ACSAC A

48 papers

YearTitle / Authors
2015A Principled Approach for ROP Defense.
Rui Qiao, Mingwei Zhang, R. Sekar
2015Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu
2015Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls.
Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten
2015AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli
2015BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna
2015Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries.
Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng
2015Combining Differential Privacy and Secure Multiparty Computation.
Martin Pettai, Peeter Laud
2015Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks.
Mingwei Zhang, R. Sekar
2015Covert Botnet Command and Control Using Twitter.
Nick Pantic, Mohammad Iftekhar Husain
2015Cross-Site Framing Attacks.
Nethanel Gelernter, Yoel Grinstein, Amir Herzberg
2015Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks.
Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani
2015Defeating ROP Through Denial of Stack Pivot.
Aravind Prakash, Heng Yin
2015Defending Against Malicious USB Firmware with GoodUSB.
Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler
2015DynaGuard: Armoring Canary-based Protections against Brute-force Attacks.
Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis
2015Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks.
Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang
2015Entity-Based Access Control: supporting more expressive access control policies.
Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen
2015ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage.
Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford
2015Evaluating the Flexibility of the Java Sandbox.
Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine
2015Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning.
Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara
2015Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit.
Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato
2015Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi
2015Handling Reboots and Mobility in 802.15.4 Security.
Konrad-Felix Krentz, Christoph Meinel
2015Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics.
Letitia W. Li, Guillaume Duc, Renaud Pacalet
2015Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock.
Adam J. Aviv, Devon Budzitowski, Ravi Kuber
2015JaTE: Transparent and Efficient JavaScript Confinement.
Tung Tran, Riccardo Pelizzi, R. Sekar
2015Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel
2015Logical Partitions on Many-Core Platforms.
Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
2015MOSE: Live Migration Based On-the-Fly Software Emulation.
Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim
2015MobiPluto: File System Friendly Deniable Storage for Mobile Devices.
Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang
2015MorphDroid: Fine-grained Privacy Verification.
Pietro Ferrara, Omer Tripp, Marco Pistoia
2015On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto
2015On the Security and Usability of Crypto Phones.
Maliheh Shirvanian, Nitesh Saxena
2015PARS: A Uniform and Open-source Password Analysis and Research System.
Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah
2015PIE: Parser Identification in Embedded Systems.
Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti
2015Privacy-preserving Virtual Machine.
Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan
2015Proactive Security Analysis of Changes in Virtualized Infrastructures.
Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim
2015Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015
2015Provenance-based Integrity Protection for Windows.
Wai-Kit Sze, R. Sekar
2015Proximity Verification for Contactless Access Control and Authentication Systems.
Aanjhan Ranganathan, Boris Danev, Srdjan Capkun
2015Scalable and Secure Concurrent Evaluation of History-based Access Control Policies.
Maarten Decat, Bert Lagaisse, Wouter Joosen
2015SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases.
Simone Mutti, Enrico Bacis, Stefano Paraboschi
2015Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Peter Mayer, Melanie Volkamer
2015ShrinkWrap: VTable Protection without Loose Ends.
István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos
2015Soteria: Offline Software Protection within Low-cost Embedded Devices.
Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede
2015Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
Chen Cao, Neng Gao, Peng Liu, Ji Xiang
2015Using Channel State Information for Tamper Detection in the Internet of Things.
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick
2015Using Visual Challenges to Verify the Integrity of Security Cameras.
Junia Valente, Alvaro A. Cárdenas
2015Vulnerability Assessment of OAuth Implementations in Android Applications.
Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu