ACSAC A

46 papers

YearTitle / Authors
2008A Survey to Guide Group Key Protocol Development.
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor
2008Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis.
Robert J. Cole, Peng Liu
2008Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window.
Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura
2008Anti-Phishing in Offense and Defense.
Chuan Yue, Haining Wang
2008Assessing Quality of Policy Properties in Verification of Access Control Policies.
Evan Martin, Jeehyun Hwang, Tao Xie, Vincent C. Hu
2008Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences.
Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue
2008Automatic Inference and Enforcement of Kernel Data Structure Invariants.
Arati Baliga, Vinod Ganapathy, Liviu Iftode
2008Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors.
Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis
2008Bluetooth Network-Based Misuse Detection.
Terrence O'Connor, Douglas S. Reeves
2008Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Peng Li, Hyundo Park, Debin Gao, Jianming Fu
2008DARE: A Framework for Dynamic Authentication of Remote Executions.
Erdem Aktas, Kanad Ghose
2008Defending Against Attacks on Main Memory Persistence.
William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith
2008Enforcing Role-Based Access Control Policies in Web Services with UML and OCL.
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn
2008Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet.
Barbara Fraser, Stephen D. Crocker
2008Execution Trace-Driven Automated Attack Signature Generation.
Susanta Nanda, Tzi-cker Chiueh
2008Host-Centric Model Checking for Network Vulnerability Analysis.
Rattikorn Hewett, Phongphun Kijsanayothin
2008Implementing ACL-Based Policies in XACML.
Günter Karjoth, Andreas Schade, Els Van Herreweghen
2008Improving Security Visualization with Exposure Map Filtering.
Mansour Alsaleh, David Barrera, Paul C. van Oorschot
2008Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection.
Xunhua Wang, Philip D. Huff, Brett C. Tjaden
2008Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography.
Sean O'Melia, Adam J. Elbirt
2008MalTRAK: Tracking and Eliminating Unknown Malware.
Amit Vasudevan
2008McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Roberto Perdisci, Andrea Lanzi, Wenke Lee
2008New Side Channels Targeted at Passwords.
Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger
2008OMOS: A Framework for Secure Communication in Mashup Applications.
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
2008On Purely Automated Attacks and Click-Based Graphical Passwords.
Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot
2008PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma
2008Permission Set Mining: Discovering Practical and Useful Roles.
Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann
2008PinUP: Pinning User Files to Known Applications.
William Enck, Patrick D. McDaniel, Trent Jaeger
2008Please Permit Me: Stateless Delegated Authorization in Mashups.
Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani
2008Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage.
Paul F. Farrell Jr., Simson L. Garfinkel, Douglas White
2008Preventing Information Leaks through Shadow Executions.
Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla
2008Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System.
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti
2008ProActive Access Control for Business Process-Driven Environments.
Mathias Kohler, Andreas Schaad
2008STILL: Exploit Code Detection via Static Taint and Initialization Analyses.
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
2008Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense.
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu
2008Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint.
O. Sami Saydjari
2008Systematic Signature Engineering by Re-use of Snort Signatures.
Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz
2008The Evolution of System-Call Monitoring.
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji
2008The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
2008Toward Automatic Generation of Intrusion Detection Verification Rules.
Frédéric Massicotte, Yvan Labiche, Lionel C. Briand
2008Transaction Oriented Text Messaging with Trusted-SMS.
Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano
2008Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008
2008VICI Virtual Machine Introspection for Cognitive Immunity.
Timothy Fraser, Matthew R. Evenson, William A. Arbaugh
2008XSSDS: Server-Side Detection of Cross-Site Scripting Attacks.
Martin Johns, Björn Engelmann, Joachim Posegga
2008YAGP: Yet Another Graphical Password Strategy.
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu
2008pwdArmor: Protecting Conventional Password-Based Authentications.
Timothy W. van der Horst, Kent E. Seamons