Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2012.bht:"
@inproceedings{DBLP:conf/ccs/0002KKB12, author = {Aditi Gupta and Sam Kerr and Michael S. Kirkpatrick and Elisa Bertino}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Marlin: making it harder to fish for gadgets}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1016--1018}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382310}, doi = {10.1145/2382196.2382310}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0002KKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AizatulinGJ12, author = {Mihhail Aizatulin and Andrew D. Gordon and Jan J{\"{u}}rjens}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Computational verification of {C} protocol implementations by symbolic execution}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {712--723}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382271}, doi = {10.1145/2382196.2382271}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AizatulinGJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Akinyele0HP12, author = {Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {474--487}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382248}, doi = {10.1145/2382196.2382248}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Akinyele0HP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AkkusCHFG12, author = {Istemi Ekin Akkus and Ruichuan Chen and Michaela Hardt and Paul Francis and Johannes Gehrke}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Non-tracking web analytics}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {687--698}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382268}, doi = {10.1145/2382196.2382268}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AkkusCHFG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlSabahBG12, author = {Mashael AlSabah and Kevin S. Bauer and Ian Goldberg}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Enhancing Tor's performance using real-time traffic classification}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {73--84}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382208}, doi = {10.1145/2382196.2382208}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlSabahBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlmeidaBBBKB12, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella B{\'{e}}guelin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {488--500}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382249}, doi = {10.1145/2382196.2382249}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlmeidaBBBKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan and Nico Golde and Kevin Redon and Ravishankar Borgaonkar}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {New privacy issues in mobile telephony: fix and verification}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {205--216}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382221}, doi = {10.1145/2382196.2382221}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArapinisMRRGRB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArchambaultS12, author = {{\'{E}}rik Archambault and Craig A. Shue}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Understanding new anonymity networks from a user's perspective}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {995--997}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382303}, doi = {10.1145/2382196.2382303}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArchambaultS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AuK12, author = {Man Ho Au and Apu Kapadia}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{PERM:} practical reputation-based blacklisting without {TTPS}}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {929--940}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382294}, doi = {10.1145/2382196.2382294}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AuZHL12, author = {Kathy Wain Yee Au and Yi Fan Zhou and Zhen Huang and David Lie}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {PScout: analyzing the Android permission specification}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {217--228}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382222}, doi = {10.1145/2382196.2382222}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AuZHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMU12, author = {Michael Backes and Ankit Malik and Dominique Unruh}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Computational soundness without protocol restrictions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {699--711}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382270}, doi = {10.1145/2382196.2382270}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesMU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarthePB12, author = {Gilles Barthe and David Pointcheval and Santiago Zanella B{\'{e}}guelin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Verified security of redundancy-free encryption from Rabin and {RSA}}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {724--735}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382272}, doi = {10.1145/2382196.2382272}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BarthePB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareHR12, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Foundations of garbled circuits}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {784--796}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382279}, doi = {10.1145/2382196.2382279}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BernhardCPW12, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Bogdan Warinschi}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Measuring vote privacy, revisited}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {941--952}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382295}, doi = {10.1145/2382196.2382295}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BernhardCPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BianchiSKV12, author = {Antonio Bianchi and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Blacksheep: detecting compromised hosts in homogeneous crowds}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {341--352}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382234}, doi = {10.1145/2382196.2382234}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BianchiSKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BilgeD12, author = {Leyla Bilge and Tudor Dumitras}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Before we knew it: an empirical study of zero-day attacks in the real world}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {833--844}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382284}, doi = {10.1145/2382196.2382284}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BilgeD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaL12, author = {Alexandra Boldyreva and Robert Lychev}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Provable security of {S-BGP} and other path vector protocols: model, analysis and extensions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {541--552}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382254}, doi = {10.1145/2382196.2382254}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Borisov12, author = {Nikita Borisov}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {11th workshop on privacy in the electronic society}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1064--1065}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382331}, doi = {10.1145/2382196.2382331}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Borisov12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bravo-LilloCDKSS12, author = {Cristian Bravo{-}Lillo and Lorrie Faith Cranor and Julie S. Downs and Saranga Komanduri and Stuart E. Schechter and Manya Sleeper}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on {OS} password-entry dialogs}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {365--377}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382237}, doi = {10.1145/2382196.2382237}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Bravo-LilloCDKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ButtLSG12, author = {Shakeel Butt and H. Andr{\'{e}}s Lagar{-}Cavilla and Abhinav Srivastava and Vinod Ganapathy}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Self-service cloud computing}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {253--264}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382226}, doi = {10.1145/2382196.2382226}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ButtLSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaiZJJ12, author = {Xiang Cai and Xin Cheng Zhang and Brijesh Joshi and Rob Johnson}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Touching from a distance: website fingerprinting attacks and defenses}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {605--616}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382260}, doi = {10.1145/2382196.2382260}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaiZJJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CalvetFM12, author = {Joan Calvet and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Aligot: cryptographic function identification in obfuscated binary programs}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {169--182}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382217}, doi = {10.1145/2382196.2382217}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CalvetFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CamenischLN12, author = {Jan Camenisch and Anna Lysyanskaya and Gregory Neven}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Practical yet universally composable two-server password-authenticated secret sharing}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {525--536}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382252}, doi = {10.1145/2382196.2382252}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CamenischLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CapkunK12, author = {Srdjan Capkun and Seny Kamara}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {4th cloud computing security workshop {(CCSW} 2012)}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1060--1061}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382329}, doi = {10.1145/2382196.2382329}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CapkunK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CardenasNR12, author = {Alvaro A. C{\'{a}}rdenas and Blaine Nelson and Benjamin I. P. Rubinstein}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Fifth {ACM} workshop on artificial intelligence and security (AISec 2012)}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1056--1057}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382327}, doi = {10.1145/2382196.2382327}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CardenasNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChakrabortyRST12, author = {Supriyo Chakraborty and Kasturi Rangan Raghavan and Mani B. Srivastava and Harris Teague}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Model-based context privacy for personal data streams}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1046--1048}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382320}, doi = {10.1145/2382196.2382320}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChakrabortyRST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenAC12, author = {Rui Chen and Gergely {\'{A}}cs and Claude Castelluccia}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Differentially private sequential data publication via variable-length n-grams}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {638--649}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382263}, doi = {10.1145/2382196.2382263}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenC12, author = {Bo Chen and Reza Curtmola}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Robust dynamic remote data checking for public clouds}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1043--1045}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382319}, doi = {10.1145/2382196.2382319}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenJL12, author = {Yu{-}Yuan Chen and Pramod A. Jamkhedkar and Ruby B. Lee}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {A software-hardware architecture for self-protecting data}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {14--27}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382201}, doi = {10.1145/2382196.2382201}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Christodorescu12, author = {Mihai Christodorescu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12)}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1066--1067}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382332}, doi = {10.1145/2382196.2382332}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Christodorescu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuangG012, author = {Wei{-}Hong Chuang and Ravi Garg and Min Wu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {How secure are power network signature based time stamps?}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {428--438}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382243}, doi = {10.1145/2382196.2382243}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChuangG012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CortierSW12, author = {V{\'{e}}ronique Cortier and Graham Steel and Cyrille Wiedling}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Revoke and let live: a secure key revocation api for cryptographic devices}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {918--928}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382293}, doi = {10.1145/2382196.2382293}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CortierSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CramptonGY12, author = {Jason Crampton and Gregory Z. Gutin and Anders Yeo}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {On the parameterized complexity of the workflow satisfiability problem}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {857--868}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382287}, doi = {10.1145/2382196.2382287}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CramptonGY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CuiFLL12, author = {Xiang Cui and Binxing Fang and Peng Liao and Chaoge Liu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Advanced triple-channel botnets: model and implementation}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1019--1021}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382311}, doi = {10.1145/2382196.2382311}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CuiFLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CzeskisDKWB12, author = {Alexei Czeskis and Michael Dietz and Tadayoshi Kohno and Dan S. Wallach and Dirk Balfanz}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Strengthening user authentication through opportunistic cryptographic identity assertions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {404--414}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382240}, doi = {10.1145/2382196.2382240}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CzeskisDKWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dagon12, author = {David Dagon}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Large-scale {DNS} data analysis}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1054--1055}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382325}, doi = {10.1145/2382196.2382325}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dagon12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DamGL12, author = {Mads Dam and Gurvan Le Guernic and Andreas Lundblad}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {TreeDroid: a tree automaton based approach to enforcing data processing policies}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {894--905}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382290}, doi = {10.1145/2382196.2382290}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DamGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DijkJORST12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest and Emil Stefanov and Nikos Triandopoulos}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Hourglass schemes: how to prove that cloud files are encrypted}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {265--280}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382227}, doi = {10.1145/2382196.2382227}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EdwardsC12, author = {Nigel Edwards and Liqun Chen}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {An historical examination of open source releases and their vulnerabilities}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {183--194}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382218}, doi = {10.1145/2382196.2382218}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EdwardsC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EnckJ12, author = {William Enck and Xuxian Jiang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {CCS'12 co-located workshop summary for {SPSM} 2012}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1062--1063}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382330}, doi = {10.1145/2382196.2382330}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EnckJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EngelhardtMZ12, author = {Kai Engelhardt and Ron van der Meyden and Chenyi Zhang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Intransitive noninterference in nondeterministic systems}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {869--880}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382288}, doi = {10.1145/2382196.2382288}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EngelhardtMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FahlHMSBF12, author = {Sascha Fahl and Marian Harbach and Thomas Muders and Matthew Smith and Lars Baumg{\"{a}}rtner and Bernd Freisleben}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Why eve and mallory love android: an analysis of android {SSL} (in)security}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {50--61}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382205}, doi = {10.1145/2382196.2382205}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FahlHMSBF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FioreG12, author = {Dario Fiore and Rosario Gennaro}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Publicly verifiable delegation of large polynomials and matrix computations, with applications}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {501--512}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382250}, doi = {10.1145/2382196.2382250}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FioreG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoZLLC12, author = {Zhaoyu Gao and Haojin Zhu and Yao Liu and Muyuan Li and Zhenfu Cao}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Location privacy leaking from spectrum utilization information in database-driven cognitive radio network}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1025--1027}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382313}, doi = {10.1145/2382196.2382313}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GaoZLLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GeneiatakisPKK12, author = {Dimitris Geneiatakis and Georgios Portokalidis and Vasileios P. Kemerlis and Angelos D. Keromytis}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Adaptive defenses for commodity software through virtual application partitioning}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {133--144}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382214}, doi = {10.1145/2382196.2382214}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GeneiatakisPKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GeorgievIJABS12, author = {Martin Georgiev and Subodh Iyengar and Suman Jana and Rishita Anubhai and Dan Boneh and Vitaly Shmatikov}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {The most dangerous code in the world: validating {SSL} certificates in non-browser software}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {38--49}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382204}, doi = {10.1145/2382196.2382204}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GeorgievIJABS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gligor12, author = {Virgil D. Gligor}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {On the foundations of trust in networks of humans and computers}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382198}, doi = {10.1145/2382196.2382198}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gligor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GordonKKKM0V12, author = {S. Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Fernando Krell and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Secure two-party computation in sublinear (amortized) time}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {513--524}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382251}, doi = {10.1145/2382196.2382251}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GordonKKKM0V12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12, author = {Chris Grier and Lucas Ballard and Juan Caballero and Neha Chachra and Christian J. Dietrich and Kirill Levchenko and Panayiotis Mavrommatis and Damon McCoy and Antonio Nappa and Andreas Pitsillidis and Niels Provos and M. Zubair Rafique and Moheeb Abu Rajab and Christian Rossow and Kurt Thomas and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Manufacturing compromise: the emergence of exploit-as-a-service}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {821--832}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382283}, doi = {10.1145/2382196.2382283}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GroefDNP12, author = {Willem De Groef and Dominique Devriese and Nick Nikiforakis and Frank Piessens}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {FlowFox: a web browser with flexible and precise information flow control}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {748--759}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382275}, doi = {10.1145/2382196.2382275}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GroefDNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuoC12, author = {Shumin Guo and Keke Chen}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Privacy preserving boosting in the cloud with secure half-space queries}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1031--1033}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382315}, doi = {10.1145/2382196.2382315}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarbachFMS12, author = {Marian Harbach and Sascha Fahl and Thomas Muders and Matthew Smith}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Towards measuring warning readability}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {989--991}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382301}, doi = {10.1145/2382196.2382301}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HarbachFMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HardtN12, author = {Michaela Hardt and Suman Nath}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Privacy-aware personalization for mobile advertising}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {662--673}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382266}, doi = {10.1145/2382196.2382266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HardtN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeiderichNSHS12, author = {Mario Heiderich and Marcus Niemietz and Felix Schuster and Thorsten Holz and J{\"{o}}rg Schwenk}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Scriptless attacks: stealing the pie without touching the sill}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {760--771}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382276}, doi = {10.1145/2382196.2382276}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeiderichNSHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HolzerFKV12, author = {Andreas Holzer and Martin Franz and Stefan Katzenbeisser and Helmut Veith}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Secure two-party computations in {ANSI} {C}}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {772--783}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382278}, doi = {10.1145/2382196.2382278}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HolzerFKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HongYX12, author = {Chi{-}Yao Hong and Fang Yu and Yinglian Xie}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Populated {IP} addresses: classification and applications}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {329--340}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382233}, doi = {10.1145/2382196.2382233}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HongYX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JamshedLMYKLYP12, author = {Muhammad Asim Jamshed and Jihyung Lee and Sangwoo Moon and Insu Yun and Deokjin Kim and Sungryoul Lee and Yung Yi and KyoungSoo Park}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Kargus: a highly-scalable software-based intrusion detection system}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {317--328}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382232}, doi = {10.1145/2382196.2382232}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JamshedLMYKLYP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KamaraMR12, author = {Seny Kamara and Payman Mohassel and Ben Riva}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Salus: a system for server-aided secure function evaluation}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {797--808}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382280}, doi = {10.1145/2382196.2382280}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KamaraMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KamaraPR12, author = {Seny Kamara and Charalampos Papamanthou and Tom Roeder}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Dynamic searchable symmetric encryption}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {965--976}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382298}, doi = {10.1145/2382196.2382298}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KamaraPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KammerstetterPW12, author = {Markus Kammerstetter and Christian Platzer and Gilbert Wondracek}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Vanity, cracks and malware: insights into the anti-copy protection ecosystem}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {809--820}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382282}, doi = {10.1145/2382196.2382282}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KammerstetterPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarameAC12, author = {Ghassan Karame and Elli Androulaki and Srdjan Capkun}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Double-spending fast payments in bitcoin}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {906--917}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382292}, doi = {10.1145/2382196.2382292}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarameAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimGHOHPG12, author = {Tiffany Hyun{-}Jin Kim and Payas Gupta and Jun Han and Emmanuel Owusu and Jason I. Hong and Adrian Perrig and Debin Gao}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{OTO:} online trust oracle for user-centric trust establishment}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {391--403}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382239}, doi = {10.1145/2382196.2382239}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimGHOHPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeJLTCT12, author = {Lung{-}Hao Lee and Yen{-}Cheng Juan and Kuei{-}Ching Lee and Wei{-}Lin Tseng and Hsin{-}Hsi Chen and Yuen{-}Hsien Tseng}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Context-aware web security threat prevention}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {992--994}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382302}, doi = {10.1145/2382196.2382302}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeJLTCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeSS12, author = {Ruby B. Lee and Simha Sethumadhavan and G. Edward Suh}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Hardware enhanced security}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1052}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382323}, doi = {10.1145/2382196.2382323}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZXYW12, author = {Zhou Li and Kehuan Zhang and Yinglian Xie and Fang Yu and XiaoFeng Wang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Knowing your enemy: understanding and detecting malicious web advertising}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {674--686}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382267}, doi = {10.1145/2382196.2382267}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiZXYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuW12, author = {Dongxi Liu and Shenlu Wang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Query encrypted databases practically}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1049--1051}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382321}, doi = {10.1145/2382196.2382321}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuLWLJ12, author = {Long Lu and Zhichun Li and Zhenyu Wu and Wenke Lee and Guofei Jiang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{CHEX:} statically vetting Android apps for component hijacking vulnerabilities}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {229--240}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382223}, doi = {10.1145/2382196.2382223}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuLWLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosVVP12, author = {Nikos Mavrogiannopoulos and Frederik Vercauteren and Vesselin Velichkov and Bart Preneel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {A cross-protocol attack on the {TLS} protocol}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {62--72}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382206}, doi = {10.1145/2382196.2382206}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosVVP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McCoyDKVS12, author = {Damon McCoy and Hitesh Dharmdasani and Christian Kreibich and Geoffrey M. Voelker and Stefan Savage}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Priceless: the role of payments in abuse-advertised goods}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {845--856}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382285}, doi = {10.1145/2382196.2382285}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McCoyDKVS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McLaughlinM12, author = {Stephen E. McLaughlin and Patrick D. McDaniel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{SABOT:} specification-based payload generation for programmable logic controllers}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {439--449}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382244}, doi = {10.1145/2382196.2382244}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McLaughlinM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenahemNE12, author = {Eitan Menahem and Gabi Nakibly and Yuval Elovici}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Network-based intrusion detection systems go active!}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1004--1006}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382306}, doi = {10.1145/2382196.2382306}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MenahemNE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mironov12, author = {Ilya Mironov}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {On significance of the least significant bits for differential privacy}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {650--661}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382264}, doi = {10.1145/2382196.2382264}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Mironov12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MockHWM12, author = {Kenrick J. Mock and Bogdan Hoanca and Justin Weaver and Mikal Milton}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Real-time continuous iris recognition for authentication using an eye tracker}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1007--1009}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382307}, doi = {10.1145/2382196.2382307}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MockHWM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoghaddamLDG12, author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {SkypeMorph: protocol obfuscation for Tor bridges}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {97--108}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382210}, doi = {10.1145/2382196.2382210}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoghaddamLDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohaisenZSXK12, author = {Abedelaziz Mohaisen and Xinwen Zhang and Max Schuchard and Haiyong Xie and Yongdae Kim}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Protecting access privacy of cached contents in information centric networks}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1001--1003}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382305}, doi = {10.1145/2382196.2382305}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohaisenZSXK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoonLLKPK12, author = {Hyungon Moon and Hojoon Lee and Jihoon Lee and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Vigilare: toward snoop-based kernel integrity monitor}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {28--37}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382202}, doi = {10.1145/2382196.2382202}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MoonLLKPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MooreAC12, author = {Scott Moore and Aslan Askarov and Stephen Chong}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Precise enforcement of progress-sensitive security}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {881--893}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382289}, doi = {10.1145/2382196.2382289}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MooreAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MuthukumaranJG12, author = {Divya Muthukumaran and Trent Jaeger and Vinod Ganapathy}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Leveraging "choice" to automate authorization hook placement}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {145--156}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382215}, doi = {10.1145/2382196.2382215}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MuthukumaranJG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NighswanderLDBB12, author = {Tyler Nighswander and Brent M. Ledvina and Jonathan Diamond and Robert Brumley and David Brumley}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{GPS} software attacks}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {450--461}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382245}, doi = {10.1145/2382196.2382245}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NighswanderLDBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12, author = {Nick Nikiforakis and Luca Invernizzi and Alexandros Kapravelos and Steven {Van Acker} and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {You are what you include: large-scale evaluation of remote javascript inclusions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {736--747}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382274}, doi = {10.1145/2382196.2382274}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PanLPYZF12, author = {Xian Pan and Zhen Ling and Aniket Pingley and Wei Yu and Nan Zhang and Xinwen Fu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {How privacy leaks from bluetooth mouse?}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1013--1015}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382309}, doi = {10.1145/2382196.2382309}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PanLPYZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PengGSLQPNM12, author = {Hao Peng and Christopher S. Gates and Bhaskar Pratim Sarma and Ninghui Li and Yuan Qi and Rahul Potharaju and Cristina Nita{-}Rotaru and Ian M. Molloy}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Using probabilistic generative models for ranking risks of Android apps}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {241--252}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382224}, doi = {10.1145/2382196.2382224}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PengGSLQPNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PengLTLZ12, author = {Chunyi Peng and Chi{-}Yu Li and Guan{-}Hua Tu and Songwu Lu and Lixia Zhang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Mobile data charging: new attacks and countermeasures}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {195--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382220}, doi = {10.1145/2382196.2382220}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PengLTLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetraccaSHM12, author = {Giuseppe Petracca and Anna Cinzia Squicciarini and William G. Horne and Marco Casassa Mont}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {ReasONets: a fuzzy-based approach for reasoning on network incidents}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1010--1012}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382308}, doi = {10.1145/2382196.2382308}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PetraccaSHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QianMX12, author = {Zhiyun Qian and Zhuoqing Morley Mao and Yinglian Xie}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Collaborative {TCP} sequence number inference attack: how to crack sequence number under a second}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {593--604}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382258}, doi = {10.1145/2382196.2382258}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QianMX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RoufMXXMG12, author = {Ishtiaq Rouf and Hossen Asiful Mustafa and Miao Xu and Wenyuan Xu and Robert D. Miller and Marco Gruteser}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Neighborhood watch: security and privacy analysis of automatic meter reading systems}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {462--473}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382246}, doi = {10.1145/2382196.2382246}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RoufMXXMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RusselloCCFZ12, author = {Giovanni Russello and Mauro Conti and Bruno Crispo and Earlence Fernandes and Yury Zhauniarovich}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Demonstrating the effectiveness of {MOSES} for separation of execution modes}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {998--1000}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382304}, doi = {10.1145/2382196.2382304}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RusselloCCFZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchroederS12, author = {Dominique Schr{\"{o}}der and Heike Schr{\"{o}}der}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Verifiable data streaming}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {953--964}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382297}, doi = {10.1145/2382196.2382297}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchroederS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchuchardGTH12, author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Routing around decoys}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {85--96}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382209}, doi = {10.1145/2382196.2382209}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchuchardGTH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shapiro12, author = {Stuart S. Shapiro}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {The state and evolution of privacy by design}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1053}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382324}, doi = {10.1145/2382196.2382324}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shapiro12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShebaroSGB12, author = {Bilal Shebaro and Salmin Sultana and Shakthidhar Reddy Gopavaram and Elisa Bertino}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Demonstrating a lightweight data provenance for sensor networks}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1022--1024}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382312}, doi = {10.1145/2382196.2382312}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShebaroSGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShokriTTHB12, author = {Reza Shokri and George Theodorakopoulos and Carmela Troncoso and Jean{-}Pierre Hubaux and Jean{-}Yves Le Boudec}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Protecting location privacy: optimal strategy against localization attacks}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {617--627}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382261}, doi = {10.1145/2382196.2382261}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShokriTTHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrivatsaH12, author = {Mudhakar Srivatsa and Michael Hicks}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Deanonymizing mobility traces: using social network as a side-channel}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {628--637}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382262}, doi = {10.1145/2382196.2382262}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SrivatsaH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StrackxP12, author = {Raoul Strackx and Frank Piessens}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Fides: selectively hardening software application components against kernel-level or process-level malware}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {2--13}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382200}, doi = {10.1145/2382196.2382200}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StrackxP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunB12, author = {San{-}Tsai Sun and Konstantin Beznosov}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {The devil is in the (implementation) details: an empirical analysis of OAuth {SSO} systems}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {378--390}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382238}, doi = {10.1145/2382196.2382238}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VaradarajanKFRS12, author = {Venkatanathan Varadarajan and Thawan Kooburat and Benjamin Farley and Thomas Ristenpart and Michael M. Swift}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {281--292}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382228}, doi = {10.1145/2382196.2382228}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VaradarajanKFRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangGNHB12, author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {CensorSpoofer: asymmetric communication using {IP} spoofing for censorship-resistant web browsing}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {121--132}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382212}, doi = {10.1145/2382196.2382212}, timestamp = {Fri, 23 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangGNHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WartellMHL12, author = {Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Binary stirring: self-randomizing instruction addresses of legacy x86 binary code}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {157--168}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382216}, doi = {10.1145/2382196.2382216}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WartellMHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeinbergWYBCWB12, author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {StegoTorus: a camouflage proxy for the Tor anonymity system}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {109--120}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382211}, doi = {10.1145/2382196.2382211}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeinbergWYBCWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WilliamsS12, author = {Peter Williams and Radu Sion}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Single round access privacy on outsourced storage}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {293--304}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382229}, doi = {10.1145/2382196.2382229}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WilliamsS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WilliamsST12, author = {Peter Williams and Radu Sion and Alin Tomescu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {PrivateFS: a parallel oblivious file system}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {977--988}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382299}, doi = {10.1145/2382196.2382299}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WilliamsST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoXHW12, author = {Jidong Xiao and Zhang Xu and Hai Huang and Haining Wang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {A covert channel construction in a virtualized environment}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1040--1042}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382318}, doi = {10.1145/2382196.2382318}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiaoXHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieYKAGVWHM12, author = {Yinglian Xie and Fang Yu and Qifa Ke and Mart{\'{\i}}n Abadi and Eliot Gillum and Krish Vitaldevaria and Jason Walter and Junxian Huang and Zhuoqing Morley Mao}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Innocent by association: early recognition of legitimate users}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {353--364}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382235}, doi = {10.1145/2382196.2382235}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XieYKAGVWHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuCGK12, author = {Zhaoyan Xu and Lingfeng Chen and Guofei Gu and Christopher Kruegel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {PeerPress: utilizing enemies' {P2P} strength against them}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {581--592}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382257}, doi = {10.1145/2382196.2382257}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuCGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuZGL12, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Automatic generation of vaccines for malware immunization}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1037--1039}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382317}, doi = {10.1145/2382196.2382317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuZGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanLKW12, author = {Guanhua Yan and Ritchie Lee and Alex Kent and David H. Wolpert}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Towards a bayesian network game framework for evaluating DDoS attacks and defense}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {553--566}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382255}, doi = {10.1145/2382196.2382255}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YanLKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangLQQMM12, author = {Weining Yang and Ninghui Li and Yuan Qi and Wahbeh H. Qardaji and Stephen E. McLaughlin and Patrick D. McDaniel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Minimizing private data disclosures in the smart grid}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {415--427}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382242}, doi = {10.1145/2382196.2382242}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangLQQMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYPG12, author = {Chao Yang and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Detecting money-stealing apps in alternative Android markets}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1034--1036}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382316}, doi = {10.1145/2382196.2382316}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangYPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuGS12, author = {Haifeng Yu and Phillip B. Gibbons and Chenwei Shi}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {DCast: sustaining collaboration in overlay multicast despite rational collusion}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {567--580}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382256}, doi = {10.1145/2382196.2382256}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuanSYL12, author = {Jiawei Yuan and Lu Shi and Shucheng Yu and Ming Li}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Authenticated secret key extraction using channel characteristics for body area networks}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1028--1030}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382314}, doi = {10.1145/2382196.2382314}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuanSYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangD12, author = {Xinwen Zhang and Xuhua Ding}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{STC} 2012: the seventh {ACM} workshop on scalable trusted computing}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1058--1059}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382328}, doi = {10.1145/2382196.2382328}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJRR12, author = {Yinqian Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Cross-VM side channels and their use to extract private keys}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {305--316}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382230}, doi = {10.1145/2382196.2382230}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJRR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2012, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2382196}, isbn = {978-1-4503-1651-4}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.