The proceedings contain 111 papers. The topics discussed include: Fides: selectively hardening software application components against kernel-level or process-level malware;Vigilare: toward snoop-based kernel integrit...
ISBN:
(纸本)9781450316507
The proceedings contain 111 papers. The topics discussed include: Fides: selectively hardening software application components against kernel-level or process-level malware;Vigilare: toward snoop-based kernel integrity monitor;why Eve and Mallory love Android: an analysis of Android SSL (in)security;enhancing Tor's performance using real-time traffic classification;SkypeMorph: protocol obfuscation for Tor bridges;StegoTorus: a camouflage proxy for the Tor anonymity system;CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing;adaptive defenses for commodity software through virtual application partitioning;binary stirring: self-randomizing instruction addresses of legacy X86 binary code;Aligot: cryptographic function identification in obfuscated binary programs;new privacy issues in mobile telephony: fix and verification;hourglass schemes: how to prove that cloud files are encrypted;and cross-VM side channels and their use to extract private keys.
The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring ...
详细信息
ISBN:
(纸本)9781450338325
The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring and disaster recovery, etc. The explosion in the number of interconnected devices makes it a challenge to guarantee their security, the security of their networks and the privacy of the data collected by them. The Workshop on Trustworthy Embedded Devices (TrustED) focuses on all aspects of security and privacy related to embedded systems and the IoTS. TrustED 2015 continues a successful series of workshops, which were held in conjunction with ESORICS 2011, IEEE security & Privacy 2012, acmccs 2013 and acmccs 2014 (see http://*** for details). The goal of this workshop is to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems.
Trusted computing plays a pivotal role to facilitate a party to evaluate the integrity of others or to ensure desired security assurance, which is a very challenging task in large-scale and heterogeneous computing env...
详细信息
ISBN:
(纸本)9781450316507
Trusted computing plays a pivotal role to facilitate a party to evaluate the integrity of others or to ensure desired security assurance, which is a very challenging task in large-scale and heterogeneous computing environments. Built upon the success from 2006 to 2011, the seventh acm Workshop on Scalable Trusted Computing continues to serve as a forum for researchers as well as practitioners to disseminate and discuss recent advances and emerging issues. This proceedings includes selected papers that focus on system architectures, enabling mechanisms, and novel applications of trusted computing.
The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring ...
详细信息
ISBN:
(纸本)9781450329576
The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring and disaster recover, etc. In fact, ABI Research [1] and Gartner [2] estimate that there will be between 20 and 30 billion devices on the IoTS by 2020. The explosion in the number of interconnected devices makes it a challenge to guarantee their security, the security of their networks and the privacy of the data collected by them. The Workshop on Trustworthy Embedded Devices (TrustED) focuses on all aspects of security and privacy related to embedded systems and the IoTS. TrustED 2014 continues a successful series of workshops, which were held in conjunction with ESORICS 2011, IEEE security & Privacy 2012, and acmccs 2013 (see http://*** for details). The goal of this workshop is to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems.
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the market...
详细信息
ISBN:
(纸本)9781450316507
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the markets to decide, yet one thing is certain: clouds bring with them new untested deployment and associated adversarial models and vulnerabilities. It is essential that our community becomes involved at this early stage. The ccsW workshop aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing to act as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.
As more and more systems are controlled by computers and connected to the Internet, a tremendous amount of activity is generated when these systems interact with each other and with their users. The continuous stream ...
详细信息
ISBN:
(纸本)9781450316507
As more and more systems are controlled by computers and connected to the Internet, a tremendous amount of activity is generated when these systems interact with each other and with their users. The continuous stream of data related to such Internet-connected and computer-controlled systems is known as Big Data and introduces problems at new scales. computersecurity and privacy can both benefit and suffer from Big Data, as tools and techniques are made readily available to process security-event streams and as attacks are harder to detect in the huge volume of event data. The BADGERS'12 workshop is a forum for discussing the challenges in and potential solutions for taking advantage of Big Data for improving computersecurity and privacy. The workshop builds on the successful first edition of BADGERS which was held in conjunction with the EuroSys 2011 conference in Salzburg, Austria [3].
This paper addresses the question of how TA-security, a semantics for intransitive information-flow policies in deterministic systems, can be generalized to nondeterministic systems. Various definitions are proposed, ...
详细信息
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer s...
详细信息
ISBN:
(纸本)9781450316507
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself. This tutorial presents some of these hardware-enhanced security techniques to the security community.
Mobile devices such as smartphones and Internet-capable tablets have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a sour...
详细信息
ISBN:
(纸本)9781450316507
Mobile devices such as smartphones and Internet-capable tablets have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. The operating systems supporting these new devices have both advantages and disadvantages with respect to offered security. On one hand, they use application sandboxing to contain exploits and limit privileges given to malware. On the other hand, they collect and organize many forms of security- and privacy-sensitive information simply as a matter of operation, and make that information easily accessible to downloaded third-party applications. Recognizing smartphone security and privacy as the emerging area, this workshop intends to provide a venue for interested researchers and practitioners to get together and exchange ideas, thus to deepen our understanding to various security and privacy issues on smartphones, specifically the platforms such as iOS and Android. To this end, the workshop solicits both technical and position paper submissions with a variety of relevant topics and further strongly encourages novel paradigms and controversial ideas. With strong engagement from our community, the workshop emerges as a vibrant venue for creative debate and interaction in security-and privacy-sensitive areas of computing and communication broadly impacted by smartphones and mobile devices.
This paper provides the provable-security treatment of path vector routing protocols. We first design a security definition for routing path vector protocols by studying, generalizing, and formalizing numerous known t...
详细信息
暂无评论