ACSAC A

49 papers

YearTitle / Authors
2014A security evaluation of AIS automated identification system.
Marco Balduzzi, Alessandro Pasta, Kyle Wilhoit
2014A taste of tweets: reverse engineering Twitter spammers.
Chao Yang, Jialong Zhang, Guofei Gu
2014Advanced Wi-Fi attacks using commodity hardware.
Mathy Vanhoef, Frank Piessens
2014Android security framework: extensible multi-layered access control on Android.
Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky
2014Assisted deletion of related content.
Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun
2014CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices.
Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno
2014CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals.
Marina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen
2014CPS: market analysis of attacks against demand response in the smart grid.
Carlos A. Barreto, Alvaro A. Cárdenas, Nicanor Quijano, Eduardo Mojica-Nava
2014Centrality metrics of importance in access behaviors and malware detections.
Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley
2014Challenges and implications of verifiable builds for security-critical open-source software.
Xavier de Carné de Carnavalet, Mohammad Mannan
2014Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures.
Sören Bleikertz, Carsten Vogel, Thomas Groß
2014DNS authentication as a service: preventing amplification attacks.
Amir Herzberg, Haya Schulmann
2014Design and implementation of an Android host-based intrusion prevention system.
Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang
2014Differentially private data aggregation with optimal utility.
Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate
2014Exploring and mitigating privacy threats of HTML5 geolocation API.
Hyungsub Kim, Sangho Lee, Jong Kim
2014Hot-hardening: getting more out of your security settings.
Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer
2014ICE: a passive, high-speed, state-continuity scheme.
Raoul Strackx, Bart Jacobs, Frank Piessens
2014IMSI-catch me if you can: IMSI-catcher-catchers.
Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl
2014IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.
Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis
2014Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware.
Samuel Junjie Tan, Sergey Bratus, Travis Goodspeed
2014It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.
Daniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan (Martin) Yeh, Justin Cappos, Yanyan Zhuang
2014JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge
2014Less is more: cipher-suite negotiation for DNSSEC.
Amir Herzberg, Haya Schulmann, Bruno Crispo
2014Leveraging semantic signatures for bug search in binary programs.
Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow
2014Lightweight authentication of freshness in outsourced key-value stores.
Yuzhe Richard Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang
2014MACE: high-coverage and robust memory analysis for commodity operating systems.
Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin
2014MoRePriv: mobile OS support for application personalization and privacy.
Drew Davidson, Matt Fredrikson, Benjamin Livshits
2014Morpheus: automatically generating heuristics to detect Android emulators.
Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu
2014Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen
2014New models of cache architectures characterizing information leakage from cache side channels.
Tianwei Zhang, Ruby B. Lee
2014NodeSentry: least-privilege library integration for server-side JavaScript.
Willem De Groef, Fabio Massacci, Frank Piessens
2014OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici
2014On the privacy provisions of Bloom filters in lightweight bitcoin clients.
Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber
2014Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014
Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr
2014Relation extraction for inferring access control rules from natural language artifacts.
John Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie
2014SEER: practical memory virus scanning as a service.
Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang
2014Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system.
Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias
2014Scippa: system-centric IPC provenance on Android.
Michael Backes, Sven Bugiel, Sebastian Gerling
2014Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary
2014Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications.
Aviel D. Rubin
2014Through the eye of the PLC: semantic security monitoring for industrial processes.
Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel
2014Towards a scalable resource-driven approach for detecting repackaged Android applications.
Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, Lei Zhang
2014Towards automated integrity protection of C++ virtual function tables in binary programs.
Robert Gawlik, Thorsten Holz
2014TroGuard: context-aware protection against web-based socially engineered trojans.
Rui Han, Alejandro Mesa, Mihai Christodorescu, Saman A. Zonouz
2014TrueClick: automatically distinguishing trick banners from genuine download links.
Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda
2014Uncovering network tarpits with degreaser.
Lance Alt, Robert Beverly, Alberto Dainotti
2014Understanding visual perceptions of usability and security of Android's graphical password pattern.
Adam J. Aviv, Dane Fichter
2014Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security.
Hendrik Meutzner, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa
2014Whitewash: outsourcing garbled circuit generation for mobile devices.
Henry Carter, Charles Lever, Patrick Traynor