CCS A*

57 papers

YearTitle / Authors
2007Alpaca: extensible authorization for distributed services.
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek
2007An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism.
Shuo Chen, David Ross, Yi-Min Wang
2007An independent audit framework for software dependent voting systems.
Sujata Garera, Aviel D. Rubin
2007An information-theoretic model for adaptive side-channel attacks.
Boris Köpf, David A. Basin
2007An inquiry into the nature and causes of the wealth of internet miscreants.
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage
2007Analyzing the vulnerability of superpeer networks against attack.
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly
2007Asirra: a CAPTCHA that exploits interest-aligned manual image categorization.
Jeremy Elson, John R. Douceur, Jon Howell, Jared Saul
2007Assurance and evaluation: what next?
Steven B. Lipner
2007Attribute-based encryption with non-monotonic access structures.
Rafail Ostrovsky, Amit Sahai, Brent Waters
2007Automated detection of persistent kernel control-flow attacks.
Nick L. Petroni Jr., Michael W. Hicks
2007Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu
2007Beamauth: two-factor web authentication with a bookmark.
Ben Adida
2007Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith
2007CANDID: preventing sql injection attacks using dynamic candidate evaluations.
Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan
2007Chosen-ciphertext secure proxy re-encryption.
Ran Canetti, Susan Hohenberger
2007ConceptDoppler: a weather tracker for internet censorship.
Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl T. Barr, Rich East
2007Covert channels in privacy-preserving identification systems.
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels
2007Cryptanalysis of the windows random number generator.
Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
2007Denial of service or denial of security?
Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz
2007Detecting covert timing channels: an entropy-based approach.
Steven Gianvecchio, Haining Wang
2007Do background images improve "draw a secret" graphical passwords?
Paul Dunphy, Jeff Yan
2007Dynamic pharming attacks and locked same-origin policies for web browsers.
Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner
2007Efficient policy analysis for administrative role based access control.
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman
2007Filtering spam with behavioral blacklisting.
Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala
2007Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Benoît Libert, Jean-Jacques Quisquater, Moti Yung
2007Hardware-rooted trust for secure key management and transient trust.
Jeffrey S. Dwoskin, Ruby B. Lee
2007Harvesting verifiable challenges from oblivious online sources.
J. Alex Halderman, Brent Waters
2007Highly efficient techniques for network forensics.
Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein
2007How much anonymity does network latency leak?
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin
2007Information disclosure under realistic assumptions: privacy versus optimality.
Lei Zhang, Sushil Jajodia, Alexander Brodsky
2007Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
2007Multi-module vulnerability analysis of web-based applications.
Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna
2007On the accuracy of decentralized virtual coordinate systems in adversarial networks.
David John Zage, Cristina Nita-Rotaru
2007On the infeasibility of modeling polymorphic shellcode.
Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo
2007Optimal security hardening using multi-objective optimization on attack tree models of networks.
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley
2007Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
2007Panorama: capturing system-wide information flow for malware detection and analysis.
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda
2007Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song
2007Pors: proofs of retrievability for large files.
Ari Juels, Burton S. Kaliski Jr.
2007Predicting vulnerable software components.
Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller
2007Preserving privacy in gps traces via uncertainty-aware path cloaking.
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
2007Privacy preserving error resilient dna searching through oblivious automata.
Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik
2007Privacy-preserving remote diagnostics.
Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel
2007Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007
Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson
2007Protecting browsers from dns rebinding attacks.
Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh
2007Provable data possession at untrusted stores.
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song
2007Provably secure ciphertext policy ABE.
Ling Cheung, Calvin C. Newport
2007Robust computational secret sharing and a unified account of classical secret-sharing goals.
Phillip Rogaway, Mihir Bellare
2007Robust group key agreement using short broadcasts.
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
2007Robust key generation from signal envelopes in wireless networks.
Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener
2007Secure two-party k-means clustering.
Paul Bunn, Rafail Ostrovsky
2007Security under key-dependent inputs.
Shai Halevi, Hugo Krawczyk
2007Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention.
José M. González, Vern Paxson, Nicholas Weaver
2007Split-ballot voting: everlasting privacy with distributed trust.
Tal Moran, Moni Naor
2007Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
2007The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
Hovav Shacham
2007Towards automated provisioning of secure virtualized networks.
Serdar Cabuk, Chris I. Dalton, Harigovind V. Ramasamy, Matthias Schunter