ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Privacy and Security (TOPS), Volume 19 Issue 2, September 2016

Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis
Article No.: 4
DOI: 10.1145/2960409

In this article, we propose Segugio, a novel defense system that allows for efficiently tracking the occurrence of new malware-control domain names in very large ISP networks. Segugio passively monitors the DNS traffic to build a...

Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks
Zheng Dong, Kevin Kane, L. Jean Camp
Article No.: 5
DOI: 10.1145/2975591

Rogue certificates are valid certificates issued by a legitimate certificate authority (CA) that are nonetheless untrustworthy; yet trusted by web browsers and users. With the current public key infrastructure, there exists a window of...

MAC Precomputation with Applications to Secure Memory
Juan A. Garay, Vladimir Kolesnikov, Rae Mclellan
Article No.: 6
DOI: 10.1145/2943780

We present Shallow MAC (ShMAC), a fixed-input-length message authentication code that performs most of the computation prior to the availability of the message. Specifically, ShMAC’s message-dependent computation is much faster and...