MapReduce, a popular big data computing framework,...
- demonstrationOctober 2016
DEMO: Integrating MPC in Big Data Workflows
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1844–1846https://doi.org/10.1145/2976749.2989034Secure multi-party computation (MPC) allows multiple parties to perform a joint computation without disclosing their private inputs. Many real-world joint computation use cases, however, involve data analyses on very large data sets, and are implemented ...
- research-articleOctober 2016
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 229–241https://doi.org/10.1145/2976749.2978415Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism for ensuring reliability and ...
- research-articleOctober 2016
Transparency Overlays and Applications
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 168–179https://doi.org/10.1145/2976749.2978404In this paper, we initiate a formal study of transparency, which in recent years has become an increasingly critical requirement for the systems in which people place trust. We present the abstract concept of a transparency overlay, which can be used in ...
- research-articleOctober 2016
The Honey Badger of BFT Protocols
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 31–42https://doi.org/10.1145/2976749.2978399The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transactions. Although the conventional ...
- research-articleOctober 2016
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 242–253https://doi.org/10.1145/2976749.2978398Defenders of enterprise networks have a critical need to quickly identify the root causes of malware and data leakage. Increasingly, USB storage devices are the media of choice for data exfiltration, malware propagation, and even cyber-warfare. We ...
- research-articleOctober 2016
A Secure Sharding Protocol For Open Blockchains
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 17–30https://doi.org/10.1145/2976749.2978389Cryptocurrencies, such as Bitcoin and 250 similar alt-coins, embody at their core a blockchain protocol --- a mechanism for a distributed network of computational nodes to periodically agree on a set of new transactions. Designing a secure blockchain ...
- research-articleOctober 2016
On the Security and Performance of Proof of Work Blockchains
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 3–16https://doi.org/10.1145/2976749.2978341Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of ...
- research-articleOctober 2016
Targeted Online Password Guessing: An Underestimated Threat
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1242–1254https://doi.org/10.1145/2976749.2978339While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal ...
- research-articleOctober 2016
SANA: Secure and Scalable Aggregate Network Attestation
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 731–742https://doi.org/10.1145/2976749.2978335Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating our environments (homes, factories, cars, and also our body - with wearable devices) to collect data and act on the insight derived. Ensuring software ...
- research-articleOctober 2016
Safely Measuring Tor
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1553–1567https://doi.org/10.1145/2976749.2978310Tor is a popular network for anonymous communication. The usage and operation of Tor is not well-understood, however, because its privacy goals make common measurement approaches ineffective or risky. We present PrivCount, a system for measuring the Tor ...
- tutorialOctober 2016
On the Security and Scalability of Bitcoin's Blockchain
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1861–1862https://doi.org/10.1145/2976749.2976756The blockchain emerges as an innovative tool which proves to be useful in a number of application scenarios. A number of large industrial players, such as IBM, Microsoft, Intel, and NEC, are currently investing in exploiting the blockchain in order to ...
- tutorialOctober 2016
Condensed Cryptographic Currencies Crash Course (C5)
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1857–1858https://doi.org/10.1145/2976749.2976754"Bitcoin is a rare case where practice seems to be ahead of theory." Joseph Bonneau et al. [3] This tutorial aims to further close the gap between IT security research and the area of cryptographic currencies and block chains. We will describe and refer ...