Skip to main content

Showing 1–3 of 3 results for author: Alaca, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.10631  [pdf, other

    cs.SE cs.AI

    Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck

    Authors: Zhiwei Fu, Steven H. H. Ding, Furkan Alaca, Benjamin C. M. Fung, Philippe Charland

    Abstract: The practice of code reuse is crucial in software development for a faster and more efficient development lifecycle. In reality, however, code reuse practices lack proper control, resulting in issues such as vulnerability propagation and intellectual property infringements. Assembly clone search, a critical shift-right defence mechanism, has been effective in identifying vulnerable code resulting… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 13 pages and 4 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  2. arXiv:1805.00094  [pdf, other

    cs.CR

    Comparative Analysis and Framework Evaluating Web Single Sign-On Systems

    Authors: Furkan Alaca, Paul C. van Oorschot

    Abstract: We perform a comprehensive analysis and comparison of 14 web single sign-on (SSO) systems proposed and/or deployed over the last decade, including federated identity and credential/password management schemes. We identify common design properties and use them to develop a taxonomy for SSO schemes, highlighting the associated trade-offs in benefits (positive attributes) offered. We develop a framew… ▽ More

    Submitted 9 August, 2020; v1 submitted 30 April, 2018; originally announced May 2018.

  3. arXiv:1708.01706  [pdf, other

    cs.CR

    Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes

    Authors: Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot

    Abstract: Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret. This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance dimension. We an… ▽ More

    Submitted 30 March, 2019; v1 submitted 4 August, 2017; originally announced August 2017.