Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2019
zkay: Specifying and Enforcing Data Privacy in Smart Contracts
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1759–1776https://doi.org/10.1145/3319535.3363222Privacy concerns of smart contracts are a major roadblock preventing their wider adoption. A promising approach to protect private data is hiding it with cryptographic primitives and then enforcing correctness of state updates by Non-Interactive Zero-...
- research-articleNovember 2019
Conjure: Summoning Proxies from Unused Address Space
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2215–2229https://doi.org/10.1145/3319535.3363218Refraction Networking (formerly known as "Decoy Routing") has emerged as a promising next-generation approach for circumventing Internet censorship. Rather than trying to hide individual circumvention proxy servers from censors, proxy functionality is ...
- research-articleNovember 2019
Geneva: Evolving Censorship Evasion Strategies
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2199–2214https://doi.org/10.1145/3319535.3363189Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated Internet-scale censorship techniques and methods to evade them. In this paper, we take a drastic departure from the previously manual ...
- research-articleNovember 2019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues
- Faris Bugra Kokulu,
- Ananta Soneji,
- Tiffany Bao,
- Yan Shoshitaishvili,
- Ziming Zhao,
- Adam Doupé,
- Gail-Joon Ahn
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1955–1970https://doi.org/10.1145/3319535.3354239Organizations, such as companies and governments, created Security Operations Centers (SOCs) to defend against computer security attacks. SOCs are central defense groups that focus on security incident management with capabilities such as monitoring, ...
- research-articleNovember 2019
SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2249–2266https://doi.org/10.1145/3319535.3354219Organized surveillance, especially by governments poses a major challenge to individual privacy, due to the resources governments have at their disposal, and the possibility of overreach. Given the impact of invasive monitoring, in most democratic ...
- research-articleNovember 2019
(Un)informed Consent: Studying GDPR Consent Notices in the Field
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 973–990https://doi.org/10.1145/3319535.3354212Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more than 60 % of popular websites in Europe display cookie consent notices to their visitors. This has quickly led to users becoming fatigued with privacy notifications and ...
- abstractNovember 2019
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2707–2708https://doi.org/10.1145/3319535.3353556Recent years have seen a dramatic increase in applications of Artificial Intelligence (AI) and Machine Learning (ML) to security and privacy problems. The analytic tools and intelligent behavior provided by these techniques make AI and ML increasingly ...
- abstractNovember 2019
18th Workshop on Privacy in the Electronic Society (WPES 2019)
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2705–2706https://doi.org/10.1145/3319535.3353555The 18th Workshop on Privacy in the Electronic Society (WPES 2019) was held on November 11th, 2019, in conjunction with the 26th ACM Conference on Computer and Communications Security (CCS 2019) in London, United Kingdom. The goal of WPES is to bring ...
- abstractNovember 2019
CCSW'19 Workshop Summary: 2019 Cloud Computing Security Workshop
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2693–2694https://doi.org/10.1145/3319535.3353548Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and ...