


default search action
29. ACSAC 2013: New Orleans, LA, USA
- Charles N. Payne Jr.:

Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013. ACM 2013, ISBN 978-1-4503-2015-3
Distinguished practitioner
- William Young, Nancy G. Leveson:

Systems thinking for safety and security. 1-8
Mobile networks and apps
- Xiao Zhang, Amit Ahlawat, Wenliang Du:

AFrame: isolating advertisements from mobile applications in Android. 9-18 - Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos:

The man who was there: validating check-ins in location-based services. 19-28 - Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock:

Discovery of emergent malicious campaigns in cellular networks. 29-38
Privacy and privacy preserving technologies
- Luca Invernizzi, Christopher Kruegel, Giovanni Vigna:

Message in a bottle: sailing past censorship. 39-48 - Panagiotis Papadopoulos

, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras
, Thorsten Holz
, Evangelos P. Markatos:
k-subscription: privacy-preserving microblogging browsing through obfuscation. 49-58 - Min Li, Wanyu Zang, Kun Bai, Meng Yu

, Peng Liu:
MyCloud: supporting user-configured privacy protection in cloud computing. 59-68
Malware
- Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer:

Extraction of statistically significant malware behaviors. 69-78 - Xin Hu, Kang G. Shin:

DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. 79-88 - Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath:

SigMal: a static signal processing based malware triage. 89-98
Cyberphysical systems (CPS) security
- Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip

:
CPS: an efficiency-motivated attack against autonomous vehicular transportation. 99-108 - Stephen E. McLaughlin:

CPS: stateful policy enforcement for control system device usage. 109-118
Passwords and authentication
- Murat Akpulat, Kemal Bicakci

, Ugur Cil:
Revisiting graphical passwords for augmenting, not replacing, text passwords. 119-128 - David Schmidt, Trent Jaeger:

Pitfalls in the automated strengthening of passwords. 129-138
Invited essayist
- Carl E. Landwehr:

A building code for building code: putting what we know works to work. 139-147
Applying/applied cryptography
- Behrad Garmany, Tilo Müller:

PRIME: private RSA infrastructure for memory-less encryption. 149-158 - Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan

, Ahmad-Reza Sadeghi:
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. 159-168 - Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs:

GPU and CPU parallelization of honest-but-curious secure two-party computation. 169-178
Network security
- B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall:

No attack necessary: the surprising dynamics of SSL trust relationships. 179-188 - Amir Herzberg

, Haya Schulmann:
Socket overloading for fun and cache-poisoning. 189-198 - Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson

, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. 199-208
Systems security
- François Gauthier, Thierry Lavoie, Ettore Merlo:

Uncovering access control weaknesses and flaws with security-discordant software clones. 209-218 - Wai-Kit Sze, R. Sekar:

A portable user-level approach for system-wide integrity protection. 219-228 - Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen:

Subverting system authentication with context-aware, reactive virtual machine introspection. 229-238
Mobile systems security 1
- Mahmudur Rahman, Umut Topkara, Bogdan Carbunar:

Seeing is not believing: visual verifications through liveness analysis using mobile devices. 239-248 - Matthias Lange, Steffen Liebergeld:

Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities. 249-257 - Collin Mulliner, Jon Oberheide, William K. Robertson

, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. 259-268
Hardware and virtualization security
- Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi

, Stefano Zanero
:
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. 269-278 - Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon

, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas:
Implementation and implications of a stealth hard-drive backdoor. 279-288 - Zhui Deng, Xiangyu Zhang, Dongyan Xu:

SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. 289-298
Mobile systems security 2
- Felix Rohrer, Yuting Zhang, Lou Chitkushev

, Tanya Zlateva:
DR BACA: dynamic role based access control for Android. 299-308 - Jannik Pewny, Thorsten Holz

:
Control-flow restrictor: compiler-based CFI for iOS. 309-318 - Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark:

FireDroid: hardening security in almost-stock Android. 319-328
Web and cloud security
- Yogesh Mundada, Anirudh Ramachandran, Nick Feamster:

SilverLine: preventing data leaks from compromised web applications. 329-338 - Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou:

Validating web content with senser. 339-348 - Mohsen Zohrevandi, Rida A. Bazzi:

Auto-FBI: a user-friendly approach for secure access to sensitive content on the web. 349-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














