[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 1, Issue 4December 2020Special Issue on ACSAC'19: Part 1
Reflects downloads up to 12 Dec 2024Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on ACSAC'19: Part 1
research-article
Open Access
Large-scale Debloating of Binary Shared Libraries
Article No.: 19, Pages 1–28https://doi.org/10.1145/3414997

Developers nowadays have access to an arsenal of toolkits and libraries for rapid application prototyping. However, when an application loads a library, the entirety of that library’s code is mapped into the process address space, even if only a single ...

research-article
Open Access
Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data
Article No.: 20, Pages 1–26https://doi.org/10.1145/3419475

Gaining reliable arbitrary code execution through the exploitation of memory corruption vulnerabilities is becoming increasingly more difficult in the face of modern exploit mitigations. Facing this challenge, adversaries have started shifting their ...

research-article
Open Access
Intrusion Survivability for Commodity Operating Systems
Article No.: 21, Pages 1–30https://doi.org/10.1145/3419471

Despite the deployment of preventive security mechanisms to protect the assets and computing platforms of users, intrusions eventually occur. We propose a novel intrusion survivability approach to withstand ongoing intrusions. Our approach relies on an ...

research-article
Open Access
Securing Applications against Side-channel Attacks through Resource Access Veto
Article No.: 22, Pages 1–29https://doi.org/10.1145/3416124

Apps on modern mobile operating systems can access various system resources with, or without, an explicit user permission. Although the OS generally maintains strict separation between apps, an app can still get access to another app’s private ...

research-article
Open Access
ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones
Article No.: 23, Pages 1–29https://doi.org/10.1145/3416125

Application processors of modern smartphones use the AT interface for issuing high-level commands (or AT-commands) to the baseband processor for performing cellular network operations (e.g., placing a phone call). Vulnerabilities in this interface can ...

research-article
Open Access
Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing
Article No.: 24, Pages 1–24https://doi.org/10.1145/3419473

Cookies were originally introduced as a way to provide state awareness to websites, and they are now one of the backbones of the current web. However, their use is not limited to store the login information or to save the current state of user browsing. ...

research-article
Open Access
Will You Trust This TLS Certificate?: Perceptions of People Working in IT (Extended Version)
Article No.: 25, Pages 1–29https://doi.org/10.1145/3419472

Flawed TLS certificates are not uncommon on the Internet. While they signal a potential issue, in most cases they have benign causes (e.g., misconfiguration or even deliberate deployment). This adds fuzziness to the decision on whether to trust a ...

Subjects

Currently Not Available

Comments

Please enable JavaScript to view thecomments powered by Disqus.