Seismic: Secure in-lined script monitors for interrupting cryptojacks

W Wang, B Ferrell, X Xu, KW Hamlen, S Hao - Computer Security: 23rd …, 2018 - Springer
A method of detecting and interrupting unauthorized, browser-based cryptomining is
proposed, based on semantic signature-matching. The approach addresses a new wave of …

[HTML][HTML] On the Significance of Cryptography as a Service

N Rahimi, JJ Reed, B Gupta - Journal of Information Security, 2018 - scirp.org
Cryptography as a service is becoming extremely popular. It eases the way companies deal
with securing their information without having to worry about their customer's information …

Runtime failure prevention and reaction

Y Falcone, L Mariani, A Rollet, S Saha - Lectures on Runtime Verification …, 2018 - Springer
This chapter describes how to use in-the-field runtime techniques to improve the
dependability of software systems. In particular, we first present an overall vision of the …

Automatic security policy enforcement in computer systems

K Adi, L Hamza, L Pene - computers & security, 2018 - Elsevier
This paper proposes a formal framework for automatic security policy enforcement in
computer systems. In this approach, systems and their interactions are formally modeled as …

Impossibility of precise and sound termination-sensitive security enforcements

M Ngo, F Piessens, T Rezk - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
An information flow policy is termination-sensitive if it imposes that the termination behavior
of programs is not influenced by confidential input. Termination-sensitivity can be statically …

Inscription: Thwarting ActionScript web attacks from within

M Sridhar, A Mohanty, F Yilmaz… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
The design and implementation of Inscription, the first fully automated Adobe Flash binary
code transformation system that can guard major Flash vulnerability categories without …

On transparent value-sensitive run-time monitoring for information flow policies

F Imanimehr, MS Fallah - Computer Languages, Systems & Structures, 2018 - Elsevier
Run-time monitoring proves to be a successful mechanism for enforcing information flow
policies. The main challenge, however, is to achieve transparency which generally demands …