default search action
20th CCS 2013: Berlin, Germany
- Ahmad-Reza Sadeghi, Virgil D. Gligor, Moti Yung:
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. ACM 2013, ISBN 978-1-4503-2477-9
Session 1-A: trusted systems
- Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
A security framework for the analysis and design of software attestation. 1-12 - Emmanuel Owusu, Jorge Guajardo, Jonathan M. McCune, James Newsome, Adrian Perrig, Amit Vasudevan:
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms. 13-24 - John Butterworth, Corey Kallenberg, Xeno Kovah, Amy Herzog:
BIOS chronomancy: fixing the core root of trust for measurement. 25-36 - Liqun Chen, Jiangtao Li:
Flexible and scalable digital signatures in TPM 2.0. 37-48
Session 1-B: how crypto breaks
- Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith:
Rethinking SSL development in an appified world. 49-60 - Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:
Protocol misidentification made easy with format-transforming encryption. 61-72 - Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel:
An empirical study of cryptographic misuse in android applications. 73-84 - Mobin Javed, Vern Paxson:
Detecting stealthy, distributed SSH brute-forcing. 85-96
Session 1-C: malware
- Fanny Lalonde Lévesque, Jude Nsiempba, José M. Fernandez, Sonia Chiasson, Anil Somayaji:
A clinical study of risk factors related to malware infections. 97-108 - Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:
Delta: automatic identification of unknown web-based infection campaigns. 109-120 - Yacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee:
Beheading hydras: performing effective botnet takedowns. 121-132 - Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Shady paths: leveraging surfing crowds to detect malicious web pages. 133-144
Session 2-A: passwords
- Ari Juels, Ronald L. Rivest:
Honeywords: making password-cracking detectable. 145-160 - Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz:
Quantifying the security of graphical passwords: the case of android unlock patterns. 161-172 - Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur:
Measuring password guessability for an entire university. 173-186 - Georgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis:
SAuth: protecting user accounts from password database leaks. 187-198
Session 2-B: control & information flow
- Ben Niu, Gang Tan:
Monitor integrity protection with space efficiency and separate compilation. 199-210 - Máté Kovács, Helmut Seidl, Bernd Finkbeiner:
Relational abstract interpretation for the verification of 2-hypersafety properties. 211-222 - Mads Dam, Roberto Guanciale, Narges Khakpour, Hamed Nemati, Oliver Schwarz:
Formal verification of information flow security for a simple arm-based separation kernel. 223-234 - Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, Georgios Portokalidis:
ShadowReplica: efficient parallelization of dynamic data flow tracking. 235-246
Session 2-C: storage security
- Emil Stefanov, Elaine Shi:
Multi-cloud oblivious storage. 247-258 - Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti:
Policy-based secure deletion. 259-270 - Joel Reardon, Hubert Ritzdorf, David A. Basin, Srdjan Capkun:
Secure data deletion from persistent media. 271-284 - Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic:
PoWerStore: proofs of writing for efficient and robust storage. 285-298
Session 3-A: oblivious RAM and oblivious computation
- Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: an extremely simple oblivious RAM protocol. 299-310 - Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, Dawn Song:
PHANTOM: practical oblivious computation in a secure processor. 311-324 - Elaine Shi, Emil Stefanov, Charalampos Papamanthou:
Practical dynamic proofs of retrievability. 325-336
Session 3-B: anonymous channels
- Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F. Syverson:
Users get routed: traffic correlation on tor by realistic adversaries. 337-348 - Mashael AlSabah, Ian Goldberg:
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. 349-360 - John Geddes, Max Schuchard, Nicholas Hopper:
Cover your ACKs: pitfalls of covert channel censorship circumvention. 361-372
Session 3-C: protocol analysis & synthesis
- Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
An analysis of the EMV channel establishment protocol. 373-386 - Florian Giesen, Florian Kohlar, Douglas Stebila:
On the security of TLS renegotiation. 387-398 - Joseph A. Akinyele, Matthew Green, Susan Hohenberger:
Using SMT solvers to automate design tasks for encryption and signature schemes. 399-410
Keynote
- Ravi S. Sandhu:
The science, engineering and business of cyber security. 411-412
Session 4-A: network security
- Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. 413-424 - W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange:
MinimaLT: minimal-latency networking through better security. 425-438
Session 4-B: critical infrastructures
- Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk:
Impact of integrity attacks on real-time pricing in smart grids. 439-450 - Muhammad Qasim Ali, Ehab Al-Shaer:
Configuration-based IDS for advanced metering infrastructure. 451-462
Session 4-C: attribute-based encryption
- Yannis Rouselakis, Brent Waters:
Practical constructions and new proof methods for large universe attribute-based encryption. 463-474 - Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. 475-486
Session 5-A: programming securely
- Junyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Obfuscation resilient binary code reuse through trace-oriented programming. 487-498 - Fabian Yamaguchi, Christian Wressnegger, Hugo Gascon, Konrad Rieck:
Chucky: exposing missing checks in source code for vulnerability discovery. 499-510 - Maverick Woo, Sang Kil Cha, Samantha Gottlieb, David Brumley:
Scheduling black-box mutational fuzzing. 511-522
Session 5-B: secure multiparty computation
- Abhi Shelat, Chih-Hao Shen:
Fast two-party secure computation with minimal assumptions. 523-534 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:
More efficient oblivious transfer and extensions for faster secure computation. 535-548 - Marcel Keller, Peter Scholl, Nigel P. Smart:
An architecture for practical actively secure MPC with dishonest majority. 549-560
Session 5-C: formal methods
- Andrew K. Hirsch, Michael R. Clarkson:
Belief semantics of authorization logic. 561-572 - Bruno Blanchet, Miriam Paiola:
Automatic verification of protocols with lists of unbounded length. 573-584 - Philip W. L. Fong, Pooya Mehregan, Ram Krishnan:
Relational abstraction in community-based secure collaboration. 585-598
Session 6-A: mobile security issues
- Abdul Serwadda, Vir V. Phoha:
When kids' toys breach mobile phone security. 599-610 - Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. 611-622 - Lei Wu, Michael C. Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang:
The impact of vendor customizations on android security. 623-634 - Rui Wang, Luyi Xing, XiaoFeng Wang, Shuo Chen:
Unauthorized origin crossing on mobile platforms: threats and mitigation. 635-646
Session 6-B: randomness
- Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security analysis of pseudo-random number generators with input: /dev/random is not robust. 647-658 - Soo Hyeon Kim, Daewan Han, Dong Hoon Lee:
Predictability of Android OpenSSL's pseudo random number generator. 659-668 - Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias:
Delegatable pseudorandom functions and applications. 669-684 - Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring high-quality randomness in cryptographic key generation. 685-696
Session 6-C: hardware security
- Adam Waksman, Matthew Suozzo, Simha Sethumadhavan:
FANCI: identification of stealthy malicious logic using boolean functional analysis. 697-708 - Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, Ramesh Karri:
Security analysis of integrated circuit camouflaging. 709-720 - Albert Kwon, Udit Dhawan, Jonathan M. Smith, Thomas F. Knight Jr., André DeHon:
Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security. 721-732 - Clemens Helfmeier, Dmitry Nedospasov, Christopher Tarnovsky, Jan Starbug Krissler, Christian Boit, Jean-Pierre Seifert:
Breaking and entering through the silicon. 733-744
Session 7-A: web attacks
- Jonas Magazinius, Billy K. Rios, Andrei Sabelfeld:
Polyglots: crossing origins by crossing formats. 753-764 - Vacha Dave, Saikat Guha, Yin Zhang:
ViceROI: catching click-spam in search ad networks. 765-776 - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang:
mXSS attacks: attacking well-secured web-applications by using innerHTML mutations. 777-788
Session 7-B: privacy-preserving protocols
- Changyu Dong, Liqun Chen, Zikai Wen:
When private set intersection meets big data: an efficient and scalable protocol. 789-800 - Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh:
Privacy-preserving matrix factorization. 801-812 - Yihua Zhang, Aaron Steele, Marina Blanton:
PICCO: a general-purpose compiler for private distributed computation. 813-826
Session 7-C: systems' attack mitigation
- Yinqian Zhang, Michael K. Reiter:
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. 827-838 - Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee:
Tappan Zee (north) bridge: mining memory accesses for introspection. 839-850 - Felix Schuster, Thorsten Holz:
Towards reducing the attack surface of software backdoors. 851-862
Session 8-A: secure outsourcing protocols
- Michael Backes, Dario Fiore, Raphael M. Reischuk:
Verifiable delegation of computation on outsourced data. 863-874 - Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. 875-888
Session 8-B: privacy models
- Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang:
Membership privacy: a unifying framework for privacy definitions. 889-900 - Miguel E. Andrés, Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Geo-indistinguishability: differential privacy for location-based systems. 901-914
Session 8-C: be aware & beware
- Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno:
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. 915-928 - Michael Weiner, Maurice Massar, Erik Tews, Dennis Giese, Wolfgang Wieser:
Security analysis of a widely deployed locking system. 929-940
Keynote
- Mikko Hypponen:
The cyber arms race. 941-942
Session 9-A: crypto tools
- Aggelos Kiayias, Qiang Tang:
How to keep a secret: leakage deterring public-key cryptosystems. 943-954 - Marek Jawurek, Florian Kerschbaum, Claudio Orlandi:
Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. 955-966 - Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange:
Elligator: elliptic-curve points indistinguishable from uniform random strings. 967-980
Session 9-B: audit & code randomization
- Antonis Papadogiannakis, Laertis Loutsis, Vassilis Papaefstathiou, Sotiris Ioannidis:
ASIST: architectural support for instruction set randomization. 981-992 - Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz:
Librando: transparent code randomization for just-in-time compilers. 993-1004 - Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
LogGC: garbage collecting audit log. 1005-1016
Session 9-C: mobile privacy
- Xiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. 1017-1028 - Adwait Nadkarni, William Enck:
Preventing accidental data disclosure in modern operating systems. 1029-1042 - Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. 1043-1054
Session 10-A: graphics, vision & security
- Robert Kotcher, Yutong Pei, Pranjal Jumde, Collin Jackson:
Cross-origin pixel stealing: timing attacks using CSS filters. 1055-1062 - Yi Xu, Jared Heinly, Andrew M. White, Fabian Monrose, Jan-Michael Frahm:
Seeing double: reconstructing obscured typed input from repeated compromising reflections. 1063-1074 - Haichang Gao, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, Jeff Yan:
The robustness of hollow CAPTCHAs. 1075-1086
Session 10-B: authentication
- Foteini Baldimtsi, Anna Lysyanskaya:
Anonymous credentials light. 1087-1098 - Masoud Rostami, Ari Juels, Farinaz Koushanfar:
Heart-to-heart (H2H): authentication for implanted medical devices. 1099-1112 - Andrew Chi-Chih Yao, Yunlei Zhao:
OAKE: a new family of implicitly authenticated diffie-hellman protocols. 1113-1128
Session 10-C: privacy issues
- Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Díaz, Seda F. Gürses, Frank Piessens, Bart Preneel:
FPDetective: dusting the web for fingerprinters. 1129-1140 - Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
Addressing the concerns of the lacks family: quantification of kin genomic privacy. 1141-1152 - David Isaac Wolinsky, Ewa Syta, Bryan Ford:
Hang with your buddies to resist intersection attacks. 1153-1166
Session 11-A: web and code security
- Alexander Moshchuk, Helen J. Wang, Yunxin Liu:
Content-based isolation: rethinking isolation policy design on client systems. 1167-1180 - Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Diglossia: detecting code injection attacks with precision and efficiency. 1181-1192 - Sebastian Lekies, Ben Stock, Martin Johns:
25 million flows later: large-scale detection of DOM-based XSS. 1193-1204 - Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna:
deDacota: toward preventing server-side XSS via automatic code and data separation. 1205-1216
Session 11-B: crypto symbolic analysis
- José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir:
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations. 1217-1230 - Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computationally complete symbolic attacker and key exchange. 1231-1246 - Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella Béguelin:
Fully automated analysis of padding-based encryption in the computational model. 1247-1260 - Florian Böhl, Véronique Cortier, Bogdan Warinschi:
Deduction soundness: prove one, get five for free. 1261-1272
Session 11-C: security/cryptographic utilities
- Kelsey Cairns, Thoshitha T. Gamage, Carl Hauser:
Efficient targeted key subset retrieval in fractal hash sequences. 1273-1284 - Sumeet Bajaj, Radu Sion:
HIFS: history independence for file systems. 1285-1296 - Shruti Tople, Shweta Shinde, Zhaofeng Chen, Prateek Saxena:
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content. 1297-1310 - Xinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, Zhenkai Liang:
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS. 1311-1324
Demonstration presentations
- Florian Kerschbaum, Patrick Grofig, Isabelle Hang, Martin Härterich, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Adjustably encrypted in-memory column-store. 1325-1328 - Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. 1329-1332 - Anthony Van Herrewege, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede:
Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers. 1333-1336 - Prabhakaran Kasinathan, Gianfranco Costamagna, Hussein Khaleel, Claudio Pastrone, Maurizio A. Spirito:
An IDS framework for internet of things empowered by 6LoWPAN. 1337-1340 - Raphael M. Reischuk, Florian Schröder, Johannes Gehrke:
Secure and customizable web development in the safe activation framework. 1341-1344 - Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo:
Enabling trusted stores for android. 1345-1348 - Enrique Argones-Rúa, Francisco Javier García Salomón, Luis Pérez-Freire:
Gradiant asymmetric encryption and verification systems based on handwritten signature. 1349-1350 - Manish Shukla, Purushotam G. Radadia, Shirish Karande, Sachin Lodha:
On the real-time masking of the sound of credit cards using hot patching. 1351-1354
Poster presentations
- Stephan Neuhaus, Gabriela Gheorghe:
Critique of the CISSP common body of knowledge of cryptography. 1355-1358 - Gabriela Gheorghe, Stephan Neuhaus:
Preserving privacy and accountability for personal devices. 1359-1362 - Michael Brenner, Matthew Smith:
Caching oblivious memory access: an extension to the HCRYPT virtual machine. 1363-1366 - Leon Reznik, Elisa Bertino:
Data quality evaluation: integrating security and accuracy. 1367-1370 - Cuong Xuan Nguyen, Hung-Hsuan Huang, Kyoji Kawagoe:
Graphical password using object-based image ranking. 1371-1374 - Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan:
A semantic-aware approach to reasoning about network traffic relations. 1375-1378 - Eitan Menahem, Asaf Shabtai, Adi Levhar:
Detecting malware through temporal function-based features. 1379-1382 - Sebastian Biedermann, Stefan Katzenbeisser:
Event-based isolation of critical data in the cloud. 1383-1386 - Sheharbano Khattak, Zaafar Ahmed, Affan A. Syed, Syed Ali Khayam:
BotFlex: a community-driven tool for botnetdetection. 1387-1390 - Jeton Bacaj, Leon Reznik:
Signal anomaly based attack detection in wireless sensor networks. 1391-1394 - Martin Schramm, Karl Leidl, Andreas Grzemba, Nicolai Kuntze:
Enhanced embedded device security by combining hardware-based trust mechanisms. 1395-1398 - Tomer Ashur, Orr Dunkelman:
On the anonymity of Israel's general elections. 1399-1402 - Orr Dunkelman, Margarita Osadchy, Mahmood Sharif:
Secure authentication from facial attributeswith no privacy loss. 1403-1406 - Bilal Shebaro, Di Jin, Elisa Bertino:
Performance signatures of mobile phone browsers. 1407-1410 - Wenming Zhou, Yuqing Zhang, Xuefeng Liu:
A new framework against privilege escalation attacks on android. 1411-1414 - Meilof Veeningen, Mayla Brusò, Jerry den Hartog, Nicola Zannone:
TRIPLEX: verifying data minimisation in communication systems. 1415-1418 - Daniil M. Utin, Roger Khazan, Joshua Kramer, Michael Vai, David Whelihan:
SHAMROCK: self contained cryptography and key management processor. 1419-1420 - Qixu Liu, Yuqing Zhang, Huan Yang:
trend of online flash XSS vulnerabilities. 1421-1424 - Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer:
Cross-platform malware: write once, infect everywhere. 1425-1428 - Anthony Roberts, Richard McClatchey, Saad Liaquat, Nigel Edwards, Mike Wray:
Introducing pathogen: a real-time virtualmachine introspection framework. 1429-1432 - Giang T. K. Nguyen, Xun Gong, Anupam Das, Nikita Borisov:
PnP: improving web browsing performance over tor using web resource prefetch-and-push. 1433-1436 - Dan Li, Chaoge Liu, Xu Cui, Xiang Cui:
Sniffing and propagating malwares through WPAD deception in LANs. 1437-1440 - Ashar Javed:
A footprint of third-party tracking on mobile web. 1441-1444 - Wasim Ahmad Bhat, S. M. K. Quadri:
Dr. Watson provides data for post-breach analysis. 1445-1448 - Martin Husák, Martin Vizváry:
Reflected attacks abusing honeypots. 1449-1452 - Benjamin Güldenring, Volker Roth:
TouchCtrl: fine-grained access control for collaborative environments. 1453-1456 - Zhaofeng Chen, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
CRYPTSERVER: strong data protection in commodity LAMP servers. 1457-1460 - Tim Ruffing, Jonas Schneider, Aniket Kate:
Identity-based steganography and its applications to censorship resistance. 1461-1464 - Parisa Haghani, Saman A. Zonouz:
Sechduler: a security-aware kernel scheduler. 1465-1468 - Sana Maqsood, Sonia Chiasson, Audrey Girouard:
Passwords on flexible display devices. 1469-1472 - Ayesha Binte Ashfaq, Muhammad Qasim Ali, Ehab Al-Shaer, Syed Ali Khayam:
Revisiting anomaly detection system design philosophy. 1473-1476
Workshop summaries
- Sara Foresti:
12th workshop on privacy in the electronic society (WPES 2013). 1477-1478 - Frederik Armknecht, Jean-Pierre Seifert:
Third international workshop on trustworthy embedded devices (TrustED 2013). 1479-1480 - Arslan Munir, Farinaz Koushanfar, Hervé Seudie, Ahmad-Reza Sadeghi:
CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles. 1481-1482 - Blaine Nelson, Christos Dimitrakakis, Elaine Shi:
Summary/overview for artificial intelligence and security (AISec'13). 1483-1484 - Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
The first workshop on language support for privacy-enhancing technologies (PETShop'13). 1485-1486 - Ari Juels, Bryan Parno:
Fifth ACM cloud computing security workshop (CCSW 2013). 1487-1488 - Adrienne Porter Felt, N. Asokan:
CCS'13 co-located workshop summary for SPSM 2013. 1489-1490 - Klaus Kursawe, Benessa Defend:
Smart energy grid security workshop (SEGS'13). 1491-1492 - Thomas Groß, Marit Hansen:
Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads. 1493-1494
Tutorials
- Christof Paar:
Constructive and destructive aspects of embedded security in the internet of things. 1495-1496 - Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Trusted execution environments on mobile devices. 1497-1498 - Eric Bodden:
Easily instrumenting android applications for security purposes. 1499-1502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.