Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2014
POSTER: A Measurement Framework to Quantify Software Protections
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 1505–1507https://doi.org/10.1145/2660267.2662360Programs often run under strict usage conditions (e.g., license restrictions) that could be broken in case of code tampering. Possible attacks include malicious reverse engineering, tampering using static, dynamic and hybrid techniques, on standard ...
- research-articleNovember 2014
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 674–689https://doi.org/10.1145/2660267.2660347We present the first large-scale studies of three advanced web tracking mechanisms - canvas fingerprinting, evercookies and use of "cookie syncing" in conjunction with evercookies. Canvas fingerprinting, a recently developed form of browser ...
- research-articleNovember 2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2014, pp 942–953https://doi.org/10.1145/2660267.2660329Traditional software security patches often have the unfortunate side-effect of quickly alerting attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly benefit from this information; it expedites their search for ...