ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security, Volume 15 Issue 1, March 2012

Guest Editorial: Special Issue on Computer and Communications Security
Paul Syverson, Somesh Jha
Article No.: 1
DOI: 10.1145/2133375.2133376

Return-Oriented Programming: Systems, Languages, and Applications
Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage
Article No.: 2
DOI: 10.1145/2133375.2133377

We introduce return-oriented programming, a technique by which an attacker can induce arbitrary behavior in a program whose control flow he has diverted, without injecting any code. A return-oriented program chains together short...

Verified Cryptographic Implementations for TLS
Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zălinescu
Article No.: 3
DOI: 10.1145/2133375.2133378

We narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the Transport Layer Security protocol (TLS 1.0). We make use of the same executable...

Efficient Attributes for Anonymous Credentials
Jan Camenisch, Thomas Groß
Article No.: 4
DOI: 10.1145/2133375.2133379

We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves upon existing approaches, which suffer from a linear number of...

Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
Prateek Mittal, Nikita Borisov
Article No.: 5
DOI: 10.1145/2133375.2133380

We analyze information leaks in the lookup mechanisms of structured peer-to-peer (P2P) anonymous communication systems and how these leaks can be used to compromise anonymity. We show that the techniques used to combat active attacks on the lookup...