default search action
31. ACSAC 2015: Los Angeles, CA, USA
- Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015. ACM 2015, ISBN 978-1-4503-3682-6
Human Factors
- Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine:
Evaluating the Flexibility of the Java Sandbox. 1-10 - Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. 11-20 - Maliheh Shirvanian, Nitesh Saxena:
On the Security and Usability of Crypto Phones. 21-30
Network Security
- Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani:
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. 31-40 - Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. 41-50 - Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim:
Proactive Security Analysis of Changes in Virtualized Infrastructures. 51-60
Apps
- Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu:
Vulnerability Assessment of OAuth Implementations in Android Applications. 61-70 - Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. 71-80 - Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara:
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. 81-90
Control Flow (Part 1)
- Mingwei Zhang, R. Sekar:
Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. 91-100 - Rui Qiao, Mingwei Zhang, R. Sekar:
A Principled Approach for ROP Defense. 101-110 - Aravind Prakash, Heng Yin:
Defeating ROP Through Denial of Stack Pivot. 111-120
Securing the Internet of Things
- Konrad-Felix Krentz, Christoph Meinel:
Handling Reboots and Mobility in 802.15.4 Security. 121-130 - Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick:
Using Channel State Information for Tamper Detection in the Internet of Things. 131-140 - Junia Valente, Alvaro A. Cárdenas:
Using Visual Challenges to Verify the Integrity of Security Cameras. 141-150
Web Security
- Tung Tran, Riccardo Pelizzi, R. Sekar:
JaTE: Transparent and Efficient JavaScript Confinement. 151-160 - Nethanel Gelernter, Yoel Grinstein, Amir Herzberg:
Cross-Site Framing Attacks. 161-170 - Nick Pantic, Mohammad Iftekhar Husain:
Covert Botnet Command and Control Using Twitter. 171-180
Mobile (Part 1)
- Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. 181-190 - Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto:
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? 191-200 - Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. 201-210
Potpourri (Part 1)
- Wai-Kit Sze, R. Sekar:
Provenance-based Integrity Protection for Windows. 211-220 - Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim:
MOSE: Live Migration Based On-the-Fly Software Emulation. 221-230 - Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan:
Privacy-preserving Virtual Machine. 231-240
Embedded Devices & Computer Subsystems
- Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede:
Soteria: Offline Software Protection within Low-cost Embedded Devices. 241-250 - Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti:
PIE: Parser Identification in Embedded Systems. 251-260 - Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler:
Defending Against Malicious USB Firmware with GoodUSB. 261-270
Access Control
- Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Proximity Verification for Contactless Access Control and Authentication Systems. 271-280 - Maarten Decat, Bert Lagaisse, Wouter Joosen:
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. 281-290 - Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen:
Entity-Based Access Control: supporting more expressive access control policies. 291-300
Pa$$w0rdz
- Adam J. Aviv, Devon Budzitowski, Ravi Kuber:
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. 301-310 - Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford:
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. 311-320 - Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah:
PARS: A Uniform and Open-source Password Analysis and Research System. 321-330
Control Flow (Part 2)
- Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. 331-340 - István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos:
ShrinkWrap: VTable Protection without Loose Ends. 341-350 - Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. 351-360
Mobile (Part 2)
- Chen Cao, Neng Gao, Peng Liu, Ji Xiang:
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. 361-370 - Pietro Ferrara, Omer Tripp, Marco Pistoia:
MorphDroid: Fine-grained Privacy Verification. 371-380 - Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang:
MobiPluto: File System Friendly Deniable Storage for Mobile Devices. 381-390
Potpourri (Part 2)
- Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten:
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. 391-400 - Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. 401-410 - Simone Mutti, Enrico Bacis, Stefano Paraboschi:
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases. 411-420
Applied Crypto
- Martin Pettai, Peeter Laud:
Combining Differential Privacy and Secure Multiparty Computation. 421-430 - Peter Mayer, Melanie Volkamer:
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. 431-440
Hardware & Reverse Engineering
- Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato:
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit. 441-450 - Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun:
Logical Partitions on Many-Core Platforms. 451-460 - Letitia W. Li, Guillaume Duc, Renaud Pacalet:
Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics. 461-470
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.