CCS A*

53 papers

YearTitle / Authors
2008A class of probabilistic models for role engineering.
Mario Frank, David A. Basin, Joachim M. Buhmann
2008A formal framework for reflective database access control policies.
Lars E. Olson, Carl A. Gunter, P. Madhusudan
2008A look in the mirror: attacks on package managers.
Justin Cappos, Justin Samuel, Scott M. Baker, John H. Hartman
2008A low-cost attack on a Microsoft captcha.
Jeff Yan, Ahmad Salah El Ahmad
2008Assessing query privileges via safe and efficient permission composition.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2008Authenticated hash tables.
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2008Black-box accountable authority identity-based encryption.
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
2008BootJacker: compromising computers using forced restarts.
Ellick Chan, Jeffrey C. Carlyle, Francis M. David, Reza Farivar, Roy H. Campbell
2008Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
Peter Williams, Radu Sion, Bogdan Carbunar
2008Code injection attacks on harvard-architecture devices.
Aurélien Francillon, Claude Castelluccia
2008Computational soundness of observational equivalence.
Hubert Comon-Lundh, Véronique Cortier
2008Constructions of truly practical secure protocols using standard smartcards.
Carmit Hazay, Yehuda Lindell
2008Cryptographically verified implementations for TLS.
Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu
2008Dependent link padding algorithms for low latency anonymity systems.
Wei Wang, Mehul Motani, Vikram Srinivasan
2008EON: modeling and analyzing dynamic access control systems with logic programs.
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani, G. Ramalingam, Lakshmisubrahmanyam Velaga
2008Efficient and extensible security enforcement using dynamic data flow analysis.
Walter Chang, Brandon Streiff, Calvin Lin
2008Efficient attributes for anonymous credentials.
Jan Camenisch, Thomas Groß
2008Efficient security primitives derived from a secure aggregation algorithm.
Haowen Chan, Adrian Perrig
2008Enforcing authorization policies using transactional memory introspection.
Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode
2008Ether: malware analysis via hardware virtualization extensions.
Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee
2008Extending logical attack graphs for efficient vulnerability analysis.
Diptikalyan Saha
2008FairplayMP: a system for secure multi-party computation.
Assaf Ben-David, Noam Nisan, Benny Pinkas
2008Identity-based encryption with efficient revocation.
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
2008Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee
2008Information leaks in structured peer-to-peer anonymous communication systems.
Prateek Mittal, Nikita Borisov
2008Location privacy of distance bounding protocols.
Kasper Bonne Rasmussen, Srdjan Capkun
2008Machine learning attacks against the Asirra CAPTCHA.
Philippe Golle
2008Mitigating DNS DoS attacks.
Hitesh Ballani, Paul Francis
2008Multi-use unidirectional proxy re-signatures.
Benoît Libert, Damien Vergnaud
2008Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
2008OMash: enabling secure web mashups via object abstractions.
Steven Crites, Francis Hsu, Hao Chen
2008PEREA: towards practical TTP-free revocation in anonymous authentication.
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith
2008Privacy oracle: a system for finding application leaks with black box differential testing.
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno
2008Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008
Peng Ning, Paul F. Syverson, Somesh Jha
2008RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno
2008Reconsidering physical key secrecy: teleduplication via optical decoding.
Benjamin Laxton, Kai Wang, Stefan Savage
2008Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
Ralf Küsters, Tomasz Truderung
2008Revocation games in ephemeral networks.
Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux
2008Robust defenses for cross-site request forgery.
Adam Barth, Collin Jackson, John C. Mitchell
2008Rootkit-resistant disks.
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel
2008SOMA: mutual approval for included content in web pages.
Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
2008Spamalytics: an empirical analysis of spam marketing conversion.
Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
2008The good, the bad, and the provable.
Martín Abadi
2008Towards automated proofs for asymmetric encryption schemes in the random oracle model.
Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech
2008Towards automatic reverse engineering of software security configurations.
Rui Wang, Xiaofeng Wang, Kehuan Zhang, Zhuowei Li
2008Towards practical biometric key generation with randomized biometric templates.
Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter
2008Traitor tracing with constant size ciphertext.
Dan Boneh, Moni Naor
2008Trust management for secure information flows.
Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi
2008Tupni: automatic reverse engineering of input formats.
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irún-Briz
2008Type-checking zero-knowledge.
Michael Backes, Catalin Hritcu, Matteo Maffei
2008Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
Cas J. F. Cremers
2008Verifiable functional purity in java.
Matthew Finifter, Adrian Mettler, Naveen Sastry, David A. Wagner
2008When good instructions go bad: generalizing return-oriented programming to RISC.
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage