- Full text PDF available (5)
- This year (0)
- Last 5 years (3)
- Last 10 years (5)
Web applications rely on servers to store and process confidential information. However, anyone who gains access to the server (e.g., an attacker, a curious administrator, or a government) can obtain all of the data stored there. This paper presents Mylar, a platform that provides end-to-end encryption to web applications. Mylar protects the confidentiality… (More)
Methods that bypass analytical evaluations of the likelihood function have become an indispensable tool for statistical inference in many fields of science. These so-called likelihood-free methods rely on accepting and rejecting simulations based on summary statistics, which limits them to low-dimensional models for which the value of the likelihood is… (More)
In this project, we investigate the possible options for users to restrict application permissions in a more fine-grained way and provide a proof of concept for a command-line tool that can remove permissions from applications before installation. We tested our tool with Android 2.2 (Froyo) on an emulated NexusS and a real Samsung Galaxy S GT-I9000.
The purpose of this report is to present the progress made and the effort undertaken during one semester. The amount of time available to students at EPFL for an optional semester project (8 ECTS) is very limited, but it allows the student to participate in and contribute to an ongoing project. This is also the case here. Therefore, you are now reading what… (More)