default search action
ACSAC 2016: Los Angeles, CA, USA
- Stephen Schwab, William K. Robertson, Davide Balzarotti:
Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016. ACM 2016, ISBN 978-1-4503-4771-6
Internet of things
- Farid Molazem Tabrizi, Karthik Pattabiraman:
Formal security analysis of smart embedded systems. 1-15 - Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan:
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. 16-29 - Lei Yang, Abdulmalik Humayed, Fengjun Li:
A multi-cloud based privacy-preserving data publishing scheme for the internet of things. 30-39
Securing the cloud
- Tran Phuong Thao, Kazumasa Omote:
ELAR: extremely lightweight auditing and repairing for cloud security. 40-51 - Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger:
Pileus: protecting user resources from vulnerable cloud services. 52-64 - Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd:
Bootstrapping and maintaining trust in the cloud. 65-77
Network security
- Jeremy Martin, Erik C. Rye, Robert Beverly:
Decomposition of MAC address structure for granular device inference. 78-88 - John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller:
Timing-based reconnaissance and defense in software-defined networks. 89-100 - Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero:
RevProbe: detecting silent reverse proxies in malicious server infrastructures. 101-112
Passwords and access control
- Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic:
Life-experience passwords (LEPs). 113-126 - Mohammad N. AlShehri, Heather Crawford:
Using image saliency and regions of interest to encourage stronger graphical passwords. 127-138 - Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler:
CPAC: securing critical infrastructure with cyber-physical access control. 139-152
Web security
- Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li:
Catching predators at watering holes: finding and understanding strategically compromised websites. 153-166 - Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu:
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. 167-176 - Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham:
Adaptive encrypted traffic fingerprinting with bi-directional dependence. 177-188
Vulnerabilities and program analysis
- Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner:
Code obfuscation against symbolic execution attacks. 189-200 - Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu:
VulPecker: an automated vulnerability detection system based on code similarity analysis. 201-213 - Jannik Pewny, Thorsten Holz:
EvilCoder: automated bug insertion. 214-225
Embedded security
- Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel:
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. 226-236 - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper:
Multi-receiver GPS spoofing detection: error models and realization. 237-250 - Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis:
Location-enhanced authentication using the IoT: because you cannot be in two places at once. 251-264
Authentication
- Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena:
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. 265-276 - Manar Mohamed, Nitesh Saxena:
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. 277-288 - Furkan Alaca, Paul C. van Oorschot:
Device fingerprinting for augmenting web authentication: classification and analysis of methods. 289-301
Applied crypto
- Thang Hoang, Attila Altay Yavuz, Jorge Guajardo:
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. 302-313 - Julian Horsch, Sascha Wessel, Claudia Eckert:
CoKey: fast token-based cooperative cryptography. 314-323 - Nicholas Chang-Fong, Aleksander Essex:
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios. 324-335
Malware
- Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi:
ShieldFS: a self-healing, ransomware-aware filesystem. 336-347 - ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. 348-362 - Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf:
Intelligent, automated red team emulation. 363-373
Mobile security
- Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang:
You can promote, but you can't hide: large-scale abused app detection in mobile app stores. 374-385 - Yuan Tian, Eric Yawei Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague:
Swords and shields: a study of mobile game hacks and existing defenses. 386-397 - Huan Feng, Kang G. Shin:
Understanding and defending the binder attack surface in Android. 398-409
Side channels
- Hyungsub Kim, Sangho Lee, Jong Kim:
Inferring browser activity and status through remote monitoring of storage usage. 410-421 - Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom:
Amplifying side channels through performance degradation. 422-435 - Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. 436-447
Software security
- Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos:
VTPin: practical VTable hijacking protection for binaries. 448-459 - Wei Huang, Zhen Huang, Dhaval Miyani, David Lie:
LMP: light-weighted memory protection with hardware assistance. 460-470 - Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara:
FASE: functionality-aware security enforcement. 471-483
Privacy & data protection
- Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel:
Reliably determining data leakage in the presence of strong attackers. 484-495 - Bo Chen, Shijie Jia, Luning Xia, Peng Liu:
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. 496-507 - Shiqi Shen, Shruti Tople, Prateek Saxena:
Auror: defending against poisoning attacks in collaborative deep learning systems. 508-519
Trust and usability
- Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan:
A security analysis of automated chinese turing tests. 520-532 - Mark R. Beaumont, Jim McCarthy, Toby C. Murray:
The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface. 533-545 - Stephanos Matsumoto, Samuel Steffen, Adrian Perrig:
CASTLE: CA signing in a touch-less environment. 546-557
Forensics
- Robin Sommer, Johanna Amann, Seth Hall:
Spicy: a unified deep packet inspection framework for safely dissecting all your data. 558-569 - Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz:
Trace-free memory data structure forensics via past inference and future speculations. 570-582 - Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu:
HERCULE: attack story reconstruction via community discovery on correlated log graph. 583-595
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.