Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterMarch 2018
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 170–172https://doi.org/10.1145/3176258.3176951We introduce a new browser abuse scenario where an attacker uses local storage capabilities without the website's visitor knowledge to create a network of browsers for persistent storage and distribution of arbitrary data. We describe how security-aware ...
- posterMarch 2018
Privacy-aware Data Assessment of Online Social Network Registration Processes
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 167–169https://doi.org/10.1145/3176258.3176950Privacy and security research has been very active concerning online social networks (OSN) as a vast amount of personal information is used and published (by users) within OSNs. However, most people do not pay attention on what personal information they ...
- posterMarch 2018
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 161–163https://doi.org/10.1145/3176258.3176948We present SeCore, which is a novel continuous extrospection system on multi-core ARM platform. SeCore leverages ARM TrustZone technology to keep one core in the secure world and assure the integrity of the static kernel data and code in the normal ...
- posterMarch 2018
Misusing Sensory Channel to Attack Industrial Control Systems
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 158–160https://doi.org/10.1145/3176258.3176947Industrial control systems (ICS) are used to control and manage critical infrastructures and protecting these complex system and their interfaces, which can be exploited by internal and external attackers, are a vital security task. Sensors, as an ...
- posterMarch 2018
Secure Display for FIDO Transaction Confirmation
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 155–157https://doi.org/10.1145/3176258.3176946FIDO protocols enable online services to leverage native authenticators of end-user computing devices including fingerprint readers for authentication to replace or complement passwords. FIDO protocols also offer support for prompting a user to confirm ...
-
- posterMarch 2018
AEON: Android Encryption based Obfuscation
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 146–148https://doi.org/10.1145/3176258.3176943Android applications are vulnerable to reverse engineering which could result in tampering and repackaging of applications. Even though there are many off the shelf obfuscation tools that hardens Android applications, they are limited to basic ...
- posterMarch 2018
Effectiveness of Android Obfuscation on Evading Anti-malware
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 143–145https://doi.org/10.1145/3176258.3176942Obfuscation techniques have been conventionally used for legitimate applications, including preventing application reverse engineering, tampering and protecting intellectual property. A malware author could also leverage these benign techniques to hide ...
- keynoteMarch 2018
Code Obfuscation: Why is This Still a Thing?
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 173–174https://doi.org/10.1145/3176258.3176342Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem ...
- short-paperMarch 2018
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 103–110https://doi.org/10.1145/3176258.3176341Keyboard acoustic side channel attacks to date have been mostly studied in the context of an adversary eavesdropping on keystrokes by placing a listening device near the intended victim creating a local eavesdropping scenario. However, being in close ...
- short-paperMarch 2018
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 119–126https://doi.org/10.1145/3176258.3176340The assessment of new vulnerabilities is an activity that accounts for information from several data sources and produces a 'severity' score for the vulnerability. The Common Vulnerability Scoring System (CVSS) is the reference standard for this ...
- short-paperMarch 2018
Automated Generation of Attack Graphs Using NVD
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 135–142https://doi.org/10.1145/3176258.3176339Today's computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the number of vulnerabilities, or ...
- short-paperMarch 2018
An Empirical Study on Online Price Differentiation
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 76–83https://doi.org/10.1145/3176258.3176338Price differentiation describes a marketing strategy to determine the price of goods on the basis of a potential customer's attributes like location, financial status, possessions, or behavior. Several cases of online price differentiation have been ...
- short-paperMarch 2018
SPEED: Secure Provable Erasure for Class-1 IoT Devices
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 111–118https://doi.org/10.1145/3176258.3176337The Internet of Things (IoT) consists of embedded devices that sense and manage our environment in a growing range of applications. Large-scale IoT systems such as smart cities require significant investment in both equipment and personnel. To maximize ...
- short-paperMarch 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 299–306https://doi.org/10.1145/3176258.3176336Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is also introduced. By hijacking a ...
- short-paperMarch 2018
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 127–134https://doi.org/10.1145/3176258.3176335This paper presents a proposal of a method to extract important byte sequences in malware samples to reduce the workload of human analysts who investigate the functionalities of the samples. This method, by applying convolutional neural network (CNN) ...
- short-paperMarch 2018
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 95–102https://doi.org/10.1145/3176258.3176334Developing secure Internet of Things (IoT) applications that are free of vulnerabilities and resilient against exploit is desirable for software developers and testers. In this paper, we present IoTVerif, an automated tool that can verify SSL/TLS (...
- short-paperMarch 2018
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 196–203https://doi.org/10.1145/3176258.3176332Leaked passwords from data breaches can pose a serious threat if users reuse or slightly modify the passwords for other services. With more services getting breached today, there is still a lack of a quantitative understanding of this risk. In this ...
- short-paperMarch 2018
Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 204–211https://doi.org/10.1145/3176258.3176331Neo4j is a popular graph database that offers two versions; a paid enterprise edition and a free community edition. The enterprise edition offers customizable Role-Based Access Control (RBAC) features through custom developed procedures, while the ...
- short-paperMarch 2018
Fidelius Charm: Isolating Unsafe Rust Code
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 248–255https://doi.org/10.1145/3176258.3176330The Rust programming language has a safe memory model that promises to eliminate critical memory bugs. While the language is strong in doing so, its memory guarantees are lost when any unsafe blocks are used. Unsafe code is often needed to call library ...