Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2013
An analysis of the EMV channel establishment protocol
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 373–386https://doi.org/10.1145/2508859.2516748With over 1.6 billion debit and credit cards in use worldwide, the EMV system (a.k.a. "Chip-and-PIN") has become one of the most important deployed cryptographic protocol suites. Recently, the EMV consortium has decided to upgrade the existing RSA based ...
- research-articleNovember 2013
SAuth: protecting user accounts from password database leaks
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 187–198https://doi.org/10.1145/2508859.2516746Password-based authentication is the dominant form of access control in web services. Unfortunately, it proves to be more and more inadequate every year. Even if users choose long and complex passwords, vulnerabilities in the way they are managed by a ...
- research-articleNovember 2013
The robustness of hollow CAPTCHAs
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1075–1086https://doi.org/10.1145/2508859.2516732CAPTCHA is now a standard security technology for differentiating between computers and humans, and the most widely deployed schemes are text-based. While many text schemes have been broken, hollow CAPTCHAs have emerged as one of the latest designs, and ...
- research-articleNovember 2013
Unauthorized origin crossing on mobile platforms: threats and mitigation
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 635–646https://doi.org/10.1145/2508859.2516727With the progress in mobile computing, web services are increasingly delivered to their users through mobile apps, instead of web browsers. However, unlike the browser, which enforces origin-based security policies to mediate the interactions between ...
- research-articleNovember 2013
Measuring password guessability for an entire university
- Michelle L. Mazurek,
- Saranga Komanduri,
- Timothy Vidas,
- Lujo Bauer,
- Nicolas Christin,
- Lorrie Faith Cranor,
- Patrick Gage Kelley,
- Richard Shay,
- Blase Ur
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 173–186https://doi.org/10.1145/2508859.2516726Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets, and password sets specifically collected for a research study or from low-value accounts. ...
-
- research-articleNovember 2013
Relational abstraction in community-based secure collaboration
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 585–598https://doi.org/10.1145/2508859.2516720Users of an online community are willing to share resources because they can expect reasonable behaviour from other members of the community. Such expectations are known as social contracts. In this work, we study the specification and enforcement of ...
- research-articleNovember 2013
Using SMT solvers to automate design tasks for encryption and signature schemes
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 399–410https://doi.org/10.1145/2508859.2516718Cryptographic design tasks are primarily performed by hand today. Shifting more of this burden to computers could make the design process faster, more accurate and less expensive. In this work, we investigate tools for programmatically altering existing ...
- research-articleNovember 2013
Quantifying the security of graphical passwords: the case of android unlock patterns
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 161–172https://doi.org/10.1145/2508859.2516700Graphical passwords were proposed as an alternative to overcome the inherent limitations of text-based passwords, inspired by research that shows that the graphical memory of humans is particularly well developed. A graphical password scheme that has ...
- research-articleNovember 2013
Anonymous credentials light
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1087–1098https://doi.org/10.1145/2508859.2516687We define and propose an efficient and provably secure construction of blind signatures with attributes. Prior notions of blind signatures did not yield themselves to the construction of anonymous credential systems, not even if we drop the ...
- research-articleNovember 2013
Preventing accidental data disclosure in modern operating systems
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1029–1042https://doi.org/10.1145/2508859.2516677Modern OSes such as Android, iOS, and Windows 8 have changed the way consumers interact with computing devices. Tasks are often completed by stringing together a collection of purpose-specific user applications (e.g., a barcode reader, a social ...
- research-articleNovember 2013
Honeywords: making password-cracking detectable
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 145–160https://doi.org/10.1145/2508859.2516671We propose a simple method for improving the security of hashed passwords: the maintenance of additional ``honeywords'' (false passwords) associated with each user's account. An adversary who steals a file of hashed passwords and inverts the hash ...
- research-articleNovember 2013
Delegatable pseudorandom functions and applications
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 669–684https://doi.org/10.1145/2508859.2516668We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrusted proxy and introduce a novel cryptographic primitive called delegatable pseudorandom functions, or DPRFs for short: A DPRF enables a proxy to evaluate ...
- research-articleNovember 2013
Belief semantics of authorization logic
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 561–572https://doi.org/10.1145/2508859.2516667A formal belief semantics for authorization logics is given. The belief semantics is proved to subsume a standard Kripke semantics. The belief semantics yields a direct representation of principals' beliefs, without resorting to the technical machinery ...
- research-articleNovember 2013
When kids' toys breach mobile phone security
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 599–610https://doi.org/10.1145/2508859.2516659Touch-based verification --- the use of touch gestures (e.g., swiping, zooming, etc.) to authenticate users of touch screen devices --- has recently been widely evaluated for its potential to serve as a second layer of defense to the PIN lock mechanism. ...
- posterNovember 2013
POSTER: Sechduler: a security-aware kernel scheduler
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1465–1468https://doi.org/10.1145/2508859.2512527Trustworthy operation of safety-critical infrastructures necessitates efficient solutions that satisfy both realtimeness and security requirements simultaneously. We present Sechduler, a formally verifiable security-aware operating system scheduler that ...
- posterNovember 2013
POSTER: TouchCtrl: fine-grained access control for collaborative environments
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1453–1456https://doi.org/10.1145/2508859.2512524The design of modern desktop operating systems is based on the assumption that a single user controls input and output devices at a time. This is also the case for access control, where applications inherit the privileges from the user that started ...
- posterNovember 2013
POSTER: Secure authentication from facial attributeswith no privacy loss
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1403–1406https://doi.org/10.1145/2508859.2512511Biometric authentication is more secure than using regular passwords, as biometrics cannot be "forgotten" and contain high entropy. Thus, many constructions rely on biometric features for authentication, and use them as a source for "good" cryptographic ...
- posterNovember 2013
POSTER: Enhanced embedded device security by combining hardware-based trust mechanisms
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1395–1398https://doi.org/10.1145/2508859.2512509Nowadays embedded systems in many application areas such as automotive, medical and industrial automation are designed with well-defined hardware and software components which are not meant to be exposed for user modifications. Adding or removing ...
- posterNovember 2013
POSTER: Graphical password using object-based image ranking
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1371–1374https://doi.org/10.1145/2508859.2512503In this paper, we propose a new graphical password using object-based image ranking, called OBIR, which enables appropriate images to be presented to users during authentication. Research on graphical password is being conducted and receiving more and ...
- posterNovember 2013
POSTER: Preserving privacy and accountability for personal devices
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1359–1362https://doi.org/10.1145/2508859.2512500Using personal mobile devices for work gave rise to a trend called "bring your own device", or BYOD. BYOD brings a productivity boost for employees, but also headaches for employers: on the one hand, the business has a legitimate interest in monitoring ...