Filters








16 Hits in 11.2 sec

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
or persons as a result of operation or use of this publication and/or the information contained herein.  ...  Although all care is taken to ensure integrity and the quality of this publication and the information herein, no responsibility is assumed by the publishers nor the author for any damage to the property  ...  ., Shamir, A. 1986 The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [1] Brennan L E, Reed I S. Theory of Adaptive Radar.  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

Forward-secure signatures in untrusted update environments

Benoît Libert, Jean-Jacques Quisquater, Moti Yung
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
In combination with Bellare and Neven's multi-signatures, our generic method yields implementations based on standard assumptions such as RSA, factoring or the hardness of computing discrete logarithms  ...  The latter work also suggested the integration of untrusted updates in the Bellare-Miner forward-secure signature and left open the problem of endowing other existing FSS systems with the same second factor  ...  Currently known instantiations of these new "unbounded" systems rely on random oracles only because the underlying multi-signatures do. CCS'07, October 29-November 2, 2007, Alexandria, Virginia, USA.  ... 
doi:10.1145/1315245.1315279 dblp:conf/ccs/LibertQY07 fatcat:iisr5oofevfd3hzep3id3gqzyy

Predicting vulnerable software components

Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
The resulting ranking of the most vulnerable components is a perfect base for further investigations on what makes components vulnerable.  ...  Based on this observation, we were able to extend Vulture by a simple predictor that correctly predicts about half of all vulnerable components, and about two thirds of all predictions are correct.  ...  David Schuler and Andrzej Wasylkowski provided valuable feedback on earlier revisions of this paper.  ... 
doi:10.1145/1315245.1315311 dblp:conf/ccs/NeuhausZHZ07 fatcat:5ofehv7eprhdnlylkuivdksgwm

Protecting browsers from dns rebinding attacks

Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
DNS rebinding attacks subvert the same-origin policy of browsers and convert them into open network proxies.  ...  The primary focus of this work, however, is the design of strong defenses against DNS rebinding attacks that protect modern browsers: we suggest easy-to-deploy patches for plug-ins that prevent large-scale  ...  This work is supported by grants from the National Science Foundation and the US Department of Homeland Security.  ... 
doi:10.1145/1315245.1315298 dblp:conf/ccs/JacksonBBSB07 fatcat:pzxtbcw3lrhvvlxjfzqebhw6ey

Filtering spam with behavioral blacklisting

Anirudh Ramachandran, Nick Feamster, Santosh Vempala
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
The dynamism of any particular IP address begs for blacklisting techniques that automatically adapt as the senders of spam change.  ...  Spam filters often use the reputation of an IP address (or IP address range) to classify email senders.  ...  This work was supported by an NSF CAREER award CNS-0633974, by NSF Cybertrust awards CNS-0721581 and CNS-0716278, by NSF grant CCF-0721503, and in part by the Georgia Tech Algorithms and Randomness Center  ... 
doi:10.1145/1315245.1315288 dblp:conf/ccs/RamachandranFV07 fatcat:cr4owytkj5fkllqhmhx5fnihmu

Preserving privacy in gps traces via uncertainty-aware path cloaking

Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintaining high data accuracy.  ...  To overcome these challenges, we develop a novel time-toconfusion criterion to characterize privacy in a location dataset and propose an uncertainty-aware path cloaking algorithm that hides location samples  ...  Therefore, H(S i ) ≤ H(S i+1 ) and by induction H(S i ) ≤ H(S n ) holds. CCS'07, October 29-November 2, 2007, Alexandria, Virginia, USA.  ... 
doi:10.1145/1315245.1315266 dblp:conf/ccs/HohGXA07 fatcat:gf2flall4fgt3ms3t4kgsa6kzi

An information-theoretic model for adaptive side-channel attacks

Boris Köpf, David Basin
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
We present algorithms and approximation techniques for computing this measure.  ...  We also give examples of how they can be used to analyze the resistance of hardware implementations of cryptographic functions to both timing and power attacks.  ...  CCS'07, October 29-November 2, 2007, Alexandria, Virginia, USA. Copyright 2007 ACM 978-1-59593-703-2/07/0011 ...$5.00. with o ∈ O under m ∈ M whenever f (k, m) = o holds.  ... 
doi:10.1145/1315245.1315282 dblp:conf/ccs/KopfB07 fatcat:voedulvdbvatfc27iz5tzdcvuu

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction

Xuxian Jiang, Xinyuan Wang, Dongyan Xu
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
Specifically, the new technique casts semantic definitions of guest OS data structures and functions on virtual machine monitor (VMM)-level VM states, so that the semantic view can be reconstructed.  ...  To address this limitation, recent solutions based on virtual machine (VM) technologies advocate placing the malware detection facilities outside of the protected VM ("out of the box").  ...  CCS' 07 , 07 October 29-November 2, 2007, Alexandria, Virginia, USA. Copyright 2007 ACM 978-1-59593-703-2/07/0011 ...$5.00.  ... 
doi:10.1145/1315245.1315262 dblp:conf/ccs/JiangWX07 fatcat:i4q4bqluezejzhfrqgyj2vejba

The geometry of innocent flesh on the bone

Hovav Shacham
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
We make use, in an essential way, of the properties of the x86 instruction set.  ...  Our attack combines a large number of short instruction sequences to build gadgets that allow arbitrary computation. We show how to discover such instruction sequences by means of static analysis.  ...  work; Avram Shacham for his detailed comments on the manuscript; and members of the MIT Cryptography and Information Security Seminar, Berkeley Systems Lunch, and Stanford Security Lunch for their comments  ... 
doi:10.1145/1315245.1315313 dblp:conf/ccs/Shacham07 fatcat:72lkacrz2nfhfhxpdnrwlfftoe

Legal Framework And Requirements Of Automotive On-Board Networks (Evita Deliverable 2.4)

Jos Dumortier, Christophe Geuens, Alastair Ruddle, Lester Low, Michael Friedewald
2011 Zenodo  
Thus, EVITA will provide a basis for the secure deployment of electronic safety applications based on vehicleto-vehicle and vehicle-to-infrastructure communication.  ...  The objectives of the EVITA project are to design, to verify, and to prototype security architecture for automotive on-board networks where security-relevant components are protected against tampering  ...  Alexandria, Virginia, USA SESSION: Privacy preserving services and human factors table of contents, p. 99 -107, 2007 144 Rotaru v.  ... 
doi:10.5281/zenodo.1188420 fatcat:y2mmniws5bak3mugmzubmlssjy

Robust defenses for cross-site request forgery

Adam Barth, Collin Jackson, John C. Mitchell
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
For the long term, we propose that browsers implement the Origin header, which provides the security benefits of the Referer header while responding to privacy concerns.  ...  In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges a cross-site request to the login form, logging the victim into the honest web site as the attacker.  ...  To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CCS'08, October 27-31, 2008 , Alexandria, Virginia, USA.  ... 
doi:10.1145/1455770.1455782 dblp:conf/ccs/BarthJM08 fatcat:34vdxn2ierebploif4vzahxqwe

Privacy oracle

Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send.  ...  In several cases, these are leaks of directly identifying information that are regularly sent in the clear (without endto-end encryption) and which could make users vulnerable to tracking by third parties  ...  Stepping forward, efforts are ongoing to increase the coverage and to improve the accuracy of Privacy Oracle. CCS'08, October 27-31, 2008, Alexandria, Virginia, USA.  ... 
doi:10.1145/1455770.1455806 dblp:conf/ccs/JungSGWMK08 fatcat:6yxpj73gkfcudoevfx4mroqkvi

When good instructions go bad

Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
malicious computation by preventing the execution of malicious code.  ...  Finally, we argue that the threat posed by return-oriented programming, across all architectures and systems, has negative implications for an entire class of security mechanisms: those that seek to prevent  ...  on short notice and for a long period of time and the anonymous reviewers for their insightful feedback.  ... 
doi:10.1145/1455770.1455776 dblp:conf/ccs/BuchananRSS08 fatcat:l4lwa63lcrcrzpfjiq44imxvry

Mitigating DNS DoS attacks

Hitesh Ballani, Paul Francis
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
and hence, is a very simple and practical candidate for mitigating the impact of DoS attacks on DNS.  ...  This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of its sub-zones.  ...  Acknowledgements We would like to thank Larry Parmelee at CFS for his help and patience with the DNS collection process.  ... 
doi:10.1145/1455770.1455796 dblp:conf/ccs/BallaniF08 fatcat:taxu45px4zc6hlxcac2zvxsh6a

Education for Sustainable Development [chapter]

2017 Encyclopedia of Educational Philosophy and Theory  
First and foremost, we thank the Egyptian Government whose support for the Conference is highly appreciated especially in this extraordinary time.  ...  Special appreciation goes to the EduCamp team for their contributions in general and to this article in particular. The authors appreciate the effort of  ...  "The SEED: A Peer-to-Peer Environment for Genome Annotation". Commun. ACM 47, no. 11 (2004): 46-51. 31. Peterson, J., et al. "The NIH Human Microbiome Project".  ... 
doi:10.1007/978-981-287-588-4_100294 fatcat:q4eqqvtxvfhypegpq2iwkvdw54
« Previous Showing results 1 — 15 out of 16 results