default search action
14th CCS 2007: Alexandria, VA, USA
- Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson:
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM 2007, ISBN 978-1-59593-703-2 - Steven B. Lipner:
Assurance and evaluation: what next? 1
Web applications security
- Shuo Chen, David Ross, Yi-Min Wang:
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. 2-11 - Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan:
CANDID: preventing sql injection attacks using dynamic candidate evaluations. 12-24 - Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna:
Multi-module vulnerability analysis of web-based applications. 25-35
Authentication and passwords
- Paul Dunphy, Jeff Yan:
Do background images improve "draw a secret" graphical passwords? 36-47 - Ben Adida:
Beamauth: two-factor web authentication with a bookmark. 48-57 - Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner:
Dynamic pharming attacks and locked same-origin policies for web browsers. 58-71
Anonymity
- Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps. 72-81 - Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin:
How much anonymity does network latency leak? 82-91 - Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz:
Denial of service or denial of security? 92-102
Operating systems and malware
- Nick L. Petroni Jr., Michael W. Hicks:
Automated detection of persistent kernel control-flow attacks. 103-115 - Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. 116-127 - Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. 128-138
Traffic analysis and location privacy
- José M. González, Vern Paxson, Nicholas Weaver:
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. 139-149 - Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein:
Highly efficient techniques for network forensics. 150-160 - Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady:
Preserving privacy in gps traces via uncertainty-aware path cloaking. 161-171
Cryptography
- Phillip Rogaway, Mihir Bellare:
Robust computational secret sharing and a unified account of classical secret-sharing goals. 172-184 - Ran Canetti, Susan Hohenberger:
Chosen-ciphertext secure proxy re-encryption. 185-194 - Rafail Ostrovsky, Amit Sahai, Brent Waters:
Attribute-based encryption with non-monotonic access structures. 195-203
Network security
- Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley:
Optimal security hardening using multi-objective optimization on attack tree models of networks. 204-213 - David John Zage, Cristina Nita-Rotaru:
On the accuracy of decentralized virtual coordinate systems in adversarial networks. 214-224 - Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:
Analyzing the vulnerability of superpeer networks against attack. 225-234 - Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter:
Towards automated provisioning of secure virtualized networks. 235-245
Election systems and applied cryptography
- Tal Moran, Moni Naor:
Split-ballot voting: everlasting privacy with distributed trust. 246-255 - Sujata Garera, Aviel D. Rubin:
An independent audit framework for software dependent voting systems. 256-265 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Forward-secure signatures in untrusted update environments: efficient and generic constructions. 266-275 - Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. 276-285
Side and covert channels detection
- Boris Köpf, David A. Basin:
An information-theoretic model for adaptive side-channel attacks. 286-296 - Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels:
Covert channels in privacy-preserving identification systems. 297-306 - Steven Gianvecchio, Haining Wang:
Detecting covert timing channels: an entropy-based approach. 307-316
Protocols and spam filters
- Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. 317-329 - J. Alex Halderman, Brent Waters:
Harvesting verifiable challenges from oblivious online sources. 330-341 - Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala:
Filtering spam with behavioral blacklisting. 342-351
Internet security
- Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl T. Barr, Rich East:
ConceptDoppler: a weather tracker for internet censorship. 352-365 - Jeremy Elson, John R. Douceur, Jon Howell, Jared Saul:
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. 366-374 - Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage:
An inquiry into the nature and causes of the wealth of internet miscreants. 375-388
Key management
- Jeffrey S. Dwoskin, Ruby B. Lee:
Hardware-rooted trust for secure key management and transient trust. 389-400 - Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener:
Robust key generation from signal envelopes in wireless networks. 401-410 - Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. 411-420
Policies
- Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from dns rebinding attacks. 421-431 - Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Tappan Morris, M. Frans Kaashoek:
Alpaca: extensible authorization for distributed services. 432-444 - Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman:
Efficient policy analysis for administrative role based access control. 445-455
Cryptography and cryptoanalysis
- Ling Cheung, Calvin C. Newport:
Provably secure ciphertext policy ABE. 456-465 - Shai Halevi, Hugo Krawczyk:
Security under key-dependent inputs. 466-475 - Leo Dorrendorf, Zvi Gutterman, Benny Pinkas:
Cryptanalysis of the windows random number generator. 476-485
Data privacy
- Paul Bunn, Rafail Ostrovsky:
Secure two-party k-means clustering. 486-497 - Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel:
Privacy-preserving remote diagnostics. 498-507 - Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering. 508-518 - Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik:
Privacy preserving error resilient dna searching through oblivious automata. 519-528
Software security
- Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller:
Predicting vulnerable software components. 529-540 - Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. 541-551 - Hovav Shacham:
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). 552-561 - Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. 562-572
Data disclosure
- Lei Zhang, Sushil Jajodia, Alexander Brodsky:
Information disclosure under realistic assumptions: privacy versus optimality. 573-583 - Ari Juels, Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files. 584-597 - Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
Provable data possession at untrusted stores. 598-609
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.