ACSAC A

37 papers

YearTitle / Authors
2013A building code for building code: putting what we know works to work.
Carl E. Landwehr
2013A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives.
Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero
2013A portable user-level approach for system-wide integrity protection.
Wai-Kit Sze, R. Sekar
2013AFrame: isolating advertisements from mobile applications in Android.
Xiao Zhang, Amit Ahlawat, Wenliang Du
2013Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013
Charles N. Payne Jr.
2013Auto-FBI: a user-friendly approach for secure access to sensitive content on the web.
Mohsen Zohrevandi, Rida A. Bazzi
2013Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda
2013CPS: an efficiency-motivated attack against autonomous vehicular transportation.
Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip
2013CPS: stateful policy enforcement for control system device usage.
Stephen E. McLaughlin
2013Control-flow restrictor: compiler-based CFI for iOS.
Jannik Pewny, Thorsten Holz
2013Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities.
Matthias Lange, Steffen Liebergeld
2013DR BACA: dynamic role based access control for Android.
Felix Rohrer, Yuting Zhang, Lou Chitkushev, Tanya Zlateva
2013DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles.
Xin Hu, Kang G. Shin
2013Discovery of emergent malicious campaigns in cellular networks.
Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock
2013Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications.
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013Extraction of statistically significant malware behaviors.
Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer
2013FireDroid: hardening security in almost-stock Android.
Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark
2013GPU and CPU parallelization of honest-but-curious secure two-party computation.
Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs
2013Implementation and implications of a stealth hard-drive backdoor.
Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas
2013Message in a bottle: sailing past censorship.
Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
2013MyCloud: supporting user-configured privacy protection in cloud computing.
Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu
2013No attack necessary: the surprising dynamics of SSL trust relationships.
B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall
2013PRIME: private RSA infrastructure for memory-less encryption.
Behrad Garmany, Tilo Müller
2013PatchDroid: scalable third-party security patches for Android devices.
Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda
2013Pitfalls in the automated strengthening of passwords.
David Schmidt, Trent Jaeger
2013Revisiting graphical passwords for augmenting, not replacing, text passwords.
Murat Akpulat, Kemal Bicakci, Ugur Cil
2013SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Zhui Deng, Xiangyu Zhang, Dongyan Xu
2013Seeing is not believing: visual verifications through liveness analysis using mobile devices.
Mahmudur Rahman, Umut Topkara, Bogdan Carbunar
2013SigMal: a static signal processing based malware triage.
Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath
2013SilverLine: preventing data leaks from compromised web applications.
Yogesh Mundada, Anirudh Ramachandran, Nick Feamster
2013Socket overloading for fun and cache-poisoning.
Amir Herzberg, Haya Schulmann
2013Subverting system authentication with context-aware, reactive virtual machine introspection.
Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen
2013Systems thinking for safety and security.
William Young, Nancy G. Leveson
2013The man who
Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos
2013Uncovering access control weaknesses and flaws with security-discordant software clones.
François Gauthier, Thierry Lavoie, Ettore Merlo
2013Validating web content with senser.
Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou
2013k-subscription: privacy-preserving microblogging browsing through obfuscation.
Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos