Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 16 Issue 1, June 2013

CPM: Masking Code Pointers to Prevent Code Injection Attacks
Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter
Article No.: 1
DOI: 10.1145/2487222.2487223

Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow....

Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations
William E. Cobb, Rusty O. Baldwin, Eric D. Laspe
Article No.: 2
DOI: 10.1145/2487222.2487224

We propose a generalized framework to evaluate the side-channel information leakage of symmetric block ciphers. The leakage mapping methodology enables the systematic and efficient identification and mitigation of problematic information leakages...

Enforceable Security Policies Revisited
David Basin, Vincent Jugé, Felix Klaedtke, Eugen Zălinescu
Article No.: 3
DOI: 10.1145/2487222.2487225

We revisit Schneider’s work on policy enforcement by execution monitoring. We overcome limitations of Schneider’s setting by distinguishing between system actions that are controllable by an enforcement mechanism and those actions that...

On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem
Jason Crampton, Gregory Gutin, Anders Yeo
Article No.: 4
DOI: 10.1145/2487222.2487226

A workflow specification defines a set of steps and the order in which these steps must be executed. Security requirements may impose constraints on which groups of users are permitted to perform subsets of these steps. A workflow specification is...