|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena |
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 692-701, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Flynn Wolf, Ravi Kuber |
Comparing Video Based Shoulder Surfing with Live Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 453-466, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun 0001, Quan Zhou |
A Measurement Study on Linux Container Security: Attacks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 418-429, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo |
Mapping to Bits: Efficiently Detecting Type Confusion Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 518-528, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld |
Raising the Bar: Evaluating Origin-wide Security Manifests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 342-354, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shota Futagami, Tomoya Unoki, Kenichi Kourai |
Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 430-440, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christof Ferreira Torres, Julian Schütte, Radu State |
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 664-676, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Jain, Sanjay Rawat 0001, Cristiano Giuffrida, Herbert Bos |
TIFF: Using Input Type Inference To Improve Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, pp. 505-517, 2018, ACM, 978-1-4503-6569-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 16-27, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet |
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 399-411, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha 0001 |
Automated Analysis of Secure Internet of Things Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 238-249, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ali Abbasi 0002, Thorsten Holz, Emmanuele Zambon, Sandro Etalle |
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 437-448, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Binbin Chen 0001, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng |
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 425-436, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu |
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 79-90, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang 0001 |
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 553-565, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon 0001, Brendan Saltaformaggio, Xiangyu Zhang 0001, Dongyan Xu |
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 412-424, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hua Yan, Yulei Sui, Shiping Chen 0001, Jingling Xue |
Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 42-54, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anh Quach, Matthew Cole, Aravind Prakash |
Supplementing Modern Software Defenses with Stack-Pointer Sanity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 116-127, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas |
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 162-175, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl |
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 303-314, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic |
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 250-261, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Junya Ogasawara, Kenji Kono |
Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 542-552, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jelena Mirkovic, Erik Kline, Peter L. Reiher |
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 474-485, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peter C. Johnson 0001, Sergey Bratus, Sean W. Smith |
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 528-541, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna |
Piston: Uncooperative Remote Runtime Patching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 141-153, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chris McMahon Stone, Tom Chothia, Flavio D. Garcia |
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 176-188, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![ACM, 978-1-4503-5345-8 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott |
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 200-211, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon 0002 |
Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 512-527, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber |
Towards Baselines for Shoulder Surfing on Mobile Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 486-498, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar |
A Secure Mobile Authentication Alternative to Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 28-41, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö |
n-Auth: Mobile Authentication Done Right. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 1-15, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier |
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 449-460, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolei Wang 0003, Sencun Zhu, Dehua Zhou, Yuexiang Yang |
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 350-361, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jake Weidman, Jens Grossklags |
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 212-224, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska |
A Security-Mode for Carrier-Grade SDN Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 461-473, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens |
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 225-237, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi |
QUASAR: Quantitative Attack Space Analysis and Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 68-78, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mingwei Zhang 0005, Michalis Polychronakis, R. Sekar 0001 |
Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 128-140, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Barron, Nick Nikiforakis |
Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 387-398, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Uyeong Jang, Xi Wu 0001, Somesh Jha |
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 262-277, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maliheh Shirvanian, Nitesh Saxena, Jesvin James George |
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 499-511, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu |
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 103-115, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter |
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 373-386, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiyue Deng, Jelena Mirkovic |
Commoner Privacy And A Study On Network Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 566-576, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lingwei Chen, Shifu Hou, Yanfang Ye 0001 |
SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 362-372, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Long Cheng 0005, Ke Tian, Danfeng (Daphne) Yao |
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 315-326, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang 0001 |
Marmite: Spreading Malicious File Reputation Through Download Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 91-102, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Richard J. Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter |
TRAKS: A Universal Key Management Scheme for ERTMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 327-338, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yang 0013, Deguang Kong, Tao Xie 0001, Carl A. Gunter |
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 288-302, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz |
Breaking and Fixing Destructive Code Read Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 55-67, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Le Guan, Shijie Jia 0001, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu 0005, Xinyu Xing, Luning Xia |
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 339-349, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Cao, Neil Zhenqiang Gong |
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 278-287, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy |
Predicting Cyber Threats with Virtual Security Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 189-199, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya |
The Devil's in The Details: Placing Decoy Routers in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 577-589, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda |
Ex-Ray: Detection of History-Leaking Browser Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 590-602, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic |
Proxy Re-Encryption Based on Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017, pp. 154-161, 2017, ACM, 978-1-4503-5345-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf |
Intelligent, automated red team emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 363-373, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler |
CPAC: securing critical infrastructure with cyber-physical access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 139-152, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel |
Reliably determining data leakage in the presence of strong attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 484-495, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi |
ShieldFS: a self-healing, ransomware-aware filesystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 336-347, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara 0001 |
FASE: functionality-aware security enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 471-483, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Stephanos Matsumoto, Samuel Steffen, Adrian Perrig |
CASTLE: CA signing in a touch-less environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 546-557, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Hui Wang 0037, Yuanyuan Zhang 0002, Juanru Li, Dawu Gu |
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 167-176, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Robin Sommer, Johanna Amann, Seth Hall |
Spicy: a unified deep packet inspection framework for safely dissecting all your data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 558-569, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper |
Multi-receiver GPS spoofing detection: error models and realization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 237-250, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz |
Trace-free memory data structure forensics via past inference and future speculations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 570-582, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Jannik Pewny, Thorsten Holz |
EvilCoder: automated bug insertion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 214-225, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Nicholas Chang-Fong, Aleksander Essex |
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 324-335, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Hyungsub Kim, Sangho Lee 0001, Jong Kim 0001 |
Inferring browser activity and status through remote monitoring of storage usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 410-421, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Lei Yang 0037, Abdulmalik Humayed, Fengjun Li |
A multi-cloud based privacy-preserving data publishing scheme for the internet of things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 30-39, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner |
Code obfuscation against symbolic execution attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 189-200, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Mark R. Beaumont, Jim McCarthy, Toby C. Murray |
The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 533-545, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Zhen Xie, Sencun Zhu, Qing Li 0063, Wenjing Wang |
You can promote, but you can't hide: large-scale abused app detection in mobile app stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 374-385, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Mohammad N. AlShehri, Heather Crawford |
Using image saliency and regions of interest to encourage stronger graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 127-138, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Wei Huang 0027, Zhen Huang 0002, Dhaval Miyani, David Lie |
LMP: light-weighted memory protection with hardware assistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 460-470, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic |
Life-experience passwords (LEPs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 113-126, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth 0001, Berk Sunar |
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 436-447, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Huan Feng, Kang G. Shin |
Understanding and defending the binder attack surface in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 398-409, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis |
Location-enhanced authentication using the IoT: because you cannot be in two places at once. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 251-264, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Furkan Alaca, Paul C. van Oorschot |
Device fingerprinting for augmenting web authentication: classification and analysis of methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 289-301, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom |
Amplifying side channels through performance degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 422-435, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Farid Molazem Tabrizi, Karthik Pattabiraman |
Formal security analysis of smart embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 1-15, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena |
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 265-276, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Tran Phuong Thao, Kazumasa Omote |
ELAR: extremely lightweight auditing and repairing for cloud security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 40-51, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos |
VTPin: practical VTable hijacking protection for binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 448-459, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang 0001, Zhiwei Zhang, Luo Si, Xiangyu Zhang 0001, Dongyan Xu |
HERCULE: attack story reconstruction via community discovery on correlated log graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 583-595, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Bo Chen, Shijie Jia 0001, Luning Xia, Peng Liu 0005 |
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 496-507, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger |
Pileus: protecting user resources from vulnerable cloud services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 52-64, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang 0001, Zhou Li 0001 |
Catching predators at watering holes: finding and understanding strategically compromised websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 153-166, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Julian Horsch, Sascha Wessel, Claudia Eckert 0001 |
CoKey: fast token-based cooperative cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 314-323, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero |
RevProbe: detecting silent reverse proxies in malicious server infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 101-112, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Jeremy Martin, Erik C. Rye, Robert Beverly |
Decomposition of MAC address structure for granular device inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 78-88, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham |
Adaptive encrypted traffic fingerprinting with bi-directional dependence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 177-188, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Shiqi Shen, Shruti Tople, Prateek Saxena |
Auror: defending against poisoning attacks in collaborative deep learning systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 508-519, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Thang Hoang, Attila Altay Yavuz, Jorge Guajardo |
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 302-313, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller |
Timing-based reconnaissance and defense in software-defined networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 89-100, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel |
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 226-236, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan |
A security analysis of automated chinese turing tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 520-532, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Yang Shi 0002, Wujing Wei, Zongjian He, Hongfei Fan |
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016, pp. 16-29, 2016, ACM, 978-1-4503-4771-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
Displaying result #401 - #500 of 1667 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|