Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2014
POSTER: A Measurement Framework to Quantify Software Protections
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 1505–1507https://doi.org/10.1145/2660267.2662360Programs often run under strict usage conditions (e.g., license restrictions) that could be broken in case of code tampering. Possible attacks include malicious reverse engineering, tampering using static, dynamic and hybrid techniques, on standard ...
- tutorialNovember 2014
SIW 2014: First Workshop on Security Information Workers
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 1554https://doi.org/10.1145/2660267.2660387The human element is often considered the weakest element in security. Although many kinds of humans interact with systems that are designed to be secure, one particular type of human is especially important, the security information worker. Security ...
- research-articleNovember 2014
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 674–689https://doi.org/10.1145/2660267.2660347We present the first large-scale studies of three advanced web tracking mechanisms - canvas fingerprinting, evercookies and use of "cookie syncing" in conjunction with evercookies. Canvas fingerprinting, a recently developed form of browser ...
- research-articleNovember 2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 942–953https://doi.org/10.1145/2660267.2660329Traditional software security patches often have the unfortunate side-effect of quickly alerting attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly benefit from this information; it expedites their search for ...