default search action
27. ACSAC 2011: Orlando, FL, USA
- Robert H'obbes' Zakon, John P. McDermott, Michael E. Locasto:
Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011. ACM 2011, ISBN 978-1-4503-0672-0
Malware I
- Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Understanding the prevalence and use of alternative plans in malware with network games. 1-10 - Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel:
FORECAST: skimming off the malware cream. 11-20 - Matthias Neugschwandtner, Paolo Milani Comparetti, Christian Platzer:
Detecting malware's failover C&C strategies with squeeze. 21-30
Situational awareness I
- Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash, Karem A. Sakallah:
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. 31-40 - John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen:
RIPE: runtime intrusion prevention evaluator. 41-50 - Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna:
Hit 'em where it hurts: a live security exercise on cyber situational awareness. 51-61
Applied cryptography
- Nilesh Nipane, Italo Dacosta, Patrick Traynor:
"Mix-in-Place" anonymous networking using secure function evaluation. 63-72 - Patrick Simmons:
Security through amnesia: a software-based solution to the cold boot attack on disk encryption. 73-82 - Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:
Private search in the real world. 83-92
Social network security
- Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
The socialbot network: when bots socialize for fame and money. 93-102 - Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. 103-112 - Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl:
Social snapshots: digital forensics for online social networks. 113-122
Classic paper I
- Paul F. Syverson:
A peel of onion. 123-137
Invited essayist
- Terry Benzel:
The science of cyber security experimentation: the DETER project. 137-148
Usable security
- Max Hlywa, Robert Biddle, Andrew S. Patrick:
Facing the facts about image type in recognition-based graphical passwords. 149-158 - Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson:
PhorceField: a phish-proof password ceremony. 159-168 - Ahmed Awad E. Ahmed, Issa Traoré:
Dynamic sample size detection in continuous authentication using sequential sampling. 169-176
Secure infrastructure
- Ahmed Khurshid, Firat Kiyak, Matthew Caesar:
Improving robustness of DNS to software vulnerabilities. 177-186 - Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun:
Enabling secure VM-vTPM migration in private clouds. 187-196 - Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. 197-206
Anonymity
- W. Brad Moore, Chris Wacek, Micah Sherr:
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise. 207-216 - Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
"Super nodes" in Tor: existence and security implication. 217-226 - Marek Jawurek, Martin Johns, Konrad Rieck:
Smart metering de-pseudonymization. 227-236
Web security I
- Shardul Vikram, Yinan Fan, Guofei Gu:
SEMAGE: a new image-based two-factor CAPTCHA. 237-246 - Xiaowei Li, Yuan Xue:
BLOCK: a black-box approach for detection of state violation attacks towards web applications. 247-256 - Riccardo Pelizzi, R. Sekar:
A server- and browser-transparent CSRF defense for web 2.0 applications. 257-266
Software security
- Jing Xie, Bill Chu, Heather Richter Lipford, John T. Melton:
ASIDE: IDE support for web application security. 267-276 - Jennia Hizver, Tzi-cker Chiueh:
Tracking payment card data flow using virtual machine state introspection. 277-285
Web security II
- Dongwan Shin, Rodrigo Lopes:
An empirical study of visual security cues to prevent the SSLstripping attack. 287-296 - Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang:
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. 297-306 - Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. 307-316
Classic paper II
- Matt Blaze:
Key escrow from a safe distance: looking back at the Clipper Chip. 317-321
Mobile security
- Omid Fatemieh, Michael LeMay, Carl A. Gunter:
Reliable telemetry in white spaces using remote attestation. 323-332 - Ahren Studer, Timothy Passaro, Lujo Bauer:
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. 333-342 - Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin:
Attacks on WebView in the Android system. 343-352
Malware II
- Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh:
Mitigating code-reuse attacks with control-flow locking. 353-362 - Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao:
deRop: removing return-oriented programming from malware. 363-372 - Pavel Laskov, Nedim Srndic:
Static detection of malicious JavaScript-bearing PDF documents. 373-382
Situational awareness II
- Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna:
Nexat: a history-based approach to predict attacker actions. 383-392 - Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. 393-402
Malware III
- Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:
BareBox: efficient malware analysis on bare-metal. 403-412 - Yacin Nadji, Jonathon T. Giffin, Patrick Traynor:
Automated remote repair for mobile malware. 413-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.