|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Hyungsub Kim, Sangho Lee 0001, Jong Kim 0001 |
Exploring and mitigating privacy threats of HTML5 geolocation API. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu 0001, Lei Zhang 0006 |
Towards a scalable resource-driven approach for detecting repackaged Android applications. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
DNS authentication as a service: preventing amplification attacks. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda |
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Zohrevandi, Rida A. Bazzi |
Auto-FBI: a user-friendly approach for secure access to sensitive content on the web. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Lange, Steffen Liebergeld |
Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Min Li, Wanyu Zang, Kun Bai, Meng Yu 0001, Peng Liu 0005 |
MyCloud: supporting user-configured privacy protection in cloud computing. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero |
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos |
k-subscription: privacy-preserving microblogging browsing through obfuscation. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhui Deng, Xiangyu Zhang 0001, Dongyan Xu |
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Schmidt, Trent Jaeger |
Pitfalls in the automated strengthening of passwords. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nathaniel Boggs, Wei Wang 0084, Suhas Mathur, Baris Coskun, Carol Pincock |
Discovery of emergent malicious campaigns in cellular networks. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stephen E. McLaughlin |
CPS: stateful policy enforcement for control system device usage. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer |
Extraction of statistically significant malware behaviors. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luca Invernizzi, Christopher Kruegel, Giovanni Vigna |
Message in a bottle: sailing past censorship. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Felix Rohrer, Yuting Zhang, Lou Chitkushev, Tanya Zlateva |
DR BACA: dynamic role based access control for Android. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Murat Akpulat, Kemal Bicakci, Ugur Cil |
Revisiting graphical passwords for augmenting, not replacing, text passwords. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wai-Kit Sze, R. Sekar 0001 |
A portable user-level approach for system-wide integrity protection. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas |
Implementation and implications of a stealth hard-drive backdoor. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen |
Subverting system authentication with context-aware, reactive virtual machine introspection. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Carl E. Landwehr |
A building code for building code: putting what we know works to work. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | William Young, Nancy G. Leveson |
Systems thinking for safety and security. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | B. Amann 0001, Robin Sommer, Matthias Vallentin, Seth Hall |
No attack necessary: the surprising dynamics of SSL trust relationships. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles N. Payne Jr. (eds.) |
Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013 |
ACSAC |
2013 |
DBLP BibTeX RDF |
|
1 | Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou |
Validating web content with senser. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos |
The man who was there: validating check-ins in location-based services. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda |
PatchDroid: scalable third-party security patches for Android devices. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi |
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Socket overloading for fun and cache-poisoning. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Zhang, Amit Ahlawat, Wenliang Du |
AFrame: isolating advertisements from mobile applications in Android. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip |
CPS: an efficiency-motivated attack against autonomous vehicular transportation. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahmudur Rahman, Umut Topkara, Bogdan Carbunar |
Seeing is not believing: visual verifications through liveness analysis using mobile devices. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yogesh Mundada, Anirudh Ramachandran, Nick Feamster |
SilverLine: preventing data leaks from compromised web applications. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xin Hu 0001, Kang G. Shin |
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath |
SigMal: a static signal processing based malware triage. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Pewny, Thorsten Holz |
Control-flow restrictor: compiler-based CFI for iOS. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | François Gauthier 0001, Thierry Lavoie, Ettore Merlo |
Uncovering access control weaknesses and flaws with security-discordant software clones. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Behrad Garmany, Tilo Müller |
PRIME: private RSA infrastructure for memory-less encryption. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark |
FireDroid: hardening security in almost-stock Android. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs |
GPU and CPU parallelization of honest-but-curious secure two-party computation. |
ACSAC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero |
Lines of malicious code: insights into the malicious software industry. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David |
Biometric authentication on a mobile device: a study of user effort, error and task disruption. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Divya Muthukumaran, Sandra Julieta Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger |
Transforming commodity security policies to enforce Clark-Wilson integrity. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis |
Self-healing multitier architectures using cascading rescue points. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Charles Smutz, Angelos Stavrou |
Malicious PDF detection using metadata and structural features. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero |
All your face are belong to us: breaking Facebook's social authentication. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daniel McCarney, David Barrera 0003, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot |
Tapas: design, implementation, and usability evaluation of a password manager. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler |
Hi-Fi: collecting high-fidelity whole-system provenance. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martin Johns, Sebastian Lekies, Bastian Braun, Benjamin Flesch |
BetterAuth: web authentication revisited. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yingnong Dang, Dongmei Zhang 0001, Song Ge, Chengyun Chu, Yingjun Qiu, Tao Xie 0001 |
XIAO: tuning code clones at hands of engineers in practice. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno |
SensorSift: balancing sensor data privacy and utility in automated face understanding. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christopher S. Gates, Ninghui Li, Jing Chen 0005, Robert W. Proctor |
CodeShield: towards personalized application whitelisting. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Indrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Sateesh Addepalli |
Enabling private conversations on Twitter. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Perdisci, Man Chon U |
VAMO: towards a fully automated malware clustering validity analysis. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Apurva Kumar |
Using automated model analysis for reasoning about security of web protocols. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun |
Analysis of the communication between colluding applications on modern smartphones. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Willems, Ralf Hund, Andreas Fobian, Dennis Felsch, Thorsten Holz, Amit Vasudevan |
Down to the bare metal: using processor features for binary analysis. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paul Dunphy, Patrick Olivier |
On automated image choice for secure and usable graphical passwords. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler, Ashwin Shashidharan, William Enck |
Abusing cloud-based browsers for fun and profit. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Willems, Felix C. Freiling, Thorsten Holz |
Using memory management to detect and extract illegitimate code for malware analysis. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta |
Twitter games: how successful spammers pick targets. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sumayah A. Alrwais, Alexandre Gerber, Christopher W. Dunn, Oliver Spatscheck, Minaxi Gupta, Eric Osterweil |
Dissecting ghost clicks: ad fraud via misdirected human clicks. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Benjamin Sapp, Matt Blaze, Jonathan M. Smith |
Practicality of accelerometer side channels on smartphones. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Emil Stefanov, Marten van Dijk, Ari Juels, Alina Oprea |
Iris: a scalable cloud file system with efficient integrity checks. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun |
Enabling trusted scheduling in embedded systems. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna |
Jarhead analysis and detection of malicious Java applets. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin |
Securing untrusted code via compiler-agnostic binary rewriting. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson |
Security economics: a personal perspective. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao |
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang |
Separation virtual machine monitors. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shiva Houshmand, Sudhir Aggarwal |
Building better passwords using probabilistic techniques. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, Danilo Bruschi |
When hardware meets software: a bulletproof solution to forensic memory acquisition. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens |
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel |
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar |
One year of SSL internet measurement. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Susan D. Alexander |
Trust engineering: rejecting the tyranny of the weakest link. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Robert H'obbes' Zakon (eds.) |
28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 |
ACSAC |
2012 |
DBLP BibTeX RDF |
|
1 | Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu |
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Yamaguchi, Markus Lottmann, Konrad Rieck |
Generalized vulnerability extrapolation using abstract syntax trees. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sean Heelan, Agustin Gianni |
Augmenting vulnerability analysis of binary code. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abhinav Srivastava, Jonathon T. Giffin |
Efficient protection of kernel data structures via object partitioning. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian S. Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra |
Distributed application tamper detection via continuous software updates. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mariano Graziano, Corrado Leita, Davide Balzarotti |
Towards network containment in malware analysis systems. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos |
Permission evolution in the Android ecosystem. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chris Jarabek, David Barrera 0003, John Aycock |
ThinAV: truly lightweight mobile cloud-based anti-malware. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Erik-Oliver Blass, William Robertson 0002 |
TRESOR-HUNT: attacking CPU-bound encryption. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sarah M. Diesburg, Christopher R. Meyers, Mark J. Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, Geoff Kuenning |
TrueErase: per-file secure deletion for the storage data path. |
ACSAC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson |
PhorceField: a phish-proof password ceremony. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
A peel of onion. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marek Jawurek, Martin Johns, Konrad Rieck |
Smart metering de-pseudonymization. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen |
RIPE: runtime intrusion prevention evaluator. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert H'obbes' Zakon, John P. McDermott, Michael E. Locasto (eds.) |
Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011 |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu |
The socialbot network: when bots socialize for fame and money. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pavel Laskov, Nedim Srndic |
Static detection of malicious JavaScript-bearing PDF documents. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ang Cui, Jatin Kataria, Salvatore J. Stolfo |
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen |
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Khurshid, Firat Kiyak, Matthew Caesar 0001 |
Improving robustness of DNS to software vulnerabilities. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Simmons |
Security through amnesia: a software-based solution to the cold boot attack on disk encryption. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yacin Nadji, Jonathon T. Giffin, Patrick Traynor |
Automated remote repair for mobile malware. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vasilis Pappas, Mariana Raykova 0001, Binh Vo, Steven M. Bellovin, Tal Malkin |
Private search in the real world. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 1667 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|