


default search action
27. ACSAC 2011: Orlando, FL, USA
- Robert H'obbes' Zakon, John P. McDermott, Michael E. Locasto:

Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011. ACM 2011, ISBN 978-1-4503-0672-0
Malware I
- Yacin Nadji, Manos Antonakakis, Roberto Perdisci

, Wenke Lee:
Understanding the prevalence and use of alternative plans in malware with network games. 1-10 - Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel:

FORECAST: skimming off the malware cream. 11-20 - Matthias Neugschwandtner, Paolo Milani Comparetti, Christian Platzer:

Detecting malware's failover C&C strategies with squeeze. 21-30
Situational awareness I
- Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash

, Karem A. Sakallah
:
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. 31-40 - John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen:

RIPE: runtime intrusion prevention evaluator. 41-50 - Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna:

Hit 'em where it hurts: a live security exercise on cyber situational awareness. 51-61
Applied cryptography
- Nilesh Nipane, Italo Dacosta, Patrick Traynor:

"Mix-in-Place" anonymous networking using secure function evaluation. 63-72 - Patrick Simmons:

Security through amnesia: a software-based solution to the cold boot attack on disk encryption. 73-82 - Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:

Private search in the real world. 83-92
Social network security
- Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:

The socialbot network: when bots socialize for fame and money. 93-102 - Hongxin Hu, Gail-Joon Ahn

, Jan Jorgensen:
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. 103-112 - Markus Huber

, Martin Mulazzani, Manuel Leithner
, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl:
Social snapshots: digital forensics for online social networks. 113-122
Classic paper I
- Paul F. Syverson:

A peel of onion. 123-137
Invited essayist
- Terry Benzel:

The science of cyber security experimentation: the DETER project. 137-148
Usable security
- Max Hlywa, Robert Biddle, Andrew S. Patrick:

Facing the facts about image type in recognition-based graphical passwords. 149-158 - Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson:

PhorceField: a phish-proof password ceremony. 159-168 - Ahmed Awad E. Ahmed, Issa Traoré:

Dynamic sample size detection in continuous authentication using sequential sampling. 169-176
Secure infrastructure
- Ahmed Khurshid, Firat Kiyak, Matthew Caesar

:
Improving robustness of DNS to software vulnerabilities. 177-186 - Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun:

Enabling secure VM-vTPM migration in private clouds. 187-196 - Xiapu Luo

, Peng Zhou, Junjie Zhang, Roberto Perdisci
, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. 197-206
Anonymity
- W. Brad Moore, Chris Wacek, Micah Sherr:

Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise. 207-216 - Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:

"Super nodes" in Tor: existence and security implication. 217-226 - Marek Jawurek, Martin Johns

, Konrad Rieck:
Smart metering de-pseudonymization. 227-236
Web security I
- Shardul Vikram, Yinan Fan, Guofei Gu:

SEMAGE: a new image-based two-factor CAPTCHA. 237-246 - Xiaowei Li, Yuan Xue:

BLOCK: a black-box approach for detection of state violation attacks towards web applications. 247-256 - Riccardo Pelizzi, R. Sekar:

A server- and browser-transparent CSRF defense for web 2.0 applications. 257-266
Software security
- Jing Xie, Bill Chu, Heather Richter Lipford, John T. Melton:

ASIDE: IDE support for web application security. 267-276 - Jennia Hizver, Tzi-cker Chiueh:

Tracking payment card data flow using virtual machine state introspection. 277-285
Web security II
- Dongwan Shin

, Rodrigo Lopes:
An empirical study of visual security cues to prevent the SSLstripping attack. 287-296 - Xinshu Dong, Minh Tran, Zhenkai Liang

, Xuxian Jiang:
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. 297-306 - Steven Van Acker, Philippe De Ryck, Lieven Desmet

, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. 307-316
Classic paper II
- Matt Blaze:

Key escrow from a safe distance: looking back at the Clipper Chip. 317-321
Mobile security
- Omid Fatemieh, Michael LeMay, Carl A. Gunter:

Reliable telemetry in white spaces using remote attestation. 323-332 - Ahren Studer, Timothy Passaro, Lujo Bauer

:
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. 333-342 - Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin

:
Attacks on WebView in the Android system. 343-352
Malware II
- Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh:

Mitigating code-reuse attacks with control-flow locking. 353-362 - Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao

:
deRop: removing return-oriented programming from malware. 363-372 - Pavel Laskov, Nedim Srndic:

Static detection of malicious JavaScript-bearing PDF documents. 373-382
Situational awareness II
- Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna:

Nexat: a history-based approach to predict attacker actions. 383-392 - Ang Cui, Jatin Kataria, Salvatore J. Stolfo:

From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. 393-402
Malware III
- Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:

BareBox: efficient malware analysis on bare-metal. 403-412 - Yacin Nadji, Jonathon T. Giffin, Patrick Traynor:

Automated remote repair for mobile malware. 413-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














