Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2023
Privacy Policies across the Ages: Content of Privacy Policies 1996–2021
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 3Article No.: 32, Pages 1–32https://doi.org/10.1145/3590152It is well known that most users do not read privacy policies but almost always tick the box to agree with them. While the length and readability of privacy policies have been well studied and many approaches for policy analysis based on natural language ...
- research-articleJuly 2022
Privacy Analysis of Query-Set-Size Control
ACM Transactions on Privacy and Security (TOPS), Volume 25, Issue 4Article No.: 31, Pages 1–19https://doi.org/10.1145/3532774The publication of user data for statistical analysis and research can be extremely beneficial for both academic and commercial uses, such as statistical research and recommendation systems. To maintain user privacy when such a publication occurs many ...
- research-articleJanuary 2021
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization
ACM Transactions on Privacy and Security (TOPS), Volume 24, Issue 2Article No.: 12, Pages 1–35https://doi.org/10.1145/3439405The ability to measure privacy accurately and consistently is key in the development of new privacy protections. However, recent studies have uncovered weaknesses in existing privacy metrics, as well as weaknesses caused by the use of only a single ...
- research-articleSeptember 2020
The Tip of the Iceberg: On the Merits of Finding Security Bugs
ACM Transactions on Privacy and Security (TOPS), Volume 24, Issue 1Article No.: 3, Pages 1–33https://doi.org/10.1145/3406112In this article, we investigate a fundamental question regarding software security: Is the security of SW releases increasing over time? We approach this question with a detailed analysis of the large body of open-source software packaged in the popular ...
- research-articleJune 2020
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
ACM Transactions on Privacy and Security (TOPS), Volume 23, Issue 3Article No.: 15, Pages 1–32https://doi.org/10.1145/3393926Fire alarm and signaling systems are a networked system of fire detectors, fire control units, automated fire extinguishers, and fire notification appliances. Malfunction of these safety-critical cyber-physical systems may lead to chaotic evacuations, ...
-
- research-articleApril 2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
ACM Transactions on Privacy and Security (TOPS), Volume 23, Issue 2Article No.: 8, Pages 1–27https://doi.org/10.1145/3380466The web is a tangled mass of interconnected services, whereby websites import a range of external resources from various third-party domains. The latter can also load further resources hosted on other domains. For each website, this creates a dependency ...
- research-articleSeptember 2017
Measuring, Characterizing, and Detecting Facebook Like Farms
- Muhammad Ikram,
- Lucky Onwuzurike,
- Shehroze Farooqi,
- Emiliano De Cristofaro,
- Arik Friedman,
- Guillaume Jourjon,
- Mohammed Ali Kaafar,
- M. Zubair Shafiq
ACM Transactions on Privacy and Security (TOPS), Volume 20, Issue 4Article No.: 13, Pages 1–28https://doi.org/10.1145/3121134Online social networks offer convenient ways to reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page ...
- research-articleMay 2017
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning
ACM Transactions on Privacy and Security (TOPS), Volume 20, Issue 2Article No.: 4, Pages 1–25https://doi.org/10.1145/3041760We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of “hiding in the crowd” privacy. We introduce a novel matrix factorization approach suited to ...
- research-articleJanuary 2017
Evaluating the Strength of Genomic Privacy Metrics
ACM Transactions on Privacy and Security (TOPS), Volume 20, Issue 1Article No.: 2, Pages 1–34https://doi.org/10.1145/3020003The genome is a unique identifier for human individuals. The genome also contains highly sensitive information, creating a high potential for misuse of genomic data (for example, genetic discrimination). In this article, we investigate how genomic ...
- research-articleJuly 2015
Model Checking Distributed Mandatory Access Control Policies
ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 2Article No.: 6, Pages 1–25https://doi.org/10.1145/2785966This work examines the use of model checking techniques to verify system-level security properties of a collection of interacting virtual machines. Specifically, we examine how local access control policies implemented in individual virtual machines and ...
- research-articleJune 2015
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 1Article No.: 4, Pages 1–32https://doi.org/10.1145/2756550We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration and derives formal, quantitative security guarantees for a comprehensive set of ...
- research-articleNovember 2014
Know Your Enemy: Compromising Adversaries in Protocol Analysis
ACM Transactions on Information and System Security (TISSEC), Volume 17, Issue 2Article No.: 7, Pages 1–31https://doi.org/10.1145/2658996We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework’s rules can be combined to specify different ...
- research-articleSeptember 2013
Modelling Access Propagation in Dynamic Systems
ACM Transactions on Information and System Security (TISSEC), Volume 16, Issue 2Article No.: 5, Pages 1–31https://doi.org/10.1145/2516951.2516952Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often difficult ...
- research-articleJune 2013
Enforceable Security Policies Revisited
ACM Transactions on Information and System Security (TISSEC), Volume 16, Issue 1Article No.: 3, Pages 1–26https://doi.org/10.1145/2487222.2487225We revisit Schneider’s work on policy enforcement by execution monitoring. We overcome limitations of Schneider’s setting by distinguishing between system actions that are controllable by an enforcement mechanism and those actions that are only ...
- research-articleApril 2013
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 4Article No.: 18, Pages 1–28https://doi.org/10.1145/2445566.2445570Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to protect tens of thousands of resources, and there is a need for verification to ...
- research-articleJuly 2012
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 2Article No.: 10, Pages 1–27https://doi.org/10.1145/2240276.2240281Runtime monitoring is an increasingly popular method to ensure the safe execution of untrusted codes. Monitors observe and transform the execution of these codes, responding when needed to correct or prevent a violation of a user-defined security ...
- research-articleMarch 2012
Verified Cryptographic Implementations for TLS
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 1Article No.: 3, Pages 1–32https://doi.org/10.1145/2133375.2133378We narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the Transport Layer Security protocol (TLS 1.0). We make use of the same executable code ...
- research-articleDecember 2010
A Simple and Generic Construction of Authenticated Encryption with Associated Data
ACM Transactions on Information and System Security (TISSEC), Volume 13, Issue 4Article No.: 33, Pages 1–16https://doi.org/10.1145/1880022.1880027We revisit the problem of constructing a protocol for performing Authenticated Encryption with Associated Data (AEAD). A technique is described which combines a collision-resistant hash function with a protocol for Authenticated Encryption (AE). The ...