Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 2, November 2014

SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks
Peter Chapin, Christian Skalka
Article No.: 5
DOI: 10.1145/2644809

We describe SpartanRPC, a secure middleware technology that supports cooperation between distinct security domains in wireless sensor networks. SpartanRPC extends nesC to provide a link-layer remote procedure call (RPC) mechanism, along with an...

Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption
Johannes Götzfried, Tilo Müller
Article No.: 6
DOI: 10.1145/2663348

The weakest link in software-based full disk encryption is the authentication procedure. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and...

Know Your Enemy: Compromising Adversaries in Protocol Analysis
David Basin, Cas Cremers
Article No.: 7
DOI: 10.1145/2658996

We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework’s rules can be combined to specify...

StopWatch: A Cloud Architecture for Timing Channel Mitigation
Peng Li, Debin Gao, Michael K. Reiter
Article No.: 8
DOI: 10.1145/2670940

This article presents StopWatch, a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual...