ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 4, April 2015

Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems
Hyojeong Lee, Jeff Seibert, Dylan Fistrovic, Charles Killian, Cristina Nita-Rotaru
Article No.: 13
DOI: 10.1145/2714565

In this article, we propose Gatling, a framework that automatically finds performance attacks caused by insider attackers in large-scale message-passing distributed systems. In performance attacks, malicious nodes deviate from the protocol when...

Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation
Ziming Zhao, Gail-Joon Ahn, Hongxin Hu
Article No.: 14
DOI: 10.1145/2701423

Picture gesture authentication has been recently introduced as an alternative login experience to text-based password on touch-screen devices. In particular, the newly on market Microsoft Windows 8™ operating system adopts such an...

Dynamic Provable Data Possession
C. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia
Article No.: 15
DOI: 10.1145/2699909

As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model,...

Attacking the Internet Using Broadcast Digital Television
Yossef Oren, Angelos D. Keromytis
Article No.: 16
DOI: 10.1145/2723159

In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a specification called Hybrid Broadcast-Broadband Television (HbbTV), which allows broadcast...