CCS A*

99 papers

YearTitle / Authors
2010@spam: the underground on 140 characters or less.
Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang
2010A cloud based SIM DRM scheme for the mobile internet.
Peng Zou, Chaokun Wang, Zhang Liu, Jianmin Wang, Jia-Guang Sun
2010A control point for reducing root abuse of file-system privileges.
Glenn Wurster, Paul C. van Oorschot
2010A methodology for empirical analysis of permission-based security models and its application to android.
David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji
2010A new framework for efficient password-based authenticated key exchange.
Adam Groce, Jonathan Katz
2010A portable TPM based on USB key.
Dawei Zhang, Zhen Han, Guangwen Yan
2010A privacy recommendation wizard for users of social networking sites.
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
2010Abstraction by set-membership: verifying security protocols and web services with databases.
Sebastian Mödersheim
2010AccessMiner: using system-centric models for malware protection.
Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda
2010Accountability: definition and relationship to verifiability.
Ralf Küsters, Tomasz Truderung, Andreas Vogt
2010Ad hoc broadcast encryption.
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer
2010Algebraic pseudorandom functions with improved efficiency from the augmented cascade.
Dan Boneh, Hart William Montgomery, Ananth Raghunathan
2010An empirical study of privacy-violating information flows in JavaScript web applications.
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham
2010An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Mihaela Ion, Giovanni Russello, Bruno Crispo
2010An improved algorithm for tor circuit scheduling.
Can Tang, Ian Goldberg
2010Assessing trust in uncertain information using Bayesian description logic.
Achille Fokoue, Mudhakar Srivatsa, Robert Young
2010Attacking and fixing PKCS#11 security tokens.
Matteo Bortolozzo, Matteo Centenaro, Riccardo Focardi, Graham Steel
2010Attacks and design of image recognition CAPTCHAs.
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai
2010BLADE: an attack-agnostic approach for preventing drive-by malware infections.
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee
2010Building efficient fully collusion-resilient traitor tracing and revocation schemes.
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
2010CRAFT: a new secure congestion control architecture.
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar
2010CardSpace in the cloud.
David W. Chadwick, George Inman, Paul Coxwell
2010Computational indistinguishability logic.
Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech
2010Computationally sound verification of source code.
Michael Backes, Matteo Maffei, Dominique Unruh
2010DIFC programs by automatic instrumentation.
William R. Harris, Somesh Jha, Thomas W. Reps
2010Demonstrating cognitive packet network resilience to worm attacks.
Georgia Sakellari, Erol Gelenbe
2010Designing router scheduling policies: a privacy perspective.
Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam
2010Designs to account for trust in social network-based sybil defenses.
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
2010Detecting and characterizing social spam campaigns.
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao
2010Developing security protocols by refinement.
Christoph Sprenger, David A. Basin
2010Dialog-based payload aggregation for intrusion detection.
Tobias Limmer, Falko Dressler
2010DieHarder: securing the heap.
Gene Novark, Emery D. Berger
2010Dismantling SecureMemory, CryptoMemory and CryptoRF.
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
2010Dissecting one click frauds.
Nicolas Christin, Sally S. Yanagihara, Keisuke Kamataki
2010Dissent: accountable anonymous group messaging.
Henry Corrigan-Gibbs, Bryan Ford
2010Dynamic window based multihop authentication for WSN.
Lan Yao, Zhiliang Yu, Tie Zhang, Fuxiang Gao
2010Efficient provable data possession for hybrid clouds.
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010Efficient sensor node authentication via 3GPP mobile communication networks.
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Shon
2010Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining.
Walid Bechkit, Abdelmadjid Bouabdallah, Yacine Challal
2010Exploiting social networking sites for spam.
Markus Huber, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch
2010Fingerprinting websites using remote traffic analysis.
Xun Gong, Negar Kiyavash, Nikita Borisov
2010Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Guojun Wang, Qin Liu, Jie Wu
2010HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky
2010In God we trust all others we monitor.
Patrick Stewin, Jean-Pierre Seifert
2010In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Qiyan Wang, Prateek Mittal, Nikita Borisov
2010Inference and analysis of formal models of botnet command and control protocols.
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song
2010Information security for sensors by overwhelming random sequences and permutations.
Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, Paul G. Spirakis
2010Input generation via decomposition and re-stitching: finding bugs in Malware.
Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song
2010Laptop theft: a case study on the effectiveness of security mechanisms in open organizations.
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
2010Losing control of the internet: using the data plane to attack the control plane.
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman
2010Mimimorphism: a new approach to binary code obfuscation.
Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Haining Wang
2010Mobile location tracking in metro areas: malnets and others.
Nathaniel Husted, Steven A. Myers
2010Modeling attacks on physical unclonable functions.
Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
2010NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications.
Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan
2010On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract.
Zhibin Zhou, Dijiang Huang
2010On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.
Tzipora Halevi, Nitesh Saxena
2010On the (in)security of IPsec in MAC-then-encrypt configurations.
Jean Paul Degabriele, Kenneth G. Paterson
2010On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.
Ueli Maurer, Björn Tackmann
2010On verifying stateful dataflow processing services in large-scale cloud systems.
Juan Du, Xiaohui Gu, Ting Yu
2010PinDr0p: using single-ended audio features to determine call provenance.
Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor
2010Platform-independent programs.
Sang Kil Cha, Brian Pak, David Brumley, Richard Jay Lipton
2010Practical leakage-resilient identity-based encryption from simple assumptions.
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters
2010Practical leakage-resilient pseudorandom generators.
Yu Yu, François-Xavier Standaert, Olivier Pereira, Moti Yung
2010Predictive black-box mitigation of timing channels.
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
2010Privacy and robustness for data aggregation in wireless sensor networks.
Marian Kamal Iskander, Adam J. Lee, Daniel Mossé
2010Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010
Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov
2010Protecting browsers from cross-origin CSS attacks.
Lin-Shung Huang, Zack Weinberg, Chris Evans, Collin Jackson
2010Protecting location privacy against inference attacks.
Kazuhiro Minami, Nikita Borisov
2010Protecting portable storage with host validation.
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel
2010Recruiting new tor relays with BRAIDS.
Rob Jansen, Nicholas Hopper, Yongdae Kim
2010Rendezvous tunnel for anonymous publishing.
Ofer Hermoni, Niv Gilboa, Eyal Felstaine, Yuval Elovici, Shlomi Dolev
2010Retaining sandbox containment despite bugs in privileged memory-safe code.
Justin Cappos, Armon Dadgar, Jeff Rasley, Justin Samuel, Ivan Beschastnikh, Cosmin Barsan, Arvind Krishnamurthy, Thomas E. Anderson
2010Return-oriented programming without returns.
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy
2010Robusta: taming the native beast of the JVM.
Joseph Siefers, Gang Tan, Greg Morrisett
2010SecTag: a multi-policy supported secure web tag framework.
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaopu Ma, Kai Li
2010Secure dynamic code generation against spraying.
Tao Wei, Tielei Wang, Lei Duan, Jing Luo
2010Secure encounter-based social networks: requirements, challenges, and designs.
Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim
2010Secure latency estimation with treeple.
Eric Chan-Tin, Nicholas Hopper
2010Secure online banking on untrusted computers.
Yanlin Peng, Wenji Chen, J. Morris Chang, Yong Guan
2010Secure text processing with applications to private DNA matching.
Jonathan Katz, Lior Malka
2010Security analysis of India's electronic voting machines.
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp
2010Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Kehuan Zhang, Zhou Li, Rui Wang, Xiaofeng Wang, Shuo Chen
2010Size-based scheduling: a recipe for DDOS?
Abdul Serwadda, Vir V. Phoha, Idris A. Rai
2010Spectrum based fraud detection in social networks.
Xiaowei Ying, Xintao Wu, Daniel Barbará
2010Survivable key compromise in software update systems.
Justin Samuel, Nick Mathewson, Justin Cappos, Roger Dingledine
2010Symbolic security analysis of ruby-on-rails web applications.
Avik Chaudhuri, Jeffrey S. Foster
2010Synchronized aggregate signatures: new definitions, constructions and applications.
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
2010TAPS: automatically preparing safe SQL queries.
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan
2010TASTY: tool for automating secure two-party computations.
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2010TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi
2010Testing metrics for password creation policies by attacking large sets of revealed passwords.
Matt Weir, Sudhir Aggarwal, Michael P. Collins, Henry Stern
2010The security of modern password expiration: an algorithmic framework and empirical analysis.
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
2010Timing attacks on PIN input devices.
Denis Foo Kune, Yongdae Kim
2010Trail of bytes: efficient support for forensic analysis.
Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose
2010User-friendly matching protocol for online social networks.
Qiang Tang
2010Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen
2010Worry-free encryption: functional encryption with public keys.
Amit Sahai, Hakan Seyalioglu
2010XACML policy performance evaluation using a flexible load testing framework.
Bernard Butler, Brendan Jennings, Dmitri Botvich
2010iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Rahul Potharaju, Bogdan Carbunar, Cristina Nita-Rotaru