Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano |
Transaction Oriented Text Messaging with Trusted-SMS. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xunhua Wang, Philip D. Huff, Brett C. Tjaden |
Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Terrence O'Connor, Douglas S. Reeves |
Bluetooth Network-Based Misuse Detection. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Kohler, Andreas Schaad |
ProActive Access Control for Business Process-Driven Environments. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Erdem Aktas, Kanad Ghose |
DARE: A Framework for Dynamic Authentication of Remote Executions. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann |
Permission Set Mining: Discovering Practical and Useful Roles. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sean O'Melia, Adam J. Elbirt |
Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Farrell Jr., Simson L. Garfinkel, Douglas White |
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Evan Martin, JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Assessing Quality of Policy Properties in Verification of Access Control Policies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rattikorn Hewett, Phongphun Kijsanayothin |
Host-Centric Model Checking for Network Vulnerability Analysis. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger |
New Side Channels Targeted at Passwords. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma 0002 |
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla |
Preventing Information Leaks through Shadow Executions. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | O. Sami Saydjari |
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue |
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mansour Alsaleh, David Barrera 0003, Paul C. van Oorschot |
Improving Security Visualization with Exposure Map Filtering. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Saman Zarandioon, Danfeng Yao, Vinod Ganapathy |
OMOS: A Framework for Secure Communication in Mashup Applications. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot |
On Purely Automated Attacks and Click-Based Graphical Passwords. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji |
The Evolution of System-Call Monitoring. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna |
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Asia Slowinska, Herbert Bos |
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
attack analysis, honeypots, intrusion detection and prevention |
1 | Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang 0001 |
Automated Security Debugging Using Program Structural Constraints. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Boniface Hicks, Tim Misiak, Patrick D. McDaniel |
Channels: Runtime System Infrastructure for Security-Typed Languages. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick D. McDaniel |
Establishing and Sustaining System Integrity via Root of Trust Installation. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Chandra, Michael Franz |
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Meier 0001, Ulrich Flegel, Sebastian Schmerl |
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Manigandan Radhakrishnan, Jon A. Solworth |
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Phillip L. Hellewell, Kent E. Seamons |
Extensible Pre-authentication Kerberos. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Iulia Ion, Boris Dragovic, Bruno Crispo |
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Meng Yu 0001, Wanyu Zang, Peng Liu 0005 |
Database Isolation and Filtering against Data Corruption Attacks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA |
ACSAC |
2007 |
DBLP BibTeX RDF |
|
1 | Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha |
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Paolina Centonze, Robert J. Flynn, Marco Pistoia |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bryan D. Payne, Wenke Lee |
Secure and Flexible Monitoring of Virtual Machines. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy |
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Martin Szydlowski, Christopher Kruegel, Engin Kirda |
Secure Input for Web Applications. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | David Dagon, Guofei Gu, Christopher P. Lee 0001, Wenke Lee |
A Taxonomy of Botnet Structures. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou |
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Weitzner |
Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Qinghua Zhang, Douglas S. Reeves |
MetaAware: Identifying Metamorphic Malware. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Gehani, Ulf Lindqvist |
Bonsai: Balanced Lineage Authentication. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Yan, Ahmad Salah El Ahmad |
Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins |
An Overview of the Annex System. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nathan S. Evans, Chris GauthierDickey, Christian Grothoff |
Routing in the Dark: Pitch Black. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Enriquillo Valdez, Reiner Sailer, Ronald Perez |
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Baris Coskun, Nasir D. Memon |
Efficient Detection of Delay-Constrained Relay Nodes. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin |
Toward a Medium-Robustness Separation Kernel Protection Profile. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani Thuraisingham |
Centralized Security Labels in Decentralized P2P Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Brian Rivera, Kelvin Marcus, Peter Kruus |
Countering False Accusations and Collusion in the Detection of In-Band Wormholes. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan |
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara |
Security Usability Principles for Vulnerability Analysis and Risk Assessment. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis |
SSARES: Secure Searchable Automated Remote Email Storage. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny |
Closed-Circuit Unobservable Voice over IP. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mengjun Xie, Zhenyu Wu, Haining Wang |
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama |
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Tracking Darkports for Network Defense. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li 0020, Tzi-cker Chiueh |
Automated Format String Attack Prevention for Win32/X86 Binaries. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Borders, Atul Prakash 0001, Mark Zielinski |
Spector: Automatically Analyzing Shell Code. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Richard A. Kemmerer |
So You Think You Can Dance? |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna |
Improving Signature Testing through Dynamic Data Flow Analysis. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Brian Randell, John M. Rushby |
Distributed Secure Systems: Then and Now. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu |
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask). |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Moser, Christopher Kruegel, Engin Kirda |
Limits of Static Analysis for Malware Detection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Brian Witten |
Engineering Sufficiently Secure Computing. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Collin Mulliner, Giovanni Vigna |
Vulnerability Analysis of MMS User Agents. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
Multimedia Messaging Service, Mobile devices, Mobile phones, Vulnerability Analysis, Fuzzing |
1 | Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana |
Using Attribute-Based Access Control to Enable Attribute-Based Messaging. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ying Pan, Xuhua Ding |
Anomaly Based Web Phishing Page Detection. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shiping Chen 0003, Dongyu Liu, Songqing Chen, Sushil Jajodia |
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Horton, Reihaneh Safavi-Naini |
Detecting Policy Violations through Traffic Analysis. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein |
Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu 0003, Peng Ning |
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kyle Ingols, Richard Lippmann, Keith Piwowarski |
Practical Attack Graph Generation for Network Defense. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kun Sun 0001, Pai Peng, Peng Ning, Cliff Wang |
Secure Distributed Cluster Formation in Wireless Sensor Networks. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture |
Automatic Evaluation of Intrusion Detection Systems. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee |
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan |
Data Sandboxing: A Technique for Enforcing Confidentiality Policies. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna |
Static Detection of Vulnerabilities in x86 Executables. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
binary static analysis, symbolic execution, Vulnerability analysis, taint analysis |
1 | Yinglian Xie, Michael K. Reiter, David R. O'Hallaron |
Protecting Privacy in Key-Value Search Systems. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nigel Jacob, Carla E. Brodley |
Offloading IDS Computation to the GPU. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lap-Chung Lam, Tzi-cker Chiueh |
A General Dynamic Information Flow Tracking Framework for Security Applications. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lillian Røstad, Ole Edsberg |
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Philip W. L. Fong, Simon A. Orr |
A Module System for Isolating Untrusted Software Extensions. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Duc, Ronan Keryell |
CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen |
Extended Protection against Stack Smashing Attacks without Performance Loss. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
How to Automatically and Accurately Sandbox Microsoft IIS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Specification-Based Intrusion Detection in WLANs. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer |
Shamon: A System for Distributed Mandatory Access Control. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lixin Li, James E. Just, R. Sekar 0001 |
Address-Space Randomization for Windows Systems. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hao Wang, Somesh Jha, Vinod Ganapathy |
NetSpy: Automatic Generation of Spyware Signatures for NIDS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Francis Hsu, Hao Chen 0003, Thomas Ristenpart, Jason Li 0003, Zhendong Su 0001 |
Back to the Future: A Framework for Automatic Malware Removal and System Repair. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhenghong Wang, Ruby B. Lee |
Covert and Side Channels Due to Processor Architecture. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yoav Weiss, Elena Gabriela Barrantes |
Known/Chosen Key Attacks against Software Instruction Set Randomization. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Foreign Code Detection on the Windows/X86 Platform. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA |
ACSAC |
2006 |
DBLP BibTeX RDF |
|
1 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|