Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

With the increasing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet practically-efficient secure search functions over encrypted data a challenging problem. In this paper, we present a privacy-preserving multi-keyword text search (MTS) scheme with similarity-based ranking to address this problem. To support multi-keyword search and search result ranking, we propose to build the search index based on term frequency and the vector space model with cosine similarity measure to achieve higher search result accuracy. To improve the search efficiency, we propose a tree-based index structure and various adaption methods for multi-dimensional (MD) algorithm so that the practical search efficiency is much better than that of linear search. To further enhance the search privacy, we propose two secure index schemes to meet the stringent privacy requirements under strong threat models, i.e., known ciphertext model and known background model. Finally, we demonstrate the effectiveness and efficiency of the proposed schemes through extensive experimental evaluation.

top of pageAUTHORS



Author image not provided  Wenhai Sun

No contact information provided yet.

Bibliometrics: publication history
Publication years2013-2016
Publication count2
Citation Count20
Available for download1
Downloads (6 Weeks)14
Downloads (12 Months)156
Downloads (cumulative)1,092
Average downloads per article1,092.00
Average citations per article10.00
View colleagues of Wenhai Sun


Author image not provided  Bing Wang

No contact information provided yet.

Bibliometrics: publication history
Publication years2013-2015
Publication count3
Citation Count33
Available for download1
Downloads (6 Weeks)14
Downloads (12 Months)156
Downloads (cumulative)1,092
Average downloads per article1,092.00
Average citations per article11.00
View colleagues of Bing Wang


Author image not provided  Ning Cao

No contact information provided yet.

Bibliometrics: publication history
Publication years2008-2014
Publication count9
Citation Count313
Available for download1
Downloads (6 Weeks)14
Downloads (12 Months)156
Downloads (cumulative)1,092
Average downloads per article1,092.00
Average citations per article34.78
View colleagues of Ning Cao


Ming Li Ming Li

Homepage at IBM Research
mingqiangliatcn.ibm.com
Bibliometrics: publication history
Publication years1983-2015
Publication count414
Citation Count4,593
Available for download128
Downloads (6 Weeks)379
Downloads (12 Months)2,616
Downloads (cumulative)68,170
Average downloads per article532.58
Average citations per article11.09
View colleagues of Ming Li


Author image not provided  Wenjing Lou

No contact information provided yet.

Bibliometrics: publication history
Publication years2012-2016
Publication count22
Citation Count202
Available for download9
Downloads (6 Weeks)68
Downloads (12 Months)751
Downloads (cumulative)3,261
Average downloads per article362.33
Average citations per article9.18
View colleagues of Wenjing Lou


Author image not provided  Y. Thomas Hou

No contact information provided yet.

Bibliometrics: publication history
Publication years2003-2016
Publication count25
Citation Count202
Available for download9
Downloads (6 Weeks)68
Downloads (12 Months)762
Downloads (cumulative)3,169
Average downloads per article352.11
Average citations per article8.08
View colleagues of Y. Thomas Hou


Author image not provided  Hui Li

No contact information provided yet.

Bibliometrics: publication history
Publication years2003-2016
Publication count48
Citation Count167
Available for download3
Downloads (6 Weeks)68
Downloads (12 Months)407
Downloads (cumulative)2,109
Average downloads per article703.00
Average citations per article3.48
View colleagues of Hui Li

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

 
1
Keyword and search engines statistics. http://www.keyworddiscovery.com/keyword-stats.html?date=2013-01-01, 2013.
 
2
 
3
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proc. of EUROCRYPT, pages 506--522, 2004.
 
4
 
5
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proc. of IEEE INFOCOM, pages 829--837, 2011.
 
6
7
 
8
Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v3.0. http://www.cloudsecurityalliance.org, 2011.
9
10
 
11
E.-J. Goh. Secure indexes. Cryptology ePrint Archive. http://eprint.iacr.org/2003/216, 2003.
 
12
P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In Proc. of ACNS, pages 31--45, 2004.
 
13
 
14
B. Krebs. Payment processor breach may be largest ever. http://voices.washingtonpost.com/securityfix/2009/01/payment_processor_breach_may_b.html, 2009.
 
15
M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Proc. of SecureComm, pages 89--106, 2010.
 
16
 
17
Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In Proc. of NDSS, 2012.
 
18
NIST. NIST's dictionary of algorithms and data structures: inverted index. http://xlinux.nist.gov/dads/HTML/invertedIndex.html.
 
19
20
 
21
 
22
P. Scheuermann and M. Ouksel. Multidimensional b-trees for associative searching in database systems. Information systems, 7(2):123--137, 1982.
 
23
 
24
J. Sheridan and C. Cooper. Defending the cloud. http://www.reactionpenetrationtesting.co.uk/Defending%20the%20Cloud%20v1.0.pdf, 2012.
 
25
 
26
Z. Slocum. Your google docs: Soon in search results? http://news.cnet.com/8301-17939_109-1035713%207-2.html, 2009.
 
27
28
 
29
 
30
31
 
32
B. Yao, F. Li, and X. Xiao. Secure nearest neighbor revisited. http://www.cs.utah.edu/ lifeifei/papers/snnicde.pdf, to appear intextitICDE, 2013.
 
33
34
35

top of pageCITED BY

17 Citations

 
 
 
 
 
 
 
 
 
 

top of pageINDEX TERMS

The ACM Computing Classification System (CCS rev.2012)

Note: Larger/Darker text within each node indicates a higher relevance of the materials to the taxonomic classification.

top of pagePUBLICATION

Title ASIA CCS '13 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security table of contents
General Chairs Kefei Chen Shanghai Jiao Tong University, China
Qi Xie Hangzhou Normal University, China
Weidong Qiu Shanghai Jiao Tong University, China
Program Chairs Ninghui Li Purdue University, USA
Wen-Guey Tzeng National Chiao Tung University, Taiwan
Pages 71-82
Publication Date2013-05-08 (yyyy-mm-dd)
Sponsor SIGSAC ACM Special Interest Group on Security, Audit, and Control
PublisherACM New York, NY, USA ©2013
ISBN: 978-1-4503-1767-2 Order Number: 459139 doi>10.1145/2484313.2484322
Conference ASIA CCSACM Symposium on Information, Computer and Communications Security ASIA CCS logo
Paper Acceptance Rate 35 of 216 submissions, 16%
Overall Acceptance Rate 507 of 2,686 submissions, 19%
Year Submitted Accepted Rate
ASIACCS '06 186 33 18%
ASIACCS '07 180 33 18%
ASIACCS '08 182 40 22%
ASIACCS '09 147 33 22%
ASIACCS '10 166 25 15%
ASIACCS '11 217 35 16%
ASIACCS '12 159 35 22%
ASIA CCS '13 216 35 16%
ASIA CCS '14 255 50 20%
ASIA CCS '15 269 48 18%
ASIA CCS '16 350 73 21%
ASIA CCS '17 359 67 19%
Overall 2,686 507 19%

APPEARS IN
Digital Content
Interaction
Networking
Software

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Table of Contents
SESSION: Mobile devices security
AppInk: watermarking android apps for repackaging deterrence
Wu Zhou, Xinwen Zhang, Xuxian Jiang
Pages: 1-12
doi>10.1145/2484313.2484315
Full text: PDFPDF

With increased popularity and wide adoption of smartphones and mobile devices, recent years have seen a new burgeoning economy model centered around mobile apps. However, app repackaging, among many other threats, brings tremendous risk to the ecosystem, ...
expand
PSiOS: bring your own privacy & security to iOS devices
Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
Pages: 13-24
doi>10.1145/2484313.2484316
Full text: PDFPDF

Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS provides application sandboxing but assigns a generic sandboxing profile to every third-party application. However, recent attacks and incidents ...
expand
On the effectiveness of API-level access control using bytecode rewriting in Android
Hao Hao, Vicky Singh, Wenliang Du
Pages: 25-36
doi>10.1145/2484313.2484317
Full text: PDFPDF

Bytecode rewriting on Android applications has been widely adopted to implement fine-grained access control. It endows more flexibility and convenience without modifying the Android platform. Bytecode rewriting uses static analysis to identify the usage ...
expand
Designing leakage-resilient password entry on touchscreen mobile devices
Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng
Pages: 37-48
doi>10.1145/2484313.2484318
Full text: PDFPDF

Touchscreen mobile devices are becoming commodities as the wide adoption of pervasive computing. These devices allow users to access various services at anytime and anywhere. In order to prevent unauthorized access to these services, passwords have been ...
expand
Your love is public now: questioning the use of personal information in authentication
Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao
Pages: 49-60
doi>10.1145/2484313.2484319
Full text: PDFPDF

Most social networking platforms protect user's private information by limiting access to it to a small group of members, typically friends of the user, while allowing (virtually) everyone's access to the user's public data. In this paper, we exploit ...
expand
SESSION: Applied cryptography I
Multi-key leakage-resilient threshold cryptography
Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S.M. Chow, Siu Ming Yiu, Yi-Jun He
Pages: 61-70
doi>10.1145/2484313.2484321
Full text: PDFPDF

With the goal of ensuring availability of security services such as encryption and authentication, we initiate the study of leakage-resilient threshold cryptography, for achieving formal security guarantee under various key-exposure attacks. A distinctive ...
expand
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li
Pages: 71-82
doi>10.1145/2484313.2484322
Full text: PDFPDF

With the increasing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet ...
expand
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
Pages: 83-94
doi>10.1145/2484313.2484323
Full text: PDFPDF

This paper discusses how to realize practical post-quantum authenticated key exchange (AKE) with strong security, i.e., CK+ security (Krawczyk, CRYPTO 2005). It is known that strongly secure post-quantum AKE protocols exist on a generic ...
expand
Blank digital signatures
Christian Hanser, Daniel Slamanig
Pages: 95-106
doi>10.1145/2484313.2484324
Full text: PDFPDF

In this paper we present a novel type of digital signatures, which we call blank digital signatures. The basic idea behind this scheme is that an originator can define and sign a message template, describing fixed parts of a message as ...
expand
Pseudorandom signatures
Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
Pages: 107-118
doi>10.1145/2484313.2484325
Full text: PDFPDF

We develop a three-level hierarchy of privacy notions for (unforgeable) digital signature schemes. We first prove mutual independence of existing notions of anonymity and confidentiality, and then show that these are implied by higher privacy goals. ...
expand
SESSION: Software security
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection
Davide Maiorca, Igino Corona, Giorgio Giacinto
Pages: 119-130
doi>10.1145/2484313.2484327
Full text: PDFPDF

PDF files have proved to be excellent malicious-code bearing vectors. Thanks to their flexible logical structure, an attack can be hidden in several ways, and easily deceive protection mechanisms based on file-type filtering. Recent work showed that ...
expand
Efficient user-space information flow control
Ben Niu, Gang Tan
Pages: 131-142
doi>10.1145/2484313.2484328
Full text: PDFPDF

The model of Decentralized Information Flow Control (DIFC) is effective at improving application security and can support rich confidentiality and integrity policies. We describe the design and implementation of duPro, an efficient user-space information ...
expand
SESSION: Short papers I: social network
SocialWatch: detection of online service abuse via large-scale social graphs
Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Z. Morley Mao
Pages: 143-148
doi>10.1145/2484313.2484330
Full text: PDFPDF

In this paper, we present a framework, SocialWatch, to detect attacker-created accounts and hijacked accounts for online services at a large scale. SocialWatch explores a set of social graph properties that effectively model the overall social activity ...
expand
Privacy settings in social networking systems: what you cannot control
Amirreza Masoumzadeh, James Joshi
Pages: 149-154
doi>10.1145/2484313.2484331
Full text: PDFPDF

In this paper, we propose a framework to formally analyze what privacy-sensitive information is protected by the stated policies of a Social Networking System (SNS), based on an expression of ideal protection policies for a user. Our ontology-based framework ...
expand
Trustworthy distributed computing on social networks
Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim
Pages: 155-160
doi>10.1145/2484313.2484332
Full text: PDFPDF

We investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties driven from a bootstrapping trust-possessing social graph. We investigate how this paradigm differs from existing computing paradigms, such ...
expand
On the feasibility of inference attacks by third-party extensions to social network systems
Seyed Hossein Ahmadinejad, Philip W.L. Fong
Pages: 161-166
doi>10.1145/2484313.2484333
Full text: PDFPDF

Social Network Systems (SNSs) providers allow third-party extensions to access users' information through an Application Programming Interface (API). Once an extension has been authorized by a user to access data in a user's profile, there is no more ...
expand
Dynamix: anonymity on dynamic social structures
Abedelaziz Mohaisen, Yongdae Kim
Pages: 167-172
doi>10.1145/2484313.2484334
Full text: PDFPDF

In this paper we advance communication using social networks in two directions by considering dynamics of social graphs. First, we formally define the problem of routing on dynamic graphs and show an interesting and intuitive connection between graph ...
expand
Protecting access privacy of cached contents in information centric networks
Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
Pages: 173-178
doi>10.1145/2484313.2484335
Full text: PDFPDF

In recently proposed information centric networks (ICN), a user issues "interest" packets to retrieve contents from network by names. Once fetched from origin servers, "data" packets are replicated and cached in all routers along routing and forwarding ...
expand
SESSION: Keynote address
The role and effectiveness of cryptography in network virtualization: a position paper
Wenbo Mao
Pages: 179-182
doi>10.1145/2484313.2484337
Full text: PDFPDF

Communications of IT boxes need control. For IT boxes standing on floors, the control is done by wiring the boxes to some machines that specialize in controlling communications. Since through the wires the controlling machines can see the addresses of ...
expand
SESSION: Data outsourcing
Efficient dynamic provable possession of remote data via balanced update trees
Yihua Zhang, Marina Blanton
Pages: 183-194
doi>10.1145/2484313.2484339
Full text: PDFPDF

The emergence and availability of remote storage providers prompted work in the security community that allows a client to verify integrity and availability of the data she outsourced to an untrusted remove storage server at a relatively low cost. Most ...
expand
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
Jia Xu, Ee-Chien Chang, Jianying Zhou
Pages: 195-206
doi>10.1145/2484313.2484340
Full text: PDFPDF

Recently, Halevi et al. (CCS '11) proposed a cryptographic primitive called proofs of ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof of ownership scheme, any owner of the same file F ...
expand
Data-oblivious graph algorithms for secure computation and outsourcing
Marina Blanton, Aaron Steele, Mehrdad Alisagari
Pages: 207-218
doi>10.1145/2484313.2484341
Full text: PDFPDF

This work treats the problem of designing data-oblivious algorithms for classical and widely used graph problems. A data-oblivious algorithm is defined as having the same sequence of operations regardless of the input data and data-independent memory ...
expand
SecLaaS: secure logging-as-a-service for cloud forensics
Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
Pages: 219-230
doi>10.1145/2484313.2484342
Full text: PDFPDF

Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. Analyzing various logs (e.g., process logs, network logs) plays a vital ...
expand
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh B. Bobba, Dong Wook Kim, Yoonjoo Choi, Roy Campbell
Pages: 231-242
doi>10.1145/2484313.2484343
Full text: PDFPDF

Virtual appliances (VAs) are ready-to-use virtual machine images that are configured for specific purposes. For example, a virtual machine image that contains all the software necessary to develop and host a JSP-based website is typically available as ...
expand
SESSION: Applied cryptography II
Expressive search on encrypted data
Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen
Pages: 243-252
doi>10.1145/2484313.2484345
Full text: PDFPDF

Different from the traditional public key encryption, searchable public key encryption allows a data owner to encrypt his data under a user's public key in such a way that the user can generate search token keys using her secret key and then query an ...
expand
Towards asymmetric searchable encryption with message recovery and flexible search authorization
Qiang Tang, Xiaofeng Chen
Pages: 253-264
doi>10.1145/2484313.2484346
Full text: PDFPDF

When outsourcing data to third-party servers, searchable encryption is an important enabling technique which simultaneously allows the data owner to keep his data in encrypted form and the third-party servers to search in the ciphertexts. Motivated by ...
expand
Boolean symmetric searchable encryption
Tarik Moataz, Abdullatif Shikfa
Pages: 265-276
doi>10.1145/2484313.2484347
Full text: PDFPDF

In this article we tackle the issue of searchable encryption with a generalized query model. Departing from many previous works that focused on queries consisting of a single keyword, we consider the the case of queries consisting of arbitrary boolean ...
expand
Multi-channel broadcast encryption
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
Pages: 277-286
doi>10.1145/2484313.2484348
Full text: PDFPDF

Broadcast encryption aims at sending a content to a large arbitrary group of users at once. Currently, the most efficient schemes provide constant-size headers, that encapsulate ephemeral session keys under which the payload is encrypted. However, in ...
expand
Comparative study of multicast authentication schemes with application to wide-area measurement system
Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami
Pages: 287-298
doi>10.1145/2484313.2484349
Full text: PDFPDF

Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic multicast messages, a conventional digital signature scheme is appropriate. To enable authentication of a multicast data ...
expand
SESSION: Software security
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi
Pages: 299-310
doi>10.1145/2484313.2484351
Full text: PDFPDF

Code reuse attacks such as return-oriented programming are one of the most powerful threats to contemporary software. ASLR was introduced to impede these attacks by dispersing shared libraries and the executable in memory. However, in practice its entropy ...
expand
Enforcing system-wide control flow integrity for exploit detection and diagnosis
Aravind Prakash, Heng Yin, Zhenkai Liang
Pages: 311-322
doi>10.1145/2484313.2484352
Full text: PDFPDF

Modern malware like Stuxnet is complex and exploits multiple vulnerabilites in not only the user level processes but also the OS kernel to compromise a system. A main trait of such exploits is manipulation of control flow. There is a pressing need to ...
expand
SESSION: Short papers II: cloud and mobile security
Secure cloud-assisted location based reminder
Xinxin Zhao, Lingjun Li, Guoliang Xue
Pages: 323-328
doi>10.1145/2484313.2484354
Full text: PDFPDF

In this paper, we propose a secure cloud-assisted location based reminder system. The proposed system is secure and responsive. Our system outsources the location testing task --- testing whether the current location is near a reminder location --- to ...
expand
DroidChameleon: evaluating Android anti-malware against transformation attacks
Vaibhav Rastogi, Yan Chen, Xuxian Jiang
Pages: 329-334
doi>10.1145/2484313.2484355
Full text: PDFPDF

Mobile malware threats have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known ...
expand
Bind your phone number with caution: automated user profiling through address book matching on smartphone
Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng
Pages: 335-340
doi>10.1145/2484313.2484356
Full text: PDFPDF

Due to the cost-efficient communicating manner and attractive user experience, messenger applications have dominated every smartphone in recent years. Nowadays, Address Book Matching, a new feature that helps people keep in touch with real world contacts, ...
expand
Towards preventing QR code based attacks on android phone using security warnings
Huiping Yao, Dongwan Shin
Pages: 341-346
doi>10.1145/2484313.2484357
Full text: PDFPDF

QR (Quick Response) code has become quite popular in recent years due to its large storage capacity, ease of generation and distribution, and fast readability. However, it is not likely that users will be able to find out easily the content encoded, ...
expand
Time evolving graphical password for securing mobile devices
Zhan Wang, Jiwu Jing, Liang Li
Pages: 347-352
doi>10.1145/2484313.2484358
Full text: PDFPDF

Increasingly widespread use of mobile devices for processing monetary transactions and accessing business secrets has created a great demand on securing mobile devices. Poorly designed authentication mechanisms (e.g., screen lock and SIM card lock) on ...
expand
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie
Pages: 353-358
doi>10.1145/2484313.2484359
Full text: PDFPDF

Since smartphones have stored diverse sensitive privacy information, including credit card and so on, a great deal of malware are desired to tamper them. As one of the most prevalent platforms, Android contains sensitive resources that can only be accessed ...
expand
SESSION: Privacy and anonymity
k-anonymous reputation
Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum
Pages: 359-368
doi>10.1145/2484313.2484361
Full text: PDFPDF

While performing pure e-business transactions such as purchasing software or music, customers can act anonymously supported by, e.g., anonymous communication protocols and anonymous payment protocols. However, it is hard to establish trust relations ...
expand
Privacy-preserving smart metering with regional statistics and personal enquiry services
Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou
Pages: 369-380
doi>10.1145/2484313.2484362
Full text: PDFPDF

In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, we propose ...
expand
Protecting privacy by sanitizing personal data: a new approach to anonymous credentials
Sébastien Canard, Roch Lescuyer
Pages: 381-392
doi>10.1145/2484313.2484363
Full text: PDFPDF

Anonymous credential systems allow users to obtain certified credentials from organizations and use them later without being traced. For instance, a student will be able to prove, using his student card certified by the University, that he is a student ...
expand
An information-flow type-system for mixed protocol secure computation
Florian Kerschbaum
Pages: 393-404
doi>10.1145/2484313.2484364
Full text: PDFPDF

There are a number of domain-specific programming languages for secure computation. Out of those, the ones that are based on generic programming languages support mixing different protocol primitives and enable implementing a wider, possibly more efficient ...
expand
SESSION: Network security
Robust network traffic identification with unknown applications
Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou
Pages: 405-414
doi>10.1145/2484313.2484366
Full text: PDFPDF

Traffic classification is a fundamental component in advanced network management and security. Recent research has achieved certain success in the application of machine learning techniques into flow statistical feature based approach. However, most ...
expand
STRIDE: sanctuary trail -- refuge from internet DDoS entrapment
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil Gligor, Adrian Perrig
Pages: 415-426
doi>10.1145/2484313.2484367
Full text: PDFPDF

We propose STRIDE, a new DDoS-resilient Internet architecture that isolates attack traffic through viable bandwidth allocation, preventing a botnet from crowding out legitimate flows. This new architecture presents several novel concepts including tree-based ...
expand
Practical verification of WPA-TKIP vulnerabilities
Mathy Vanhoef, Frank Piessens
Pages: 427-436
doi>10.1145/2484313.2484368
Full text: PDFPDF

We describe three attacks on the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). The first attack is a Denial of Service attack that can be executed by injecting only two frames every minute. The second attack demonstrates how fragmentation ...
expand
Faster secure two-party computation with less memory
Wilko Henecka, Thomas Schneider
Pages: 437-446
doi>10.1145/2484313.2484369
Full text: PDFPDF

Secure two-party computation is used as the basis for a large variety of privacy-preserving protocols, but often concerns about the low performance hinder the move away from non-private solutions. In this paper we present an improved implementation of ...
expand
SESSION: Web and mobile security
TabShots: client-side detection of tabnabbing attacks
Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen
Pages: 447-456
doi>10.1145/2484313.2484371
Full text: PDFPDF

As the web grows larger and larger and as the browser becomes the vehicle-of-choice for delivering many applications of daily use, the security and privacy of web users is under constant attack. Phishing is as prevalent as ever, with anti-phishing communities ...
expand
Fuzzing the ActionScript virtual machine
Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang
Pages: 457-468
doi>10.1145/2484313.2484372
Full text: PDFPDF

Fuzz testing is an automated testing technique where random data is used as an input to software systems in order to reveal security bugs/vulnerabilities. Fuzzed inputs must be binaries embedded with compiled bytecodes when testing against ActionScript ...
expand
Sensing-enabled channels for hard-to-detect command and control of mobile devices
Ragib Hasan, Nitesh Saxena, Tzipora Haleviz, Shams Zawoad, Dustin Rinehart
Pages: 469-480
doi>10.1145/2484313.2484373
Full text: PDFPDF

The proliferation of mobile computing devices has enabled immense opportunities for everyday users. At the same time, however, this has opened up new, and perhaps more severe, possibilities for attacks. In this paper, we explore a novel generation of ...
expand
SESSION: Short paper III: software and web security
LogicScope: automatic discovery of logic vulnerabilities within web applications
Xiaowei Li, Yuan Xue
Pages: 481-486
doi>10.1145/2484313.2484375
Full text: PDFPDF

Logic flaws are an important class of vulnerabilities within web applications, which allow sensitive information and restrictive operations to be accessed at inappropriate application states. In this paper, we take a first step towards a systematic black-box ...
expand
Protecting function pointers in binary
Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres
Pages: 487-492
doi>10.1145/2484313.2484376
Full text: PDFPDF

Function pointers have recently become an important attack vector for control-flow hijacking attacks. However, no protection mechanisms for function pointers have yet seen wide adoption. Methods proposed in the literature have high overheads, are not ...
expand
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities
Viet Hung Nguyen, Fabio Massacci
Pages: 493-498
doi>10.1145/2484313.2484377
Full text: PDFPDF

NVD is one of the most popular databases used by researchers to conduct empirical research on data sets of vulnerabilities. Our recent analysis on Chrome vulnerability data reported by NVD has revealed an abnormally phenomenon in the data where almost ...
expand
Horizon extender: long-term preservation of data leakage evidence in web traffic
David Gugelmann, Dominik Schatzmann, Vincent Lenders
Pages: 499-504
doi>10.1145/2484313.2484378
Full text: PDFPDF

This paper presents Horizon Extender, a system for long-term preservation of data leakage evidence in enterprise networks. In contrast to classical network intrusion detection systems that keep only packet records of suspicious traffic (black-listing), ...
expand
SESSION: Short paper IV: applied cryptography and protocols
Towards fully incremental cryptographic schemes
Kévin Atighehchi, Traian Muntean
Pages: 505-510
doi>10.1145/2484313.2484380
Full text: PDFPDF

This paper focus on incremental cryptographic schemes that solve the privacy problem introduced by Bellare, Goldreich and Goldwasser. To our knowledge, none of the schemes designed so far provide simultaneously strong privacy guarantees and byte-wise ...
expand
Anonymous attribute-based encryption supporting efficient decryption test
Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li
Pages: 511-516
doi>10.1145/2484313.2484381
Full text: PDFPDF

Attribute-based encryption (ABE) has been widely studied recently to support fine-grained access control of shared data. Anonymous ABE, which is a relevant notion to ABE, further hides the receivers' attribute information in ciphertexts because many ...
expand
A group signature scheme with unbounded message-dependent opening
Kazuma Ohara, Yusuke Sakai, Keita Emura, Goichiro Hanaoka
Pages: 517-522
doi>10.1145/2484313.2484382
Full text: PDFPDF

Group signature with message-dependent opening (GS-MDO) is a kind of group signature in which only the signers who have created group signatures on problematic messages will be identified. In the previous GS-MDO scheme, however, the number of problematic ...
expand
Attribute-based fine-grained access control with efficient revocation in cloud storage systems
Kan Yang, Xiaohua Jia, Kui Ren
Pages: 523-528
doi>10.1145/2484313.2484383
Full text: PDFPDF

A cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot ...
expand
Covert computation: hiding code in code for obfuscation purposes
Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar Weippl
Pages: 529-534
doi>10.1145/2484313.2484384
Full text: PDFPDF

As malicious software gets increasingly sophisticated and resilient to detection, new concepts for the identification of malicious behavior are developed by academia and industry alike. While today's malware detectors primarily focus on syntactical analysis ...
expand
Proof of plaintext knowledge for code-based public-key encryption revisited
Rong Hu, Kirill Morozov, Tsuyoshi Takagi
Pages: 535-540
doi>10.1145/2484313.2484385
Full text: PDFPDF

In a recent paper at Asiacrypt'2012, Jain et al point out that Veron code-based identification scheme is not perfect zero-knowledge. In particular, this creates a gap in security arguments of proof of plaintext knowledge (PPK) and verifiable encryption ...
expand
An efficient and probabilistic secure bit-decomposition
Bharath K. K. Samanthula, Hu Chun, Wei Jiang
Pages: 541-546
doi>10.1145/2484313.2484386
Full text: PDFPDF

Many secure data analysis tasks, such as secure clustering and classification, require efficient mechanisms to convert the intermediate encrypted integers into the corresponding encryptions of bits. The existing bit-decomposition algorithms either do ...
expand
Defining verifiability in e-auction protocols
Jannik Dreier, Hugo Jonker, Pascal Lafourcade
Pages: 547-552
doi>10.1145/2484313.2484387
Full text: PDFPDF

An electronic auction protocol will only be used by those who trust that it operates correctly. Therefore, e-auction protocols must be verifiable: seller, buyer and losing bidders must all be able to determine that the result was correct. We pose ...
expand
Verifiable and private top-k monitoring
Xuhua Ding, HweeHwa Pang, Junzuo Lai
Pages: 553-558
doi>10.1145/2484313.2484388
Full text: PDFPDF

In a data streaming model, records or documents are pushed from a data owner, via untrusted third-party servers, to a large number of users with matching interests. The match in interest is calculated from the correlation between each pair of document ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us
Did you know the ACM DL App is now available?
Did you know your Organization can subscribe to the ACM Digital Library?
The ACM Guide to Computing Literature
All Tags
Export Formats
 
 
Save to Binder