ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 18 Issue 4, May 2016

General Graph Data De-Anonymization: From Mobility Traces to Social Networks
Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, Raheem Beyah
Article No.: 12
DOI: 10.1145/2894760

When people utilize social applications and services, their privacy suffers a potential serious threat. In this article, we present a novel, robust, and effective de-anonymization attack to mobility trace data and social data. First, we design a...

Designing Password Policies for Strength and Usability
Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
Article No.: 13
DOI: 10.1145/2891411

Password-composition policies are the result of service providers becoming increasingly concerned about the security of online accounts. These policies restrict the space of user-created passwords to preclude easily guessed passwords and thus make...

Toward Robotic Robbery on the Touch Screen
Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, Diksha Shukla
Article No.: 14
DOI: 10.1145/2898353

Despite the tremendous amount of research fronting the use of touch gestures as a mechanism of continuous authentication on smart phones, very little research has been conducted to evaluate how these systems could behave if attacked by...