当前期刊: ACM Transactions on Privacy and Security Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-07-06
    Mohamed Nabeel; Issa M. Khalil; Bei Guan; Ting Yu

    Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. Thus, detecting them in a timely manner is important to not only identify cyber attacks but also take preventive measures. There has been a plethora of techniques proposed to detect malicious domains by analyzing Domain Name System (DNS) traffic data

    更新日期:2020-07-06
  • Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-07-06
    Syed Zain Raza Rizvi; Philip W. L. Fong

    Neo4j is a popular graph database that offers two versions: an enterprise edition and a community edition. The enterprise edition offers customizable Role-based Access Control features through custom developed procedures, while the community edition does not offer any access control support. Being a graph database, Neo4j appears to be a natural application for Relationship-Based Access Control (ReBAC)

    更新日期:2020-07-06
  • The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-07-06
    Michalis Diamantaris; Francesco Marcantoni; Sotiris Ioannidis; Jason Polakis

    Modern smartphone sensors can be leveraged for providing novel functionality and greatly improving the user experience. However, sensor data can be misused by privacy-invasive or malicious entities. Additionally, a wide range of other attacks that use mobile sensor data have been demonstrated; while those attacks have typically relied on users installing malicious apps, browsers have eliminated that

    更新日期:2020-07-06
  • Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-06-17
    Daniele Antonioli; Nils Ole Tippenhauer; Kasper Rasmussen

    Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant

    更新日期:2020-07-05
  • The System That Cried Wolf
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-06-12
    Hocheol Shin; Juhwan Noh; Dohyun Kim; Yongdae Kim

    Fire alarm and signaling systems are a networked system of fire detectors, fire control units, automated fire extinguishers, and fire notification appliances. Malfunction of these safety-critical cyber-physical systems may lead to chaotic evacuations, property damage, and even loss of human life. Therefore, reliability is one of the most crucial factors for fire detectors. Indeed, even a single report

    更新日期:2020-06-12
  • Quantum Leap and Crash
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-06-12
    Darren Hurley-Smith; Julio Hernandez-Castro

    Random numbers are essential for cryptography and scientific simulation. Generating truly random numbers for cryptography can be a slow and expensive process. Quantum physics offers a variety of promising solutions to this challenge, proposing sources of entropy that may be genuinely unpredictable, based on the inherent randomness of certain physical phenomena. These properties have been employed to

    更新日期:2020-06-12
  • Privado
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-31
    Sanaz Taheri Boshrooyeh; Alptekin Küpçü; Öznur Özkasap

    Online Social Networks (OSNs) offer free storage and social networking services through which users can communicate personal information with one another. The personal information of the users collected by the OSN provider comes with privacy problems when being monetized for advertising purposes. To protect user privacy, existing studies propose utilizing data encryption that immediately prevents OSNs

    更新日期:2020-05-31
  • Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login
    ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-31
    Giada Sciarretta; Roberto Carbone; Silvio Ranise; Luca Viganò

    Over the last few years, there has been an almost exponential increase in the number of mobile applications that deal with sensitive data, such as applications for e-commerce or health. When dealing with sensitive data, classical authentication solutions based on username-password pairs are not enough, and multi-factor authentication solutions that combine two or more authentication factors of different

    更新日期:2020-05-31
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
材料学研究精选
Springer Nature Live 产业与创新线上学术论坛
胸腔和胸部成像专题
自然科研论文编辑服务
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
杨超勇
周一歌
华东师范大学
段炼
清华大学
中科大
唐勇
跟Nature、Science文章学绘图
隐藏1h前已浏览文章
中洪博元
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
x-mol收录
福州大学
南京大学
王杰
左智伟
电子显微学
何凤
洛杉矶分校
吴杰
赵延川
试剂库存
天合科研
down
wechat
bug