Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2014
On the effectiveness of risk prediction based on users browsing behavior
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 171–182https://doi.org/10.1145/2590296.2590347Users are typically the final target of web attacks: criminals are interested in stealing their money, their personal information, or in infecting their machines with malicious code. However, while many aspects of web attacks have been carefully studied ...
- research-articleJune 2014
Protecting users against XSS-based password manager abuse
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 183–194https://doi.org/10.1145/2590296.2590336To ease the burden of repeated password authentication on multiple sites, modern Web browsers provide password managers, which offer to automatically complete password fields on Web pages, after the password has been stored once. Unfortunately, these ...
- research-articleJune 2014
VirtualSwindle: an automated attack against in-app billing on android
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 459–470https://doi.org/10.1145/2590296.2590335Since its introduction, Android's in-app billing service has quickly gained popularity. The in-app billing service allows users to pay for options, services, subscriptions, and virtual goods from within mobile apps themselves. In-app billing is ...
- research-articleJune 2014
Malware detection with quantitative data flow graphs
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 271–282https://doi.org/10.1145/2590296.2590319We propose a novel behavioral malware detection approach based on a generic system-wide quantitative data flow model. We base our data flow analysis on the incremental construction of aggregated quantitative data flow graphs. These graphs represent ...
- research-articleJune 2014
Remotely wiping sensitive data on stolen smartphones
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 537–542https://doi.org/10.1145/2590296.2590318Smartphones are playing an increasingly important role in personal life and carrying massive private data. Unfortunately, once the smartphones are stolen, all the sensitive information, such as contacts, messages, photos, credit card information and ...
- short-paperJune 2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 525–530https://doi.org/10.1145/2590296.2590311With the constant migration of applications from the desktop to the web, power users have found ways of enhancing web applications, at the client-side, according to their needs.
In this paper, we investigate this phenomenon by focusing on the popular ...
- short-paperJune 2014
Cyber defenses for physical attacks and insider threats in cloud computing
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 519–524https://doi.org/10.1145/2590296.2590310In cloud computing, most of the computations and data in the data center do not belong to the cloud provider. This leaves owners of applications and data concerned about cyber and physical attacks which may compromise the confidentiality, integrity or ...
- short-paperJune 2014
How many down?: toward understanding systematic risk in networks
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 495–500https://doi.org/10.1145/2590296.2590308The systematic risk of a networked system depends to a large extent on its topology. In this paper, we explore this dependency using a model of risk propagation from the literature on interdependent security games. Our main area of focus is on the ...
- research-articleJune 2014
Privacy-preserving distance computation and proximity testing on earth, done right
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 99–110https://doi.org/10.1145/2590296.2590307In recent years, the availability of GPS-enabled smartphones have made location-based services extremely popular. A multitude of applications rely on location information to provide a wide range of services. Location information is, however, extremely ...
- research-articleJune 2014
pTwitterRec: a privacy-preserving personalized tweet recommendation framework
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 365–376https://doi.org/10.1145/2590296.2590304Twitter is one of the most popular Online Social Networks (OSNs) nowadays. Twitter users retrieve information from other users by subscribing to their tweets. Twitter users, especially those who have many followees, may receive hundreds or even ...
- research-articleJune 2014
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 353–364https://doi.org/10.1145/2590296.2590302A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a botnet to send it. Each of these three elements are critical for the success of the spam operation: a good email list should be composed ...
- research-articleJune 2014
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 317–328https://doi.org/10.1145/2590296.2590300Infrastructure as a Service (IaaS) cloud has been attracting more and more customers as it provides the highest level of flexibility by offering configurable virtual machines (VMs) and computing infrastructures. Public VM images are usually available ...