The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61)
Publication types (Num. hits)
inproceedings(1289) proceedings(31)
Venues (Conferences, Journals, ...)
ACSAC(1320)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1320 publication records. Showing 1320 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz Towards Automated Generation of Exploitation Primitives for Web Browsers. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Weixin Liang, Kai Bu, Ke Li, Jinhong Li, Arya Tavakoli MemCloak: Practical Access Obfuscation for Untrusted Memory. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohsen Ahmadvand, Anahit Hayrapetyan, Sebastian Banescu, Alexander Pretschner Practical Integrity Protection with Oblivious Hashing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth 0001, Berk Sunar MicroWalk: A Framework for Finding Side Channels in Binaries. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohsin Junaid, Jiang Ming, David Chenho Kung StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chuadhry Mujeeb Ahmed, Jianying Zhou 0001, Aditya P. Mathur Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Schilling, Mario Werner, Pascal Nasahl, Stefan Mangard Pointing in the Right Direction - Securing Memory Accesses in a Faulty World. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld Raising the Bar: Evaluating Origin-wide Security Manifests. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shane McCulley, Vassil Roussev Latent Typing Biometrics in Online Collaboration Services. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida Type-After-Type: Practical and Complete Type-Safe Memory Reuse. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu Lprov: Practical Library-aware Provenance Tracing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vivek Jain, Sanjay Rawat 0001, Cristiano Giuffrida, Herbert Bos TIFF: Using Input Type Inference To Improve Fuzzing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bumjin Im, Ang Chen, Dan S. Wallach An Historical Analysis of the SEAndroid Policy Evolution. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou DeDoS: Defusing DoS with Dispersion Oriented Software. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikola K. Blanchard, Clément Malaingre, Ted Selker Improving security and usability of passphrases with guided word choice. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jan Henrik Ziegeldorf, Jan Metzke, Klaus Wehrle SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu 0005 Take It or Leave It: A Survey Study on Operating System Upgrade Practices. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi On the Effectiveness of Type-based Control Flow Integrity. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Mayer, Christian Schwartz, Melanie Volkamer On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao 0001, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu Poisoning Attacks to Graph-Based Recommender Systems. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang, Yinqian Zhang, Ruby B. Lee Analyzing Cache Side Channels Using Deep Neural Networks. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fady Copty, Matan Danos, Orit Edelstein, Cindy Eisner, Dov Murik, Benjamin Zeltser Accurate Malware Detection by Extreme Abstraction. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Franck de Goër, Sanjay Rawat 0001, Dennis Andriesse, Herbert Bos, Roland Groz Now You See Me: Real-time Dynamic Function Call Detection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018 Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl A Large Scale Investigation of Obfuscation Use in Google Play. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lingxiao Wei, Bo Luo, Yu Li, Yannan Liu, Qiang Xu 0001 I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1John Henry Castellanos, Martín Ochoa, Jianying Zhou 0001 Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang A Multi-tab Website Fingerprinting Attack. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song IAC: On the Feasibility of Utilizing Neural Signals for Access Control. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena Obscuro: A Bitcoin Mixer using Trusted Execution Environments. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, Wenke Lee Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan D. Parra Rodriguez, Joachim Posegga RAPID: Resource and API-Based Detection Against In-Browser Miners. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Changming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin 0001 A Heuristic Framework to Detect Concurrency Vulnerabilities. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao 0002, Shouhuai Xu, Jiabin Wang, Qi Xiong ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alina Oprea, Zhou Li, Robin Norris, Kevin D. Bowers MADE: Security Analytics for Enterprise Threat Detection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christof Ferreira Torres, Julian Schütte, Radu State Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andre Greubel, Alexandra Dmitrienko, Samuel Kounev SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer 0001 Tracking Users across the Web via TLS Session Resumption. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine R. Davis, Saman A. Zonouz Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Flynn Wolf, Ravi Kuber Comparing Video Based Shoulder Surfing with Live Simulation. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert 0001, Apostolis Zarras Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr An Extensive Evaluation of the Internet's Open Proxies. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun 0001, Quan Zhou A Measurement Study on Linux Container Security: Attacks and Countermeasures. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang SENSS Against Volumetric DDoS Attacks. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shachee Mishra, Michalis Polychronakis Shredder: Breaking Exploits through API Specialization. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta Model Extraction Warning in MLaaS Paradigm. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oliver Wiese, Christoph Weinhold, Jan-Ole Malchow, Volker Roth 0002 I Need this Back, Later!: An Exploration of Practical Secret Sharing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo Mapping to Bits: Efficiently Detecting Type Confusion Errors. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ximing Liu, Yingjiu Li, Robert H. Deng Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shota Futagami, Tomoya Unoki, Kenichi Kourai Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Yang 0013, Deguang Kong, Tao Xie 0001, Carl A. Gunter Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maliheh Shirvanian, Nitesh Saxena, Jesvin James George On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu 0005, Xinyu Xing, Luning Xia Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Timothy Barron, Nick Nikiforakis Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiyue Deng, Jelena Mirkovic Commoner Privacy And A Study On Network Traces. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anh Quach, Matthew Cole, Aravind Prakash Supplementing Modern Software Defenses with Stack-Pointer Sanity. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter C. Johnson 0001, Sergey Bratus, Sean W. Smith Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jelena Mirkovic, Erik Kline, Peter L. Reiher RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz Breaking and Fixing Destructive Code Read Defenses. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard J. Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter TRAKS: A Universal Key Management Scheme for ERTMS. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Uyeong Jang, Xi Wu 0001, Somesh Jha Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya The Devil's in The Details: Placing Decoy Routers in the Internet. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö n-Auth: Mobile Authentication Done Right. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chris McMahon Stone, Tom Chothia, Flavio D. Garcia Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jake Weidman, Jens Grossklags I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna Piston: Uncooperative Remote Runtime Patching. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang 0001, Dongyan Xu RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaoyu Cao, Neil Zhenqiang Gong Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lingwei Chen, Shifu Hou, Yanfang Ye SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matteo Dell'Amico, Leyla Bilge, Ashwin Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Long Cheng, Ke Tian, Danfeng (Daphne) Yao Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi QUASAR: Quantitative Attack Space Analysis and Reasoning. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar A Secure Mobile Authentication Alternative to Biometrics. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska A Security-Mode for Carrier-Grade SDN Controllers. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang 0001 Analysis of SEAndroid Policies: Combining MAC and DAC in Android. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy Predicting Cyber Threats with Virtual Security Products. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, Michel Cozic Proxy Re-Encryption Based on Homomorphic Encryption. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1320 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license