enter search term and/or author name
Guest Editorial: Special Issue on Computer and Communications Security
Paul Syverson, Somesh Jha
Article No.: 1
Return-Oriented Programming: Systems, Languages, and Applications
Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage
Article No.: 2
We introduce return-oriented programming, a technique by which an attacker can induce arbitrary behavior in a program whose control flow he has diverted, without injecting any code. A return-oriented program chains together short...
We narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the Transport Layer Security protocol (TLS 1.0). We make use of the same executable...
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves upon existing approaches, which suffer from a linear number of...
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
Prateek Mittal, Nikita Borisov
Article No.: 5
We analyze information leaks in the lookup mechanisms of structured peer-to-peer (P2P) anonymous communication systems and how these leaks can be used to compromise anonymity. We show that the techniques used to combat active attacks on the lookup...