|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dongwan Shin, Rodrigo Lopes |
An empirical study of visual security cues to prevent the SSLstripping attack. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei Li 0003, Yuan Xue 0001 |
BLOCK: a black-box approach for detection of state violation attacks towards web applications. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna |
Hit 'em where it hurts: a live security exercise on cyber situational awareness. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Pelizzi, R. Sekar 0001 |
A server- and browser-transparent CSRF defense for web 2.0 applications. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh |
Mitigating code-reuse attacks with control-flow locking. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | W. Brad Moore, Chris Wacek, Micah Sherr |
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dhilung Kirat, Giovanni Vigna, Christopher Kruegel |
BareBox: efficient malware analysis on bare-metal. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin 0001 |
Attacks on WebView in the Android system. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Terry Benzel |
The science of cyber security experimentation: the DETER project. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee |
Understanding the prevalence and use of alternative plans in malware with network games. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chenglong Li 0001, Yibo Xue, Yingfei Dong, Dongsheng Wang 0002 |
"Super nodes" in Tor: existence and security implication. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun |
Enabling secure VM-vTPM migration in private clouds. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao |
deRop: removing return-oriented programming from malware. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xiapu Luo, Peng Zhou 0002, Junjie Zhang 0004, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang |
Exposing invisible timing-based traffic watermarks with BACKLIT. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jennia Hizver, Tzi-cker Chiueh |
Tracking payment card data flow using virtual machine state introspection. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matt Blaze |
Key escrow from a safe distance: looking back at the Clipper Chip. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Omid Fatemieh, Michael LeMay, Carl A. Gunter |
Reliable telemetry in white spaces using remote attestation. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nilesh Nipane, Italo Dacosta, Patrick Traynor |
"Mix-in-Place" anonymous networking using secure function evaluation. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang |
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jing Xie 0011, Bill Chu, Heather Richter Lipford, John T. Melton |
ASIDE: IDE support for web application security. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash 0001, Karem A. Sakallah |
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Markus Huber 0001, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl |
Social snapshots: digital forensics for online social networks. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Awad E. Ahmed, Issa Traoré |
Dynamic sample size detection in continuous authentication using sequential sampling. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna |
Nexat: a history-based approach to predict attacker actions. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahren Studer, Timothy Passaro, Lujo Bauer |
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shardul Vikram, Yinan Fan, Guofei Gu |
SEMAGE: a new image-based two-factor CAPTCHA. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel |
FORECAST: skimming off the malware cream. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Neugschwandtner, Paolo Milani Comparetti, Christian Platzer |
Detecting malware's failover C&C strategies with squeeze. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen |
WebJail: least-privilege integration of third-party components in web mashups. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Max Hlywa, Robert Biddle, Andrew S. Patrick |
Facing the facts about image type in recognition-based graphical passwords. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, Ruby B. Lee |
A framework for testing hardware-software security architectures. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shengzhi Zhang, Xiaoqi Jia, Peng Liu 0005, Jiwu Jing |
Cross-layer comprehensive intrusion harm analysis for production workload server systems. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Heusser, Pasquale Malacaria |
Quantifying information leaks in software. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chengfang Fang, Ee-Chien Chang |
Securing interactive sessions using mobile device through visual channel and visual inspection. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna |
Detecting spammers on social networks. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia |
Who is tweeting on Twitter: human, bot, or cyborg? |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers |
Keeping data secret under full compromise using porter devices. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhou Li 0001, XiaoFeng Wang 0001 |
FIRM: capability-based inline mediation of Flash behaviors. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jin Han, Meng Pan, Debin Gao, HweeHwa Pang |
A multi-user steganographic file system on untrusted shared storage. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ellick Chan, Shivaram Venkataraman, Francis M. David, Amey Chaugule, Roy H. Campbell |
Forenscope: a framework for live forensics. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos |
Paranoid Android: versatile protection for smartphones. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Tillich, Mario Kirschbaum, Alexander Szekely |
SCA-resistant embedded processors: the next generation. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Gallo, Henrique Kawakami, Ricardo Dahab, Rafael Azevedo, Saulo Lima, Guido Araujo |
T-DRE: a hardware trusted computing base for direct recording electronic vote machines. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ang Cui, Salvatore J. Stolfo |
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrew G. West, Adam J. Aviv, Jian Chang, Insup Lee 0001 |
Spam mitigation using spatio-temporal reputations from blacklist history. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda |
G-Free: defeating return-oriented programming through gadget-less binaries. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tom Longstaff, David M. Balenson, Mark Matties |
Barriers to science in security. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Konrad Rieck, Tammo Krueger, Andreas Dewald |
Cujo: efficient detection and prevention of drive-by-download attacks. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joan Calvet, Carlton R. Davis, José M. Fernandez 0001, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji |
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Baris Coskun, Sven Dietrich, Nasir D. Memon |
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel |
Kells: a protection framework for portable data. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Trajce Dimkov, Wolter Pieters, Pieter H. Hartel |
Two methodologies for physical penetration testing using social engineering. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Comprehensive shellcode detection using runtime heuristics. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Portokalidis, Angelos D. Keromytis |
Fast and practical instruction-set randomization for commodity systems. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seungwon Shin, Guofei Gu |
Conficker and beyond: a large-scale empirical study. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | William R. Cheswick |
Back to Berferd. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Xu, Fangfang Zhang 0005, Sencun Zhu |
Toward worm detection in online social networks. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna |
Network intrusion detection: dead or alive? |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz |
Breaking e-banking CAPTCHAs. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhaohui Wang, Angelos Stavrou |
Exploiting smart-phone USB connectivity for fun and profit. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Jianying Zhou 0001, Jun Wen Wong, Feng Bao 0001 |
Towards practical anonymous password authentication. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wu Zhou 0001, Peng Ning, Xiaolan Zhang 0001, Glenn Ammons, Ruowen Wang, Vasanth Bala |
Always up-to-date: scalable offline patching of VM images in a compute cloud. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle |
Exploring usability effects of increasing security in click-based graphical passwords. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Machigar Ongtang, Kevin R. B. Butler, Patrick D. McDaniel |
Porscha: policy oriented secure content handling in Android. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sandy Clark, Stefan Frei, Matt Blaze, Jonathan M. Smith |
Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | An Liu, Peng Ning, Huaiyu Dai, Yao Liu 0007, Cliff Wang |
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou |
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Siarhei Liakh, Michael C. Grace, Xuxian Jiang |
Analyzing and improving Linux kernel memory protection: a model checking approach. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Rodes, Xunhua Wang |
Security analysis of a fingerprint-protected USB drive. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liang Gu, Yao Guo 0001, Anbang Ruan, Qingni Shen, Hong Mei 0001 |
SCOBA: source code based attestation on custom software. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carrie Gates, Michael Franz, John P. McDermott (eds.) |
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010 |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin |
Hardware assistance for trustworthy systems through 3-D integration. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick D. McDaniel |
Multi-vendor penetration testing in the advanced metering infrastructure. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ana Ferreira 0001, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes |
How to Securely Break into RBAC: The BTG-RBAC Model. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mehmud Abliz, Taieb Znati |
A Guided Tour Puzzle for Denial of Service Prevention. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mario Kirschbaum, Thomas Popp |
Evaluation of a DPA-Resistant Prototype Chip. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen 0001 |
Evaluating Network Security With Two-Layer Attack Graphs. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Attila Altay Yavuz, Peng Ning |
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov |
Secure Web 2.0 Content Sharing Beyond Walled Gardens. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher |
RAD: Reflector Attack Defense Using Message Authentication Codes. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alf Zugenmaier, Sven Lachmund, Dileesh Jostin |
Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lixin Li, James E. Just, R. Sekar 0001 |
Online Signature Generation for Windows Systems. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffrey B. Lotspiech |
Unifying Broadcast Encryption and Traitor Tracing for Content Protection. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang 0003 |
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Emily Stark 0001, Michael Hamburg, Dan Boneh |
Symmetric Cryptography in Javascript. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wei, Juan Du 0006, Ting Yu 0001, Xiaohui Gu |
SecureMR: A Service Integrity Assurance Framework for MapReduce. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E. Webster, Stephen W. Boyer |
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang |
A Study of User-Friendly Hash Comparison Schemes. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis |
A Network Access Control Mechanism Based on Behavior Profiles. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Okhravi, David M. Nicol |
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi |
Surgically Returning to Randomized lib(c). |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang |
On the Security of PAS (Predicate-Based Authentication Service). |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna |
Analyzing and Detecting Malicious Flash Advertisements. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan |
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger |
Scalable Web Content Attestation. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu |
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel |
Justifying Integrity Using a Virtual Machine Verifier. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ann Davidson |
The Good, the Bad, And the Ugly: Stepping on the Security Scale. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor |
Leveraging Cellular Infrastructure to Improve Fraud Prevention. |
ACSAC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009 |
ACSAC |
2009 |
DBLP BibTeX RDF |
|
|
|