Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2019
Poster: Let History not Repeat Itself (this Time) -- Tackling WebAuthn Developer Issues Early On
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2669–2671https://doi.org/10.1145/3319535.3363283The FIDO2 open authentication standard, developed jointly by the FIDO Alliance and the W3C, provides end-users with the means to use public-key cryptography in addition to or even instead of text-based passwords for authentication on the web. Its ...
- posterNovember 2019
Poster: Video Fingerprinting in Tor
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2629–2631https://doi.org/10.1145/3319535.3363273Over 8 million users rely on the Tor network each day to protect their anonymity online. Unfortunately, Tor has been shown to be vulnerable to the website fingerprinting attack, which allows an attacker to deduce the website a user is visiting based on ...
- posterNovember 2019
Poster: Adversarial Examples for Hate Speech Classifiers
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2621–2623https://doi.org/10.1145/3319535.3363271With the advent of the Internet, social media platforms have become an increasingly popular medium of communication for people. Platforms like Twitter and Quora allow people to express their opinions on a large scale. These platforms are, however, ...
- posterNovember 2019
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2617–2619https://doi.org/10.1145/3319535.3363270Facebook remains the largest social media platform on the Internet with over one billion active monthly users. A variety of personal and sensitive data is shared on the platform, which makes it a prime target for attackers. Increasingly, we see phishing ...
- posterNovember 2019
Poster: Towards Robust Open-World Detection of Deepfakes
- Saniat Javid Sohrawardi,
- Akash Chintha,
- Bao Thai,
- Sovantharith Seng,
- Andrea Hickerson,
- Raymond Ptucha,
- Matthew Wright
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2613–2615https://doi.org/10.1145/3319535.3363269There is heightened concern over deliberately inaccurate news. Recently, so-called deepfake videos and images that are modified by or generated by artificial intelligence techniques have become more realistic and easier to create. These techniques could ...
-
- posterNovember 2019
simFIDO: FIDO2 User Authentication with simTPM
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2569–2571https://doi.org/10.1145/3319535.3363258WebAuthn as part of FIDO2 is a new standard for two-factor and even password-less user authentication to web-services. Leading browsers, like Google Chrome, Microsoft Edge, and Mozilla Firefox, support the WebAuthn API. Unfortunately, the availability ...
- posterNovember 2019
Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2541–2543https://doi.org/10.1145/3319535.3363251Private Function Evaluation (PFE) allows two parties to jointly compute a private function provided by one party on the secret input of the other party. However, in many applications it is not required to hide the whole function, which is called Semi-...
- posterNovember 2019
Force vs. Nudge: Comparing Users' Pattern Choices on SysPal and TinPal
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2537–2539https://doi.org/10.1145/3319535.3363250Android's 3X3 graphical pattern lock scheme is one of the widely used authentication method on smartphone devices. However, users choose 3X3 patterns from a small subspace of all possible 389,112 patterns. The two recently proposed interfaces, SysPal by ...
- research-articleNovember 2019
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1971–1988https://doi.org/10.1145/3319535.3363220The correct configuration of HTTPS is a complex set of tasks, which many administrators have struggled with in the past. Let's Encrypt and Electronic Frontier Foundation's Certbot aim to improve the TLS ecosystem by offering free trusted certificates (...
- research-articleNovember 2019
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 395–412https://doi.org/10.1145/3319535.3363207Homomorphic Encryption (HE) is a cryptosystem which supports computation on encrypted data. Ló pez-Alt et al. (STOC 2012) proposed a generalized notion of HE, called Multi-Key Homomorphic Encryption (MKHE), which is capable of performing arithmetic ...
- research-articleNovember 2019
SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1639–1656https://doi.org/10.1145/3319535.3363202End-to-end encrypted messaging (E2E) is only secure if participants have a way to retrieve the correct public key for the desired recipient. However, to make these systems usable, users must be able to replace their keys (e.g. when they lose or reset ...
- research-articleNovember 2019
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing
- Ben Weinshel,
- Miranda Wei,
- Mainack Mondal,
- Euirim Choi,
- Shawn Shan,
- Claire Dolin,
- Michelle L. Mazurek,
- Blase Ur
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 149–166https://doi.org/10.1145/3319535.3363200Internet companies track users' online activity to make inferences about their interests, which are then used to target ads and personalize their web experience. Prior work has shown that existing privacy-protective tools give users only a limited ...
- research-articleNovember 2019
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
- Josh Aas,
- Richard Barnes,
- Benton Case,
- Zakir Durumeric,
- Peter Eckersley,
- Alan Flores-López,
- J. Alex Halderman,
- Jacob Hoffman-Andrews,
- James Kasten,
- Eric Rescorla,
- Seth Schoen,
- Brad Warren
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2473–2487https://doi.org/10.1145/3319535.3363192Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has grown to become the world's largest HTTPS CA, accounting for more ...
- research-articleNovember 2019
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2489–2504https://doi.org/10.1145/3319535.3363188The public key infrastructure (PKI) provides the fundamental property of authentication: the means by which users can know with whom they are communicating online. The PKI ensures end-to-end authenticity insofar as it verifies a chain of certificates, ...
- research-articleNovember 2019
Membership Privacy for Fully Dynamic Group Signatures
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2181–2198https://doi.org/10.1145/3319535.3354257Group signatures present a compromise between the traditional goals of digital signatures and the need for signer privacy, allowing for the creation of unforgeable signatures in the name of a group which reveal nothing about the actual signer's identity ...
- research-articleNovember 2019
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1469–1483https://doi.org/10.1145/3319535.3354240Being an easy-to-deploy and cost-effective low power wireless solution, Bluetooth Low Energy (BLE) has been widely used by Internet-of-Things (IoT) devices. In a typical IoT scenario, an IoT device first needs to be connected with its companion mobile ...
- research-articleNovember 2019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues
- Faris Bugra Kokulu,
- Ananta Soneji,
- Tiffany Bao,
- Yan Shoshitaishvili,
- Ziming Zhao,
- Adam Doupé,
- Gail-Joon Ahn
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1955–1970https://doi.org/10.1145/3319535.3354239Organizations, such as companies and governments, created Security Operations Centers (SOCs) to defend against computer security attacks. SOCs are central defense groups that focus on security incident management with capabilities such as monitoring, ...
- research-articleNovember 2019
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 887–903https://doi.org/10.1145/3319535.3354238Multiparty computation as a service (MPSaaS) is a promising approach for building privacy-preserving communication systems. However, in this paper, we argue that existing MPC implementations are inadequate for this application as they do not address ...
- research-articleNovember 2019
SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2249–2266https://doi.org/10.1145/3319535.3354219Organized surveillance, especially by governments poses a major challenge to individual privacy, due to the resources governments have at their disposal, and the possibility of overreach. Given the impact of invasive monitoring, in most democratic ...
- research-articleNovember 2019
(Un)informed Consent: Studying GDPR Consent Notices in the Field
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 973–990https://doi.org/10.1145/3319535.3354212Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more than 60 % of popular websites in Europe display cookie consent notices to their visitors. This has quickly led to users becoming fatigued with privacy notifications and ...