|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dongwan Shin, Rodrigo Lopes |
An empirical study of visual security cues to prevent the SSLstripping attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 287-296, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei Li 0003, Yuan Xue 0001 |
BLOCK: a black-box approach for detection of state violation attacks towards web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 247-256, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna |
Hit 'em where it hurts: a live security exercise on cyber situational awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 51-61, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Pelizzi, R. Sekar 0001 |
A server- and browser-transparent CSRF defense for web 2.0 applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 257-266, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh |
Mitigating code-reuse attacks with control-flow locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 353-362, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | W. Brad Moore, Chris Wacek, Micah Sherr |
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 207-216, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dhilung Kirat, Giovanni Vigna, Christopher Kruegel |
BareBox: efficient malware analysis on bare-metal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 403-412, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin 0001 |
Attacks on WebView in the Android system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 343-352, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Terry Benzel |
The science of cyber security experimentation: the DETER project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 137-148, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee |
Understanding the prevalence and use of alternative plans in malware with network games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 1-10, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chenglong Li 0001, Yibo Xue, Yingfei Dong, Dongsheng Wang 0002 |
"Super nodes" in Tor: existence and security implication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 217-226, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun |
Enabling secure VM-vTPM migration in private clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 187-196, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao |
deRop: removing return-oriented programming from malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 363-372, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiapu Luo, Peng Zhou 0002, Junjie Zhang 0004, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang |
Exposing invisible timing-based traffic watermarks with BACKLIT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 197-206, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jennia Hizver, Tzi-cker Chiueh |
Tracking payment card data flow using virtual machine state introspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 277-285, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matt Blaze |
Key escrow from a safe distance: looking back at the Clipper Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 317-321, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Omid Fatemieh, Michael LeMay, Carl A. Gunter |
Reliable telemetry in white spaces using remote attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 323-332, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nilesh Nipane, Italo Dacosta, Patrick Traynor |
"Mix-in-Place" anonymous networking using secure function evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 63-72, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang |
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 297-306, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jing Xie 0011, Bill Chu, Heather Richter Lipford, John T. Melton |
ASIDE: IDE support for web application security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 267-276, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash 0001, Karem A. Sakallah |
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 31-40, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Markus Huber 0001, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl |
Social snapshots: digital forensics for online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 113-122, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Awad E. Ahmed, Issa Traoré |
Dynamic sample size detection in continuous authentication using sequential sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 169-176, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna |
Nexat: a history-based approach to predict attacker actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 383-392, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahren Studer, Timothy Passaro, Lujo Bauer |
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 333-342, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shardul Vikram, Yinan Fan, Guofei Gu |
SEMAGE: a new image-based two-factor CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 237-246, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel |
FORECAST: skimming off the malware cream. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 11-20, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Neugschwandtner, Paolo Milani Comparetti, Christian Platzer |
Detecting malware's failover C&C strategies with squeeze. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 21-30, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen |
WebJail: least-privilege integration of third-party components in web mashups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 307-316, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Max Hlywa, Robert Biddle, Andrew S. Patrick |
Facing the facts about image type in recognition-based graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 149-158, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, Ruby B. Lee |
A framework for testing hardware-software security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 387-397, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shengzhi Zhang, Xiaoqi Jia, Peng Liu 0005, Jiwu Jing |
Cross-layer comprehensive intrusion harm analysis for production workload server systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 297-306, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Heusser, Pasquale Malacaria |
Quantifying information leaks in software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 261-269, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chengfang Fang, Ee-Chien Chang |
Securing interactive sessions using mobile device through visual channel and visual inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 69-78, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna |
Detecting spammers on social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 1-9, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia |
Who is tweeting on Twitter: human, bot, or cyborg? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 21-30, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers |
Keeping data secret under full compromise using porter devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 241-250, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhou Li 0001, XiaoFeng Wang 0001 |
FIRM: capability-based inline mediation of Flash behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 181-190, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jin Han, Meng Pan, Debin Gao, HweeHwa Pang |
A multi-user steganographic file system on untrusted shared storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 317-326, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ellick Chan, Shivaram Venkataraman, Francis M. David, Amey Chaugule, Roy H. Campbell |
Forenscope: a framework for live forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 307-316, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos |
Paranoid Android: versatile protection for smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 347-356, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Tillich, Mario Kirschbaum, Alexander Szekely |
SCA-resistant embedded processors: the next generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 211-220, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Gallo, Henrique Kawakami, Ricardo Dahab, Rafael Azevedo, Saulo Lima, Guido Araujo |
T-DRE: a hardware trusted computing base for direct recording electronic vote machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 191-198, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ang Cui, Salvatore J. Stolfo |
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 97-106, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrew G. West, Adam J. Aviv, Jian Chang, Insup Lee 0001 |
Spam mitigation using spatio-temporal reputations from blacklist history. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 161-170, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda |
G-Free: defeating return-oriented programming through gadget-less binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 49-58, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tom Longstaff, David M. Balenson, Mark Matties |
Barriers to science in security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 127-129, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Konrad Rieck, Tammo Krueger, Andreas Dewald |
Cujo: efficient detection and prevention of drive-by-download attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 31-39, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joan Calvet, Carlton R. Davis, José M. Fernandez 0001, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji |
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 141-150, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Baris Coskun, Sven Dietrich, Nasir D. Memon |
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 131-140, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Kells: a protection framework for portable data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 231-240, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Trajce Dimkov, Wolter Pieters, Pieter H. Hartel |
Two methodologies for physical penetration testing using social engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 399-408, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Comprehensive shellcode detection using runtime heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 287-296, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Portokalidis, Angelos D. Keromytis |
Fast and practical instruction-set randomization for commodity systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 41-48, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seungwon Shin, Guofei Gu |
Conficker and beyond: a large-scale empirical study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 151-160, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | William R. Cheswick |
Back to Berferd. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 281-286, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Xu, Fangfang Zhang 0005, Sencun Zhu |
Toward worm detection in online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 11-20, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna |
Network intrusion detection: dead or alive? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 117-126, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz |
Breaking e-banking CAPTCHAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 171-180, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhaohui Wang, Angelos Stavrou |
Exploiting smart-phone USB connectivity for fun and profit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 357-366, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Jianying Zhou 0001, Jun Wen Wong, Feng Bao 0001 |
Towards practical anonymous password authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 59-68, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wu Zhou 0001, Peng Ning, Xiaolan Zhang 0001, Glenn Ammons, Ruowen Wang, Vasanth Bala |
Always up-to-date: scalable offline patching of VM images in a compute cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 377-386, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Exploring usability effects of increasing security in click-based graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 79-88, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Machigar Ongtang, Kevin R. B. Butler, Patrick D. McDaniel |
Porscha: policy oriented secure content handling in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 221-230, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sandy Clark, Stefan Frei, Matt Blaze, Jonathan M. Smith |
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 251-260, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | An Liu, Peng Ning, Huaiyu Dai, Yao Liu 0007, Cliff Wang |
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 367-376, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou |
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 327-336, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Siarhei Liakh, Michael C. Grace, Xuxian Jiang |
Analyzing and improving Linux kernel memory protection: a model checking approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 271-280, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Rodes, Xunhua Wang |
Security analysis of a fingerprint-protected USB drive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 89-96, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liang Gu, Yao Guo 0001, Anbang Ruan, Qingni Shen, Hong Mei 0001 |
SCOBA: source code based attestation on custom software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 337-346, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carrie Gates, Michael Franz, John P. McDermott (eds.) |
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![ACM, 978-1-4503-0133-6 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin |
Hardware assistance for trustworthy systems through 3-D integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 199-210, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick D. McDaniel |
Multi-vendor penetration testing in the advanced metering infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 107-116, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ana Ferreira 0001, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes |
How to Securely Break into RBAC: The BTG-RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 23-31, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mehmud Abliz, Taieb Znati |
A Guided Tour Puzzle for Denial of Service Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 279-288, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mario Kirschbaum, Thomas Popp |
Evaluation of a DPA-Resistant Prototype Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 43-50, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen 0001 |
Evaluating Network Security With Two-Layer Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 127-136, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Attila Altay Yavuz, Peng Ning |
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 219-228, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov |
Secure Web 2.0 Content Sharing Beyond Walled Gardens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 409-418, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher |
RAD: Reflector Attack Defense Using Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 269-278, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alf Zugenmaier, Sven Lachmund, Dileesh Jostin |
Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 333-339, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lixin Li, James E. Just, R. Sekar 0001 |
Online Signature Generation for Windows Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 289-298, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffrey B. Lotspiech |
Unifying Broadcast Encryption and Traitor Tracing for Content Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 139-148, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang 0003 |
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 13-22, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Emily Stark 0001, Michael Hamburg, Dan Boneh |
Symmetric Cryptography in Javascript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 373-381, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wei, Juan Du 0006, Ting Yu 0001, Xiaohui Gu |
SecureMR: A Service Integrity Assurance Framework for MapReduce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 73-82, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E. Webster, Stephen W. Boyer |
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 117-126, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang |
A Study of User-Friendly Hash Comparison Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 105-114, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis |
A Network Access Control Mechanism Based on Behavior Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 3-12, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Okhravi, David M. Nicol |
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 254-265, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi |
Surgically Returning to Randomized lib(c). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 60-69, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang |
On the Security of PAS (Predicate-Based Authentication Service). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 209-218, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna |
Analyzing and Detecting Malicious Flash Advertisements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 363-372, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan |
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 494-503, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger |
Scalable Web Content Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 95-104, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu |
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 451-460, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel |
Justifying Integrity Using a Virtual Machine Verifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 83-92, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ann Davidson |
The Good, the Bad, And the Ugly: Stepping on the Security Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 187-195, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor |
Leveraging Cellular Infrastructure to Improve Fraud Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009, pp. 350-359, 2009, IEEE Computer Society, 978-0-7695-3919-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE Computer Society, 978-0-7695-3919-5 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
|
|