ACSAC A

49 papers

YearTitle / Authors
2016A multi-cloud based privacy-preserving data publishing scheme for the internet of things.
Lei Yang, Abdulmalik Humayed, Fengjun Li
2016A security analysis of automated chinese turing tests.
Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan
2016Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham
2016Amplifying side channels through performance degradation.
Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
2016An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices.
Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan
2016Auror: defending against poisoning attacks in collaborative deep learning systems.
Shiqi Shen, Shruti Tople, Prateek Saxena
2016Bootstrapping and maintaining trust in the cloud.
Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd
2016CASTLE: CA signing in a touch-less environment.
Stephanos Matsumoto, Samuel Steffen, Adrian Perrig
2016CPAC: securing critical infrastructure with cyber-physical access control.
Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler
2016Catching predators at watering holes: finding and understanding strategically compromised websites.
Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, Xiaofeng Wang, Zhou Li
2016CoKey: fast token-based cooperative cryptography.
Julian Horsch, Sascha Wessel, Claudia Eckert
2016Code obfuscation against symbolic execution attacks.
Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner
2016Cypider: building community-based cyber-defense infrastructure for android malware detection.
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
2016Decomposition of MAC address structure for granular device inference.
Jeremy Martin, Erik C. Rye, Robert Beverly
2016Device fingerprinting for augmenting web authentication: classification and analysis of methods.
Furkan Alaca, Paul C. van Oorschot
2016ELAR: extremely lightweight auditing and repairing for cloud security.
Tran Phuong Thao, Kazumasa Omote
2016Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure.
Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016EvilCoder: automated bug insertion.
Jannik Pewny, Thorsten Holz
2016FASE: functionality-aware security enforcement.
Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara
2016Formal security analysis of smart embedded systems.
Farid Molazem Tabrizi, Karthik Pattabiraman
2016Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.
Manar Mohamed, Nitesh Saxena
2016HERCULE: attack story reconstruction via community discovery on correlated log graph.
Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu
2016Inferring browser activity and status through remote monitoring of storage usage.
Hyungsub Kim, Sangho Lee, Jong Kim
2016Intelligent, automated red team emulation.
Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf
2016LMP: light-weighted memory protection with hardware assistance.
Wei Huang, Zhen Huang, Dhaval Miyani, David Lie
2016Life-experience passwords (LEPs).
Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic
2016Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis
2016Multi-receiver GPS spoofing detection: error models and realization.
Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
2016On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel
2016Pileus: protecting user resources from vulnerable cloud services.
Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger
2016Practical and secure dynamic searchable encryption via oblivious access on distributed data structure.
Thang Hoang, Attila Altay Yavuz, Jorge Guajardo
2016Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016
Stephen Schwab, William K. Robertson, Davide Balzarotti
2016Reliably determining data leakage in the presence of strong attackers.
Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel
2016RevProbe: detecting silent reverse proxies in malicious server infrastructures.
Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero
2016Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Bo Chen, Shijie Jia, Luning Xia, Peng Liu
2016ShieldFS: a self-healing, ransomware-aware filesystem.
Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi
2016Spicy: a unified deep packet inspection framework for safely dissecting all your data.
Robin Sommer, Johanna Amann, Seth Hall
2016Swords and shields: a study of mobile game hacks and existing defenses.
Yuan Tian, Eric Yawei Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague
2016The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu
2016The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios.
Nicholas Chang-Fong, Aleksander Essex
2016The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface.
Mark R. Beaumont, Jim McCarthy, Toby C. Murray
2016Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.
Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena
2016Timing-based reconnaissance and defense in software-defined networks.
John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller
2016Trace-free memory data structure forensics via past inference and future speculations.
Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz
2016Understanding and defending the binder attack surface in Android.
Huan Feng, Kang G. Shin
2016Using image saliency and regions of interest to encourage stronger graphical passwords.
Mohammad N. AlShehri, Heather Crawford
2016VTPin: practical VTable hijacking protection for binaries.
Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos
2016VulPecker: an automated vulnerability detection system based on code similarity analysis.
Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu
2016You can promote, but you can't hide: large-scale abused app detection in mobile app stores.
Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang