16 Hits in 6.0 sec

Special Issue on "Side Channel Attacks"

Seokhie Hong
2019 Applied Sciences  
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...]  ...  In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3-7 November 2014; pp. 990-1003. 27. Gruss, D.; Maurice, C.; Wagner, K.; Mangard, S.  ...  In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October-3 November 2017; ACM: New York, NY, USA, 2017; pp. 1857-1874. 18.  ... 
doi:10.3390/app9091881 fatcat:uo7wiucsufbv3n4kusbzfyo7ue


Yu Liang, Zhiqiao Li, Xiang Cui
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Security issues of software plugins are seldom studied in existing researches. The plugin mechanism provides a convenient way to extend an application's functionality.  ...  of such malware and illustrate their potential threats.  ...  CCS'14, November 3-7, 2014, Scottsdale, AZ, USA. ACM 978-1-4503-2957-6/14/11. time the corresponding host application starts.  ... 
doi:10.1145/2660267.2662381 dblp:conf/ccs/LiangLC14 fatcat:pz2zmaqytrdptezmzqgfjifsri


Asaf Shabtai, Yuval Elovici
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
In order to optimize their resource allocation, organizations must conduct a thorough risk analysis process so as to focus their efforts and resources on the protection of the organization's important  ...  Today, organizations have limited resources available to allocate to the detection of complex cyber-attacks.  ...  CCS'14, November 3-7, 2014, Scottsdale, AZ, USA ACM 978-1-4503-2957-6/14/11. a set of parameters, p 1 , p 2 , …, p n that are dynamically computed from the data  ... 
doi:10.1145/2660267.2662385 dblp:conf/ccs/ShabtaiE14 fatcat:hesgrodzzbh4hokwtq7blz2ixq


Lei Jin, Balaji Palanisamy, James B.D. Joshi
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Such vulnerability can lead to a new class of attacks called location injection attacks which can successfully break users' anonymity among a set of users through the injection of fake user accounts and  ...  However, a fundamental limitation of such mechanisms is that users in the system are inherently trusted and assumed to always report their true locations.  ...  CCS'14, November 3-7, 2014, Scottsdale, Arizona, USA. ACM 978-1-4503-2957-6/14/11. Figure 1 : 1 Trusted anonymizer architecture.  ... 
doi:10.1145/2660267.2662386 dblp:conf/ccs/JinPJ14 fatcat:divgszsaxrdnbgc2le6uml64n4


Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Experimental results show that our proactive phishing update method is an effective and efficient approach for improving the coverage of the blacklists.  ...  This study explores the existing blacklists to discover suspected URLs that refer to on-the-fly phishing threats in real time.  ...  ACKNOWLEDGEMENTS This research was partially supported by Ministry of Science and Technology, Taiwan under grant MOST 102-2221-E-002-103-MY3, MOST 103-2221-E-003-013-MY3 and the "Aim for the Top University  ... 
doi:10.1145/2660267.2662362 dblp:conf/ccs/LeeLCT14 fatcat:aubrf22rz5gb5dbb7itywqqply


Zheng Wang
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Using the model, we illustrate the effects of Kaminsky cache poisoning and the optimal number of outstanding queries in terms of probability of compromise.  ...  We develop a maximum-efficiency attack model of Kaminsky cache poisoning, which is built on persistent poisoning attempts optimized for more than one windows of opportunity.  ...  CCS'14, November 3-7, 2014, Scottsdale, AZ, USA.  ... 
doi:10.1145/2660267.2662363 dblp:conf/ccs/Wang14 fatcat:j7zpzqpsfbdd5ca4g7kd7jjukq

Differentially Private Set Union

Sivakanth Gopi, Pankaj Gulhane, Janardhan Kulkarni, Judy Hanwen Shen, Milad Shokouhi, Sergey Yekhanin
2021 Journal of Privacy and Confidentiality  
We study the basic operation of set union in the global model of differential privacy. In this problem, we are given a universe $U$ of items, possibly of infinite size, and a database $D$ of users.  ...  We design two new algorithms for differentially private set union, one using Laplace noise and other Gaussian noise, which use $\ell_1$-contractive and $\ell_2$-contractive policies respectively and provide  ...  Yung, and N. Li, editors, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1054–1067.  ... 
doi:10.29012/jpc.780 fatcat:gcnc6eoclrazfoyhy6d4bxtnda


Moushira Abdallah Mohamed Ahmed, Shuhui Wu, Laure Deveriane Dushime, Yuanhong Tao
2021 International Journal of Engineering Technologies and Management Research  
Therefore, the scientists considered on adding shuffle model between users and servers to make the server untrusted where the users communicate with the server through the shuffle and boosting the privacy  ...  We focused on the role of shuffle model for solving the problem between privacy and accuracy by summarizing the recent researches about shuffle model and its practical results.  ...  Conference on computer and communications security, Scottsdale, AZ, USA, 1054-1067.  ... 
doi:10.29121/ijetmr.v8.i11.2021.1028 fatcat:2dlseelznndq3aoau64dcrnaby

Certificate Transparency with Privacy [article]

Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh
2017 arXiv   pre-print
Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues.  ...  Opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of DARPA.  ...  Acknowledgements This work is supported by grants from NSF, DARPA, ONR, and the Simons Foundation.  ... 
arXiv:1703.02209v4 fatcat:4rxoksuwmfexpjynqzkpy74pva

Controlled Functional Encryption

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl Gunter
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
and general classes of functions; and evaluating the performance of our constructions on various application scenarios.  ...  We obtain efficient solutions by carefully combining CCA2 secure public-key encryption (or rerandomizable RCCA secure public-key encryption, depending on the nature of security desired) with Yao's garbled  ...  We evaluate the performance of our C-FE schemes on large scale data and demonstrate its efficiency. ACKNOWLEDGMENTS CCS'14, November 3-7, 2014, Scottsdale, Arizona, USA.  ... 
doi:10.1145/2660267.2660291 dblp:conf/ccs/NaveedAPWAHG14 fatcat:v5aalr2t6faj3kzcdvigqd5z6u

Deniable Liaisons

Abhinav Narain, Nick Feamster, Alex C. Snoeren
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
People sometimes need to communicate directly with one another while concealing the communication itself.  ...  We present the design and implementation of a prototype system that achieves these properties using off-the-shelf 802.11 hardware, evaluate its performance, and assess its resilience to various attacks  ...  We thank Geoff Voelker for suggesting the system name and paper title and Aaron Schulman for his feedback on the paper.  ... 
doi:10.1145/2660267.2660340 dblp:conf/ccs/NarainFS14 fatcat:s5btyptvyffnrlpgvutgjp4h2i

Constrained Differentially Private Federated Learning for Low-bandwidth Devices [article]

Raouf Kerkouche and Gergely Ács and Claude Castelluccia and Pierre Genevès
2021 arXiv   pre-print
First, it is quite bandwidth inefficient as it involves a lot of message exchanges between the aggregating server and the participating entities.  ...  Furthermore, it optimizes the model accuracy by constraining the model learning phase on few selected weights.  ...  Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1054-1067.  ... 
arXiv:2103.00342v1 fatcat:6hoz7gbpincullltbl2e4uy7ae

A Validation Study for Medical Research Based on Synthetic Hospital Data (Preprint)

Anat Reiner Benaim, Ronit Almog, Yuri Gorelik, Irit Hochberg, Laila Nassar, Tanya Mashiach, Mogher Khamaisi, Yael Lurie, Zaher S. Azzam, Johad Khoury, Daniel Kurnik, Rafael Beyar
2019 JMIR Medical Informatics  
When the number of patients was large relative to the number of variables used, highly accurate and strongly consistent results were observed between synthetic and real data.  ...  A comprehensive validation process concerning meaningful clinical questions and various types of data was conducted to assess the accuracy and precision of statistical estimates derived from synthetic  ...  ACM, November 3-7, 2014, Scottsdale, AZ.  ... 
doi:10.2196/16492 pmid:32130148 pmcid:PMC7059086 fatcat:7wgskdg5prcczjhdxqupgdkiwa

Optimizing Secure Computation Programs with Private Conditionals [chapter]

Peeter Laud, Alisa Pankova
2016 Lecture Notes in Computer Science  
and obliviously selecting the effects of one at the end.  ...  Preliminaries Secure multiparty computation In secure multiparty computation (SMC), several parties are communicating over a network.  ...  Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 191-202. ACM, 2014. 34. 12(1-2):67-96, 2012. 35. Andrew Chi-Chih Yao.  ... 
doi:10.1007/978-3-319-50011-9_32 fatcat:h7sq6zbv35avhdcd57mb4ns6ru

Hybrid Publicly Verifiable Computation [chapter]

James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2016 Lecture Notes in Computer Science  
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results.  ...  enforced access control policies restricting the servers that may perform a given computation, and (iii) a reversed model of PVC which we call Verifiable Delegable Computation (VDC) where data is held  ...  This research was partially sponsored by US Army Research laboratory and the UK Ministry of Defence under Agreement Number W911NF-06-3-0001.  ... 
doi:10.1007/978-3-319-29485-8_9 fatcat:g7jrn4pxavfxdcv42hz5yobzoq
« Previous Showing results 1 — 15 out of 16 results