Search dblp for Publications

export results for "toc:db/conf/ccs/ccs2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/0002KKB12,
  author       = {Aditi Gupta and
                  Sam Kerr and
                  Michael S. Kirkpatrick and
                  Elisa Bertino},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Marlin: making it harder to fish for gadgets},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1016--1018},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382310},
  doi          = {10.1145/2382196.2382310},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0002KKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AizatulinGJ12,
  author       = {Mihhail Aizatulin and
                  Andrew D. Gordon and
                  Jan J{\"{u}}rjens},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Computational verification of {C} protocol implementations by symbolic
                  execution},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {712--723},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382271},
  doi          = {10.1145/2382196.2382271},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AizatulinGJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Akinyele0HP12,
  author       = {Joseph A. Akinyele and
                  Matthew Green and
                  Susan Hohenberger and
                  Matthew W. Pagano},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Machine-generated algorithms, proofs and software for the batch verification
                  of digital signature schemes},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {474--487},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382248},
  doi          = {10.1145/2382196.2382248},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Akinyele0HP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AkkusCHFG12,
  author       = {Istemi Ekin Akkus and
                  Ruichuan Chen and
                  Michaela Hardt and
                  Paul Francis and
                  Johannes Gehrke},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Non-tracking web analytics},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {687--698},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382268},
  doi          = {10.1145/2382196.2382268},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AkkusCHFG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlSabahBG12,
  author       = {Mashael AlSabah and
                  Kevin S. Bauer and
                  Ian Goldberg},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Enhancing Tor's performance using real-time traffic classification},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382208},
  doi          = {10.1145/2382196.2382208},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlSabahBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlmeidaBBBKB12,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Endre Bangerter and
                  Gilles Barthe and
                  Stephan Krenn and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Full proof cryptography: verifiable compilation of efficient zero-knowledge
                  protocols},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {488--500},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382249},
  doi          = {10.1145/2382196.2382249},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlmeidaBBBKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan and
                  Nico Golde and
                  Kevin Redon and
                  Ravishankar Borgaonkar},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {New privacy issues in mobile telephony: fix and verification},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {205--216},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382221},
  doi          = {10.1145/2382196.2382221},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArapinisMRRGRB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArchambaultS12,
  author       = {{\'{E}}rik Archambault and
                  Craig A. Shue},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Understanding new anonymity networks from a user's perspective},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {995--997},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382303},
  doi          = {10.1145/2382196.2382303},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArchambaultS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AuK12,
  author       = {Man Ho Au and
                  Apu Kapadia},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{PERM:} practical reputation-based blacklisting without {TTPS}},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {929--940},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382294},
  doi          = {10.1145/2382196.2382294},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AuZHL12,
  author       = {Kathy Wain Yee Au and
                  Yi Fan Zhou and
                  Zhen Huang and
                  David Lie},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {PScout: analyzing the Android permission specification},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {217--228},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382222},
  doi          = {10.1145/2382196.2382222},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AuZHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMU12,
  author       = {Michael Backes and
                  Ankit Malik and
                  Dominique Unruh},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Computational soundness without protocol restrictions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {699--711},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382270},
  doi          = {10.1145/2382196.2382270},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarthePB12,
  author       = {Gilles Barthe and
                  David Pointcheval and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Verified security of redundancy-free encryption from Rabin and {RSA}},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {724--735},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382272},
  doi          = {10.1145/2382196.2382272},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BarthePB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareHR12,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Foundations of garbled circuits},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {784--796},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382279},
  doi          = {10.1145/2382196.2382279},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BernhardCPW12,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Bogdan Warinschi},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Measuring vote privacy, revisited},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {941--952},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382295},
  doi          = {10.1145/2382196.2382295},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BernhardCPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BianchiSKV12,
  author       = {Antonio Bianchi and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Blacksheep: detecting compromised hosts in homogeneous crowds},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {341--352},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382234},
  doi          = {10.1145/2382196.2382234},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BianchiSKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BilgeD12,
  author       = {Leyla Bilge and
                  Tudor Dumitras},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Before we knew it: an empirical study of zero-day attacks in the real
                  world},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {833--844},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382284},
  doi          = {10.1145/2382196.2382284},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BilgeD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaL12,
  author       = {Alexandra Boldyreva and
                  Robert Lychev},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Provable security of {S-BGP} and other path vector protocols: model,
                  analysis and extensions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {541--552},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382254},
  doi          = {10.1145/2382196.2382254},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoldyrevaL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Borisov12,
  author       = {Nikita Borisov},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {11th workshop on privacy in the electronic society},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1064--1065},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382331},
  doi          = {10.1145/2382196.2382331},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Borisov12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Bravo-LilloCDKSS12,
  author       = {Cristian Bravo{-}Lillo and
                  Lorrie Faith Cranor and
                  Julie S. Downs and
                  Saranga Komanduri and
                  Stuart E. Schechter and
                  Manya Sleeper},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Operating system framed in case of mistaken identity: measuring the
                  success of web-based spoofing attacks on {OS} password-entry dialogs},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {365--377},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382237},
  doi          = {10.1145/2382196.2382237},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Bravo-LilloCDKSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ButtLSG12,
  author       = {Shakeel Butt and
                  H. Andr{\'{e}}s Lagar{-}Cavilla and
                  Abhinav Srivastava and
                  Vinod Ganapathy},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Self-service cloud computing},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {253--264},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382226},
  doi          = {10.1145/2382196.2382226},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ButtLSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaiZJJ12,
  author       = {Xiang Cai and
                  Xin Cheng Zhang and
                  Brijesh Joshi and
                  Rob Johnson},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Touching from a distance: website fingerprinting attacks and defenses},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {605--616},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382260},
  doi          = {10.1145/2382196.2382260},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaiZJJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CalvetFM12,
  author       = {Joan Calvet and
                  Jos{\'{e}} M. Fernandez and
                  Jean{-}Yves Marion},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Aligot: cryptographic function identification in obfuscated binary
                  programs},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {169--182},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382217},
  doi          = {10.1145/2382196.2382217},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CalvetFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischLN12,
  author       = {Jan Camenisch and
                  Anna Lysyanskaya and
                  Gregory Neven},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Practical yet universally composable two-server password-authenticated
                  secret sharing},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {525--536},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382252},
  doi          = {10.1145/2382196.2382252},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CamenischLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CapkunK12,
  author       = {Srdjan Capkun and
                  Seny Kamara},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {4th cloud computing security workshop {(CCSW} 2012)},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1060--1061},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382329},
  doi          = {10.1145/2382196.2382329},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CapkunK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CardenasNR12,
  author       = {Alvaro A. C{\'{a}}rdenas and
                  Blaine Nelson and
                  Benjamin I. P. Rubinstein},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Fifth {ACM} workshop on artificial intelligence and security (AISec
                  2012)},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1056--1057},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382327},
  doi          = {10.1145/2382196.2382327},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CardenasNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChakrabortyRST12,
  author       = {Supriyo Chakraborty and
                  Kasturi Rangan Raghavan and
                  Mani B. Srivastava and
                  Harris Teague},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Model-based context privacy for personal data streams},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1046--1048},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382320},
  doi          = {10.1145/2382196.2382320},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChakrabortyRST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenAC12,
  author       = {Rui Chen and
                  Gergely {\'{A}}cs and
                  Claude Castelluccia},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Differentially private sequential data publication via variable-length
                  n-grams},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {638--649},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382263},
  doi          = {10.1145/2382196.2382263},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenC12,
  author       = {Bo Chen and
                  Reza Curtmola},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Robust dynamic remote data checking for public clouds},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1043--1045},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382319},
  doi          = {10.1145/2382196.2382319},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenJL12,
  author       = {Yu{-}Yuan Chen and
                  Pramod A. Jamkhedkar and
                  Ruby B. Lee},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {A software-hardware architecture for self-protecting data},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {14--27},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382201},
  doi          = {10.1145/2382196.2382201},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Christodorescu12,
  author       = {Mihai Christodorescu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Second workshop on building analysis datasets and gathering experience
                  returns for security (BADGERS'12)},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1066--1067},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382332},
  doi          = {10.1145/2382196.2382332},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Christodorescu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuangG012,
  author       = {Wei{-}Hong Chuang and
                  Ravi Garg and
                  Min Wu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {How secure are power network signature based time stamps?},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {428--438},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382243},
  doi          = {10.1145/2382196.2382243},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuangG012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CortierSW12,
  author       = {V{\'{e}}ronique Cortier and
                  Graham Steel and
                  Cyrille Wiedling},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Revoke and let live: a secure key revocation api for cryptographic
                  devices},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {918--928},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382293},
  doi          = {10.1145/2382196.2382293},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CortierSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CramptonGY12,
  author       = {Jason Crampton and
                  Gregory Z. Gutin and
                  Anders Yeo},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {On the parameterized complexity of the workflow satisfiability problem},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {857--868},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382287},
  doi          = {10.1145/2382196.2382287},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CramptonGY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CuiFLL12,
  author       = {Xiang Cui and
                  Binxing Fang and
                  Peng Liao and
                  Chaoge Liu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Advanced triple-channel botnets: model and implementation},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1019--1021},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382311},
  doi          = {10.1145/2382196.2382311},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CuiFLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CzeskisDKWB12,
  author       = {Alexei Czeskis and
                  Michael Dietz and
                  Tadayoshi Kohno and
                  Dan S. Wallach and
                  Dirk Balfanz},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Strengthening user authentication through opportunistic cryptographic
                  identity assertions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {404--414},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382240},
  doi          = {10.1145/2382196.2382240},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CzeskisDKWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dagon12,
  author       = {David Dagon},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Large-scale {DNS} data analysis},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1054--1055},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382325},
  doi          = {10.1145/2382196.2382325},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dagon12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DamGL12,
  author       = {Mads Dam and
                  Gurvan Le Guernic and
                  Andreas Lundblad},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {TreeDroid: a tree automaton based approach to enforcing data processing
                  policies},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {894--905},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382290},
  doi          = {10.1145/2382196.2382290},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DamGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DijkJORST12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Emil Stefanov and
                  Nikos Triandopoulos},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Hourglass schemes: how to prove that cloud files are encrypted},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {265--280},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382227},
  doi          = {10.1145/2382196.2382227},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EdwardsC12,
  author       = {Nigel Edwards and
                  Liqun Chen},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {An historical examination of open source releases and their vulnerabilities},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {183--194},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382218},
  doi          = {10.1145/2382196.2382218},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EdwardsC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnckJ12,
  author       = {William Enck and
                  Xuxian Jiang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {CCS'12 co-located workshop summary for {SPSM} 2012},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1062--1063},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382330},
  doi          = {10.1145/2382196.2382330},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EnckJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EngelhardtMZ12,
  author       = {Kai Engelhardt and
                  Ron van der Meyden and
                  Chenyi Zhang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Intransitive noninterference in nondeterministic systems},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {869--880},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382288},
  doi          = {10.1145/2382196.2382288},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EngelhardtMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FahlHMSBF12,
  author       = {Sascha Fahl and
                  Marian Harbach and
                  Thomas Muders and
                  Matthew Smith and
                  Lars Baumg{\"{a}}rtner and
                  Bernd Freisleben},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Why eve and mallory love android: an analysis of android {SSL} (in)security},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {50--61},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382205},
  doi          = {10.1145/2382196.2382205},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FahlHMSBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FioreG12,
  author       = {Dario Fiore and
                  Rosario Gennaro},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Publicly verifiable delegation of large polynomials and matrix computations,
                  with applications},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {501--512},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382250},
  doi          = {10.1145/2382196.2382250},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FioreG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoZLLC12,
  author       = {Zhaoyu Gao and
                  Haojin Zhu and
                  Yao Liu and
                  Muyuan Li and
                  Zhenfu Cao},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Location privacy leaking from spectrum utilization information in
                  database-driven cognitive radio network},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1025--1027},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382313},
  doi          = {10.1145/2382196.2382313},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoZLLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GeneiatakisPKK12,
  author       = {Dimitris Geneiatakis and
                  Georgios Portokalidis and
                  Vasileios P. Kemerlis and
                  Angelos D. Keromytis},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Adaptive defenses for commodity software through virtual application
                  partitioning},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {133--144},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382214},
  doi          = {10.1145/2382196.2382214},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GeneiatakisPKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GeorgievIJABS12,
  author       = {Martin Georgiev and
                  Subodh Iyengar and
                  Suman Jana and
                  Rishita Anubhai and
                  Dan Boneh and
                  Vitaly Shmatikov},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {The most dangerous code in the world: validating {SSL} certificates
                  in non-browser software},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {38--49},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382204},
  doi          = {10.1145/2382196.2382204},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GeorgievIJABS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gligor12,
  author       = {Virgil D. Gligor},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {On the foundations of trust in networks of humans and computers},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382198},
  doi          = {10.1145/2382196.2382198},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gligor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GordonKKKM0V12,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Fernando Krell and
                  Tal Malkin and
                  Mariana Raykova and
                  Yevgeniy Vahlis},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Secure two-party computation in sublinear (amortized) time},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {513--524},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382251},
  doi          = {10.1145/2382196.2382251},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GordonKKKM0V12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12,
  author       = {Chris Grier and
                  Lucas Ballard and
                  Juan Caballero and
                  Neha Chachra and
                  Christian J. Dietrich and
                  Kirill Levchenko and
                  Panayiotis Mavrommatis and
                  Damon McCoy and
                  Antonio Nappa and
                  Andreas Pitsillidis and
                  Niels Provos and
                  M. Zubair Rafique and
                  Moheeb Abu Rajab and
                  Christian Rossow and
                  Kurt Thomas and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Manufacturing compromise: the emergence of exploit-as-a-service},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {821--832},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382283},
  doi          = {10.1145/2382196.2382283},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GroefDNP12,
  author       = {Willem De Groef and
                  Dominique Devriese and
                  Nick Nikiforakis and
                  Frank Piessens},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {FlowFox: a web browser with flexible and precise information flow
                  control},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {748--759},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382275},
  doi          = {10.1145/2382196.2382275},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GroefDNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuoC12,
  author       = {Shumin Guo and
                  Keke Chen},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Privacy preserving boosting in the cloud with secure half-space queries},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1031--1033},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382315},
  doi          = {10.1145/2382196.2382315},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarbachFMS12,
  author       = {Marian Harbach and
                  Sascha Fahl and
                  Thomas Muders and
                  Matthew Smith},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Towards measuring warning readability},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {989--991},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382301},
  doi          = {10.1145/2382196.2382301},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HarbachFMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HardtN12,
  author       = {Michaela Hardt and
                  Suman Nath},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Privacy-aware personalization for mobile advertising},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {662--673},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382266},
  doi          = {10.1145/2382196.2382266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HardtN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeiderichNSHS12,
  author       = {Mario Heiderich and
                  Marcus Niemietz and
                  Felix Schuster and
                  Thorsten Holz and
                  J{\"{o}}rg Schwenk},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Scriptless attacks: stealing the pie without touching the sill},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {760--771},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382276},
  doi          = {10.1145/2382196.2382276},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeiderichNSHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HolzerFKV12,
  author       = {Andreas Holzer and
                  Martin Franz and
                  Stefan Katzenbeisser and
                  Helmut Veith},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Secure two-party computations in {ANSI} {C}},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {772--783},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382278},
  doi          = {10.1145/2382196.2382278},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HolzerFKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HongYX12,
  author       = {Chi{-}Yao Hong and
                  Fang Yu and
                  Yinglian Xie},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Populated {IP} addresses: classification and applications},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {329--340},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382233},
  doi          = {10.1145/2382196.2382233},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HongYX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JamshedLMYKLYP12,
  author       = {Muhammad Asim Jamshed and
                  Jihyung Lee and
                  Sangwoo Moon and
                  Insu Yun and
                  Deokjin Kim and
                  Sungryoul Lee and
                  Yung Yi and
                  KyoungSoo Park},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Kargus: a highly-scalable software-based intrusion detection system},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {317--328},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382232},
  doi          = {10.1145/2382196.2382232},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JamshedLMYKLYP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KamaraMR12,
  author       = {Seny Kamara and
                  Payman Mohassel and
                  Ben Riva},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Salus: a system for server-aided secure function evaluation},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {797--808},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382280},
  doi          = {10.1145/2382196.2382280},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KamaraMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KamaraPR12,
  author       = {Seny Kamara and
                  Charalampos Papamanthou and
                  Tom Roeder},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Dynamic searchable symmetric encryption},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {965--976},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382298},
  doi          = {10.1145/2382196.2382298},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KamaraPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KammerstetterPW12,
  author       = {Markus Kammerstetter and
                  Christian Platzer and
                  Gilbert Wondracek},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Vanity, cracks and malware: insights into the anti-copy protection
                  ecosystem},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {809--820},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382282},
  doi          = {10.1145/2382196.2382282},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KammerstetterPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarameAC12,
  author       = {Ghassan Karame and
                  Elli Androulaki and
                  Srdjan Capkun},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Double-spending fast payments in bitcoin},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {906--917},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382292},
  doi          = {10.1145/2382196.2382292},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KarameAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimGHOHPG12,
  author       = {Tiffany Hyun{-}Jin Kim and
                  Payas Gupta and
                  Jun Han and
                  Emmanuel Owusu and
                  Jason I. Hong and
                  Adrian Perrig and
                  Debin Gao},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{OTO:} online trust oracle for user-centric trust establishment},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {391--403},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382239},
  doi          = {10.1145/2382196.2382239},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KimGHOHPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeJLTCT12,
  author       = {Lung{-}Hao Lee and
                  Yen{-}Cheng Juan and
                  Kuei{-}Ching Lee and
                  Wei{-}Lin Tseng and
                  Hsin{-}Hsi Chen and
                  Yuen{-}Hsien Tseng},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Context-aware web security threat prevention},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {992--994},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382302},
  doi          = {10.1145/2382196.2382302},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeJLTCT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeSS12,
  author       = {Ruby B. Lee and
                  Simha Sethumadhavan and
                  G. Edward Suh},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Hardware enhanced security},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1052},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382323},
  doi          = {10.1145/2382196.2382323},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiZXYW12,
  author       = {Zhou Li and
                  Kehuan Zhang and
                  Yinglian Xie and
                  Fang Yu and
                  XiaoFeng Wang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Knowing your enemy: understanding and detecting malicious web advertising},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {674--686},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382267},
  doi          = {10.1145/2382196.2382267},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiZXYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuW12,
  author       = {Dongxi Liu and
                  Shenlu Wang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Query encrypted databases practically},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1049--1051},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382321},
  doi          = {10.1145/2382196.2382321},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuLWLJ12,
  author       = {Long Lu and
                  Zhichun Li and
                  Zhenyu Wu and
                  Wenke Lee and
                  Guofei Jiang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{CHEX:} statically vetting Android apps for component hijacking vulnerabilities},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {229--240},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382223},
  doi          = {10.1145/2382196.2382223},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuLWLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosVVP12,
  author       = {Nikos Mavrogiannopoulos and
                  Frederik Vercauteren and
                  Vesselin Velichkov and
                  Bart Preneel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {A cross-protocol attack on the {TLS} protocol},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382206},
  doi          = {10.1145/2382196.2382206},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosVVP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McCoyDKVS12,
  author       = {Damon McCoy and
                  Hitesh Dharmdasani and
                  Christian Kreibich and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Priceless: the role of payments in abuse-advertised goods},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {845--856},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382285},
  doi          = {10.1145/2382196.2382285},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McCoyDKVS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McLaughlinM12,
  author       = {Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{SABOT:} specification-based payload generation for programmable logic
                  controllers},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {439--449},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382244},
  doi          = {10.1145/2382196.2382244},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McLaughlinM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenahemNE12,
  author       = {Eitan Menahem and
                  Gabi Nakibly and
                  Yuval Elovici},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Network-based intrusion detection systems go active!},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1004--1006},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382306},
  doi          = {10.1145/2382196.2382306},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MenahemNE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mironov12,
  author       = {Ilya Mironov},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {On significance of the least significant bits for differential privacy},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {650--661},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382264},
  doi          = {10.1145/2382196.2382264},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Mironov12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MockHWM12,
  author       = {Kenrick J. Mock and
                  Bogdan Hoanca and
                  Justin Weaver and
                  Mikal Milton},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Real-time continuous iris recognition for authentication using an
                  eye tracker},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1007--1009},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382307},
  doi          = {10.1145/2382196.2382307},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MockHWM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoghaddamLDG12,
  author       = {Hooman Mohajeri Moghaddam and
                  Baiyu Li and
                  Mohammad Derakhshani and
                  Ian Goldberg},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {SkypeMorph: protocol obfuscation for Tor bridges},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382210},
  doi          = {10.1145/2382196.2382210},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoghaddamLDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenZSXK12,
  author       = {Abedelaziz Mohaisen and
                  Xinwen Zhang and
                  Max Schuchard and
                  Haiyong Xie and
                  Yongdae Kim},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Protecting access privacy of cached contents in information centric
                  networks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1001--1003},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382305},
  doi          = {10.1145/2382196.2382305},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohaisenZSXK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoonLLKPK12,
  author       = {Hyungon Moon and
                  Hojoon Lee and
                  Jihoon Lee and
                  Kihwan Kim and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Vigilare: toward snoop-based kernel integrity monitor},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {28--37},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382202},
  doi          = {10.1145/2382196.2382202},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MoonLLKPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MooreAC12,
  author       = {Scott Moore and
                  Aslan Askarov and
                  Stephen Chong},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Precise enforcement of progress-sensitive security},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {881--893},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382289},
  doi          = {10.1145/2382196.2382289},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MooreAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MuthukumaranJG12,
  author       = {Divya Muthukumaran and
                  Trent Jaeger and
                  Vinod Ganapathy},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Leveraging "choice" to automate authorization hook placement},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {145--156},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382215},
  doi          = {10.1145/2382196.2382215},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MuthukumaranJG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NighswanderLDBB12,
  author       = {Tyler Nighswander and
                  Brent M. Ledvina and
                  Jonathan Diamond and
                  Robert Brumley and
                  David Brumley},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{GPS} software attacks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {450--461},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382245},
  doi          = {10.1145/2382196.2382245},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NighswanderLDBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12,
  author       = {Nick Nikiforakis and
                  Luca Invernizzi and
                  Alexandros Kapravelos and
                  Steven {Van Acker} and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {You are what you include: large-scale evaluation of remote javascript
                  inclusions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {736--747},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382274},
  doi          = {10.1145/2382196.2382274},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PanLPYZF12,
  author       = {Xian Pan and
                  Zhen Ling and
                  Aniket Pingley and
                  Wei Yu and
                  Nan Zhang and
                  Xinwen Fu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {How privacy leaks from bluetooth mouse?},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1013--1015},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382309},
  doi          = {10.1145/2382196.2382309},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PanLPYZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PengGSLQPNM12,
  author       = {Hao Peng and
                  Christopher S. Gates and
                  Bhaskar Pratim Sarma and
                  Ninghui Li and
                  Yuan Qi and
                  Rahul Potharaju and
                  Cristina Nita{-}Rotaru and
                  Ian M. Molloy},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Using probabilistic generative models for ranking risks of Android
                  apps},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {241--252},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382224},
  doi          = {10.1145/2382196.2382224},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PengGSLQPNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PengLTLZ12,
  author       = {Chunyi Peng and
                  Chi{-}Yu Li and
                  Guan{-}Hua Tu and
                  Songwu Lu and
                  Lixia Zhang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Mobile data charging: new attacks and countermeasures},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382220},
  doi          = {10.1145/2382196.2382220},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PengLTLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PetraccaSHM12,
  author       = {Giuseppe Petracca and
                  Anna Cinzia Squicciarini and
                  William G. Horne and
                  Marco Casassa Mont},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {ReasONets: a fuzzy-based approach for reasoning on network incidents},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1010--1012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382308},
  doi          = {10.1145/2382196.2382308},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PetraccaSHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QianMX12,
  author       = {Zhiyun Qian and
                  Zhuoqing Morley Mao and
                  Yinglian Xie},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Collaborative {TCP} sequence number inference attack: how to crack
                  sequence number under a second},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {593--604},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382258},
  doi          = {10.1145/2382196.2382258},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QianMX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RoufMXXMG12,
  author       = {Ishtiaq Rouf and
                  Hossen Asiful Mustafa and
                  Miao Xu and
                  Wenyuan Xu and
                  Robert D. Miller and
                  Marco Gruteser},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Neighborhood watch: security and privacy analysis of automatic meter
                  reading systems},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {462--473},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382246},
  doi          = {10.1145/2382196.2382246},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RoufMXXMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RusselloCCFZ12,
  author       = {Giovanni Russello and
                  Mauro Conti and
                  Bruno Crispo and
                  Earlence Fernandes and
                  Yury Zhauniarovich},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Demonstrating the effectiveness of {MOSES} for separation of execution
                  modes},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {998--1000},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382304},
  doi          = {10.1145/2382196.2382304},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RusselloCCFZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchroederS12,
  author       = {Dominique Schr{\"{o}}der and
                  Heike Schr{\"{o}}der},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Verifiable data streaming},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {953--964},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382297},
  doi          = {10.1145/2382196.2382297},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchroederS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchuchardGTH12,
  author       = {Max Schuchard and
                  John Geddes and
                  Christopher Thompson and
                  Nicholas Hopper},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Routing around decoys},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382209},
  doi          = {10.1145/2382196.2382209},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchuchardGTH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shapiro12,
  author       = {Stuart S. Shapiro},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {The state and evolution of privacy by design},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1053},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382324},
  doi          = {10.1145/2382196.2382324},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Shapiro12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShebaroSGB12,
  author       = {Bilal Shebaro and
                  Salmin Sultana and
                  Shakthidhar Reddy Gopavaram and
                  Elisa Bertino},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Demonstrating a lightweight data provenance for sensor networks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1022--1024},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382312},
  doi          = {10.1145/2382196.2382312},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShebaroSGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShokriTTHB12,
  author       = {Reza Shokri and
                  George Theodorakopoulos and
                  Carmela Troncoso and
                  Jean{-}Pierre Hubaux and
                  Jean{-}Yves Le Boudec},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Protecting location privacy: optimal strategy against localization
                  attacks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {617--627},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382261},
  doi          = {10.1145/2382196.2382261},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShokriTTHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SrivatsaH12,
  author       = {Mudhakar Srivatsa and
                  Michael Hicks},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Deanonymizing mobility traces: using social network as a side-channel},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {628--637},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382262},
  doi          = {10.1145/2382196.2382262},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SrivatsaH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StrackxP12,
  author       = {Raoul Strackx and
                  Frank Piessens},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Fides: selectively hardening software application components against
                  kernel-level or process-level malware},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {2--13},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382200},
  doi          = {10.1145/2382196.2382200},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StrackxP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunB12,
  author       = {San{-}Tsai Sun and
                  Konstantin Beznosov},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {The devil is in the (implementation) details: an empirical analysis
                  of OAuth {SSO} systems},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {378--390},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382238},
  doi          = {10.1145/2382196.2382238},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VaradarajanKFRS12,
  author       = {Venkatanathan Varadarajan and
                  Thawan Kooburat and
                  Benjamin Farley and
                  Thomas Ristenpart and
                  Michael M. Swift},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Resource-freeing attacks: improve your cloud performance (at your
                  neighbor's expense)},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {281--292},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382228},
  doi          = {10.1145/2382196.2382228},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VaradarajanKFRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangGNHB12,
  author       = {Qiyan Wang and
                  Xun Gong and
                  Giang T. K. Nguyen and
                  Amir Houmansadr and
                  Nikita Borisov},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {CensorSpoofer: asymmetric communication using {IP} spoofing for censorship-resistant
                  web browsing},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382212},
  doi          = {10.1145/2382196.2382212},
  timestamp    = {Fri, 23 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangGNHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WartellMHL12,
  author       = {Richard Wartell and
                  Vishwath Mohan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Binary stirring: self-randomizing instruction addresses of legacy
                  x86 binary code},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382216},
  doi          = {10.1145/2382196.2382216},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WartellMHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeinbergWYBCWB12,
  author       = {Zachary Weinberg and
                  Jeffrey Wang and
                  Vinod Yegneswaran and
                  Linda Briesemeister and
                  Steven Cheung and
                  Frank Wang and
                  Dan Boneh},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {StegoTorus: a camouflage proxy for the Tor anonymity system},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382211},
  doi          = {10.1145/2382196.2382211},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WeinbergWYBCWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WilliamsS12,
  author       = {Peter Williams and
                  Radu Sion},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Single round access privacy on outsourced storage},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {293--304},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382229},
  doi          = {10.1145/2382196.2382229},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WilliamsS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WilliamsST12,
  author       = {Peter Williams and
                  Radu Sion and
                  Alin Tomescu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {PrivateFS: a parallel oblivious file system},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {977--988},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382299},
  doi          = {10.1145/2382196.2382299},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WilliamsST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoXHW12,
  author       = {Jidong Xiao and
                  Zhang Xu and
                  Hai Huang and
                  Haining Wang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {A covert channel construction in a virtualized environment},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1040--1042},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382318},
  doi          = {10.1145/2382196.2382318},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XiaoXHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieYKAGVWHM12,
  author       = {Yinglian Xie and
                  Fang Yu and
                  Qifa Ke and
                  Mart{\'{\i}}n Abadi and
                  Eliot Gillum and
                  Krish Vitaldevaria and
                  Jason Walter and
                  Junxian Huang and
                  Zhuoqing Morley Mao},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Innocent by association: early recognition of legitimate users},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {353--364},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382235},
  doi          = {10.1145/2382196.2382235},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XieYKAGVWHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuCGK12,
  author       = {Zhaoyan Xu and
                  Lingfeng Chen and
                  Guofei Gu and
                  Christopher Kruegel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {PeerPress: utilizing enemies' {P2P} strength against them},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {581--592},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382257},
  doi          = {10.1145/2382196.2382257},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuCGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuZGL12,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Automatic generation of vaccines for malware immunization},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1037--1039},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382317},
  doi          = {10.1145/2382196.2382317},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuZGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YanLKW12,
  author       = {Guanhua Yan and
                  Ritchie Lee and
                  Alex Kent and
                  David H. Wolpert},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Towards a bayesian network game framework for evaluating DDoS attacks
                  and defense},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {553--566},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382255},
  doi          = {10.1145/2382196.2382255},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YanLKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLQQMM12,
  author       = {Weining Yang and
                  Ninghui Li and
                  Yuan Qi and
                  Wahbeh H. Qardaji and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Minimizing private data disclosures in the smart grid},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {415--427},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382242},
  doi          = {10.1145/2382196.2382242},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangLQQMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangYPG12,
  author       = {Chao Yang and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Guofei Gu},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Detecting money-stealing apps in alternative Android markets},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1034--1036},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382316},
  doi          = {10.1145/2382196.2382316},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangYPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuGS12,
  author       = {Haifeng Yu and
                  Phillip B. Gibbons and
                  Chenwei Shi},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {DCast: sustaining collaboration in overlay multicast despite rational
                  collusion},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {567--580},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382256},
  doi          = {10.1145/2382196.2382256},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuanSYL12,
  author       = {Jiawei Yuan and
                  Lu Shi and
                  Shucheng Yu and
                  Ming Li},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Authenticated secret key extraction using channel characteristics
                  for body area networks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1028--1030},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382314},
  doi          = {10.1145/2382196.2382314},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YuanSYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangD12,
  author       = {Xinwen Zhang and
                  Xuhua Ding},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{STC} 2012: the seventh {ACM} workshop on scalable trusted computing},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1058--1059},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382328},
  doi          = {10.1145/2382196.2382328},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR12,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Cross-VM side channels and their use to extract private keys},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {305--316},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382230},
  doi          = {10.1145/2382196.2382230},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangJRR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn         = {978-1-4503-1651-4},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics