Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterOctober 2016
POSTER: DroidShield: Protecting User Applications from Normal World Access
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1760–1762https://doi.org/10.1145/2976749.2989052Smartphones are becoming the main data sharing and storage devices in both our personal and professional lives, as companies now allow employees to share the same device for both purposes, provided the company's confidential information can be ...
- posterOctober 2016
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1799–1801https://doi.org/10.1145/2976749.2989042Public cloud vendors have been offering varies big data computing services. However, runtime integrity is one of the major concerns that hinders the adoption of those services. In this paper, we focus on MapReduce, a popular big data computing framework,...
- research-articleOctober 2016
Systematic Fuzzing and Testing of TLS Libraries
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1492–1504https://doi.org/10.1145/2976749.2978411We present TLS-Attacker, an open source framework for evaluating the security of TLS libraries. TLS-Attacker allows security engineers to create custom TLS message flows and arbitrarily modify message contents using a simple interface in order to test ...
- research-articleOctober 2016
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1516–1527https://doi.org/10.1145/2976749.2978394The Host header is a security-critical component in an HTTP request, as it is used as the basis for enforcing security and caching policies. While the current specification is generally clear on how host-related protocol fields should be parsed and ...
- research-articleOctober 2016
Chainsaw: Chained Automated Workflow-based Exploit Generation
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 641–652https://doi.org/10.1145/2976749.2978380We tackle the problem of automated exploit generation for web applications. In this regard, we present an approach that significantly improves the state-of-art in web injection vulnerability identification and exploit generation. Our approach for ...
- research-articleOctober 2016
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 704–716https://doi.org/10.1145/2976749.2978336Recent literature on iOS security has focused on the malicious potential of third-party applications, demonstrating how developers can bypass application vetting and code-level protections. In addition to these protections, iOS uses a generic sandbox ...
- research-articleOctober 2016
Making Smart Contracts Smarter
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 254–269https://doi.org/10.1145/2976749.2978309Cryptocurrencies record transactions in a decentralized data structure called a blockchain. Two of the most popular cryptocurrencies, Bitcoin and Ethereum, support the feature to encode rules or scripts for processing transactions. This feature has ...
- research-articleOctober 2016
The Misuse of Android Unix Domain Sockets and Security Implications
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 80–91https://doi.org/10.1145/2976749.2978297In this work, we conduct the first systematic study in understanding the security properties of the usage of Unix domain sockets by both Android apps and system daemons as an IPC (Inter-process Communication) mechanism, especially for cross-layer ...