Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 18 Issue 1, June 2015

A Large-Scale Evaluation of High-Impact Password Strength Meters
Xavier De Carné De Carnavalet, Mohammad Mannan
Article No.: 1
DOI: 10.1145/2739044

Passwords are ubiquitous in our daily digital lives. They protect various types of assets ranging from a simple account on an online newspaper website to our health information on government websites. However, due to the inherent value they...

Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Čapkun
Article No.: 2
DOI: 10.1145/2732196

Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to resist double-spending through a distributed timestamping service. To ensure the operation and security of Bitcoin, it is essential that all transactions and their...

vVote: A Verifiable Voting System
Chris Culnane, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague
Article No.: 3
DOI: 10.1145/2746338

The Prêt à Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this article, we present our development of the Prêt à Voter design to a practical...

CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev, Boris Köpf, Laurent Mauborgne, Jan Reineke
Article No.: 4
DOI: 10.1145/2756550

We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration and derives formal, quantitative security guarantees for a comprehensive...