The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Siqi Ma, Runhan Feng, Juanru Li, Yang Liu 0118, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha 0001 An empirical study of SMS one-time password authentication in Android apps. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1David Slater, Scott Novotney, Jessica Moore, Sean Morgan, Scott Tenaglia Robust keystroke transcription from the acoustic side-channel. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1David Balenson (eds.) Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019 Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos BakingTimer: privacy analysis of server-side request processing time. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chenglu Jin, Zheng Yang 0001, Marten van Dijk, Jianying Zhou 0001 Proof of aliveness. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Matthew W. Sanders, Chuan Yue Mining least privilege attribute based access control policies. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Yehonatan Kfir The chatty-sensor: a provably-covert channel in cyber physical systems. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang 0002, Heming Cui, Fengwei Zhang SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections). Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jiaping Gui, Xusheng Xiao, Ding Li 0001, Chung Hwan Kim, Haifeng Chen Progressive processing of system-behavioral query. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aurore Fass, Michael Backes 0001, Ben Stock JStap: a static pre-filter for malicious JavaScript detection. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao 0027, Kevin W. Hamlen, Latifur Khan Improving intrusion detectors by crook-sourcing. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zheng Li 0023, Chengyu Hu, Yang Zhang 0016, Shanqing Guo How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Joonun Jang, Huy Kang Kim FuzzBuilder: automated building greybox fuzzing environment for C/C++ library. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abbas Naderi-Afooshteh, Yonghwi Kwon 0001, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jack W. Davidson Cubismo: decloaking server-side malware via cubist program analysis. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang 0001, Giovanni Vigna, Christopher Kruegel Sleak: automating address space layout derandomization. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel Revisiting utility metrics for location privacy-preserving mechanisms. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das Coordinated dataflow protection for ultra-high bandwidth science networks. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Ukrop, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh Will you trust this TLS certificate?: perceptions of people working in IT. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pejman Najafi, Alexander Mühle, Wenzel Pünter, Feng Cheng 0002, Christoph Meinel MalRank: a measure of maliciousness in SIEM-based knowledge graphs. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus Speculator: a tool to analyze speculative execution attacks and mitigations. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, Dandan Sun, Chao Zhang 0008, Baoxu Liu SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yu Li 0007, Yannan Liu, Min Li 0019, Ye Tian 0010, Bo Luo, Qiang Xu 0001 D2NN: a fine-grained dual modular redundancy framework for deep neural networks. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, Philippe Trebuchet WooKey: designing a trusted and efficient USB device. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Myoung Jin Nam, Periklis Akritidis, David J. Greaves FRAMER: a tagged-pointer capability system with memory safety applications. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac Aegis: a context-aware security framework for smart home systems. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fangjie Jiang, Quanwei Cai 0001, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma TF-BIV: transparent and fine-grained binary integrity verification in the cloud. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tapti Palit, Fabian Monrose, Michalis Polychronakis Mitigating data leakage by protecting memory-resident sensitive data. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li 0003, Thidapat Chantem SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann "Your hashed IP address: Ubuntu.": perspectives on transparency tools for online advertising. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Luke Dickinson, Trevor Smith, Kent E. Seamons Leveraging locality of reference for certificate revocation. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Samuel Marchal, Sebastian Szyller Detecting organized eCommerce fraud using scalable categorical clustering. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ioannis Agadakos, Di Jin, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis Nibbler: debloating binary shared libraries. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi Privacy preserving substring search protocol with polylogarithmic communication cost. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Manar Mohamed, Prakash Shrestha, Nitesh Saxena Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik PDoT: private DNS-over-TLS with TEE support. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ronny Chevalier, David Plaquin, Chris I. Dalton, Guillaume Hiet Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yansong Gao, Chang Xu 0002, Derui Wang, Shiping Chen 0001, Damith Chinthana Ranasinghe, Surya Nepal STRIP: a defence against trojan attacks on deep neural networks. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef AppVeto: mobile application self-defense through resource access veto. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chen Wang 0009, S. Abhishek Anand, Jian Liu 0001, Payton Walker, Yingying Chen 0001, Nitesh Saxena Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna Neurlux: dynamic malware analysis without feature engineering. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhe Zhou 0001, Di Tang, Wenhao Wang 0001, Xiaofeng Wang 0006, Zhou Li 0001, Kehuan Zhang Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oliver Wiese, Christoph Weinhold, Jan-Ole Malchow, Volker Roth 0002 I Need this Back, Later!: An Exploration of Practical Secret Sharing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shachee Mishra, Michalis Polychronakis Shredder: Breaking Exploits through API Specialization. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1John Henry Castellanos, Martín Ochoa, Jianying Zhou 0001 Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Schilling, Mario Werner, Pascal Nasahl, Stefan Mangard Pointing in the Right Direction - Securing Memory Accesses in a Faulty World. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Mayer 0001, Christian Schwartz, Melanie Volkamer On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song IAC: On the Feasibility of Utilizing Neural Signals for Access Control. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jan Henrik Ziegeldorf, Jan Metzke, Klaus Wehrle SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz Towards Automated Generation of Exploitation Primitives for Web Browsers. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Changming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin 0001 A Heuristic Framework to Detect Concurrency Vulnerabilities. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haehyun Cho, Penghui Zhang, Donguk Kim 0003, Jinbum Park, Choong-Hoon Lee, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang 0001, Ang Chen 0001, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou DeDoS: Defusing DoS with Dispersion Oriented Software. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth 0001, Berk Sunar MicroWalk: A Framework for Finding Side Channels in Binaries. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lingxiao Wei, Bo Luo, Yu Li 0007, Yannan Liu, Qiang Xu 0001 I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida Type-After-Type: Practical and Complete Type-Safe Memory Reuse. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu 0005 Take It or Leave It: A Survey Study on Operating System Upgrade Practices. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fady Copty, Matan Danos, Orit Edelstein, Cindy Eisner, Dov Murik, Benjamin Zeltser Accurate Malware Detection by Extreme Abstraction. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Franck de Goër, Sanjay Rawat 0001, Dennis Andriesse, Herbert Bos, Roland Groz Now You See Me: Real-time Dynamic Function Call Detection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Weixin Liang, Kai Bu, Ke Li, Jinhong Li, Arya Tavakoli MemCloak: Practical Access Obfuscation for Untrusted Memory. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ximing Liu, Yingjiu Li, Robert H. Deng Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu 0002 Poisoning Attacks to Graph-Based Recommender Systems. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yanfang Ye 0001, Shifu Hou, Lingwei Chen, Xin Li 0005, Liang Zhao 0002, Shouhuai Xu, Jiabin Wang, Qi Xiong ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohsen Ahmadvand, Anahit Hayrapetyan, Sebastian Banescu, Alexander Pretschner Practical Integrity Protection with Oblivious Hashing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi On the Effectiveness of Type-based Control Flow Integrity. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yixiao Xu, Tao Wang 0012, Qi Li 0002, Qingyuan Gong, Yang Chen 0001, Yong Jiang 0001 A Multi-tab Website Fingerprinting Attack. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji 0002, Simon Pak Ho Chung, Wenke Lee Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta Model Extraction Warning in MLaaS Paradigm. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan D. Parra Rodriguez, Joachim Posegga RAPID: Resource and API-Based Detection Against In-Browser Miners. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr An Extensive Evaluation of the Internet's Open Proxies. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018 Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bumjin Im, Ang Chen 0001, Dan S. Wallach An Historical Analysis of the SEAndroid Policy Evolution. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang 0004, Yinqian Zhang, Ruby B. Lee Analyzing Cache Side Channels Using Deep Neural Networks. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl A Large Scale Investigation of Obfuscation Use in Google Play. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fei Wang 0046, Yonghwi Kwon 0001, Shiqing Ma, Xiangyu Zhang 0001, Dongyan Xu Lprov: Practical Library-aware Provenance Tracing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer 0001 Tracking Users across the Web via TLS Session Resumption. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao 0001, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shane McCulley, Vassil Roussev Latent Typing Biometrics in Online Collaboration Services. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chuadhry Mujeeb Ahmed, Jianying Zhou 0001, Aditya P. Mathur Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert 0001, Apostolis Zarras Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohsin Junaid, Jiang Ming 0002, David Chenho Kung StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine R. Davis 0001, Saman A. Zonouz Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alina Oprea, Zhou Li 0001, Robin Norris, Kevin D. Bowers MADE: Security Analytics for Enterprise Threat Detection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang 0022 SENSS Against Volumetric DDoS Attacks. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1André Greubel, Alexandra Dmitrienko, Samuel Kounev SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikola K. Blanchard, Clément Malaingre, Ted Selker Improving security and usability of passphrases with guided word choice. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license