CCS A*

103 papers

YearTitle / Authors
2011(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers.
Philip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor
2011A composable computational soundness notion.
Véronique Cortier, Bogdan Warinschi
2011AmazonIA: when elasticity snaps back.
Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider
2011An efficient user verification system via mouse movements.
Nan Zheng, Aaron Paloski, Haining Wang
2011Android permissions demystified.
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner
2011App isolation: get the security of multiple browsers with just one.
Eric Yawei Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson
2011Auctions in do-not-track compliant internet advertising.
Alexey Reznichenko, Saikat Guha, Paul Francis
2011Automated black-box detection of side-channel vulnerabilities in web applications.
Peter Chapman, David Evans
2011Automatic error finding in access-control policies.
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, Martin C. Rinard, Steve J. Chapin
2011Automatically optimizing secure computation.
Florian Kerschbaum
2011BitShred: feature hashing malware for scalable triage and semantic analysis.
Jiyong Jang, David Brumley, Shobha Venkataraman
2011Ciphers that securely encipher their own keys.
Mihir Bellare, David Cash, Sriram Keelveedhi
2011Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
2011Cloak and dagger: dynamics of web search cloaking.
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
2011Combining control-flow integrity and static analysis for efficient and validated data sandboxing.
Bin Zeng, Gang Tan, Greg Morrisett
2011Composability of bellare-rogaway key exchange protocols.
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams
2011Composition theorems without pre-established session identifiers.
Ralf Küsters, Max Tuengerthal
2011Context-sensitive auto-sanitization in web templating languages using type qualifiers.
Mike Samuel, Prateek Saxena, Dawn Song
2011Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
2011Crouching tiger - hidden payload: security risks of scalable vectors graphics.
Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz
2011Cryptographic primitives for building secure and privacy respecting protocols.
Jan Camenisch
2011Demo: a comprehensive framework enabling data-minimizing authentication.
Patrik Bichsel, Franz-Stefan Preiss
2011Demo: secure computation in JavaScript.
Axel Schröpfer, Florian Kerschbaum
2011Demo: the f
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac
2011Deobfuscation of virtualization-obfuscated software: a semantics-based approach.
Kevin Coogan, Gen Lu, Saumya K. Debray
2011Eliminating the hypervisor attack surface for a more secure cloud.
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford
2011Extracting and verifying cryptographic models from C protocol code by symbolic execution.
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens
2011Fashion crimes: trending-term exploitation on the web.
Tyler Moore, Nektarios Leontiadis, Nicolas Christin
2011Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna
2011Forensic investigation of the OneSwarm anonymous filesharing system.
Swagatika Prusty, Brian Neil Levine, Marc Liberatore
2011Fortifying web-based applications automatically.
Shuo Tang, Nathan Dautenhahn, Samuel T. King
2011How to break XML encryption.
Tibor Jager, Juraj Somorovsky
2011How to tell if your cloud files are vulnerable to drive crashes.
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2011Information-flow types for homomorphic encryptions.
Cédric Fournet, Jérémy Planul, Tamara Rezk
2011MIDeA: a multi-parallel intrusion detection architecture.
Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis
2011Modular code-based cryptographic verification.
Cédric Fournet, Markulf Kohlweiss, Pierre-Yves Strub
2011On the requirements for successful GPS spoofing attacks.
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
2011On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs.
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
2011PaperSpeckle: microscopic fingerprinting of paper.
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric A. Brewer
2011Password-protected secret sharing.
Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu
2011Policy auditing over incomplete logs: theory, implementation and applications.
Deepak Garg, Limin Jia, Anupam Datta
2011Poster: CUD: crowdsourcing for URL spam detection.
Jun Hu, Hongyu Gao, Zhichun Li, Yan Chen
2011Poster: DIEGO: a fine-grained access control for web browsers.
Ashar Javed
2011Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers.
Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger
2011Poster: ESPOON
Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo
2011Poster: LBMS: load balancing based on multilateral security in cloud.
Pengfei Sun, Qingni Shen, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu
2011Poster: SMURFEN: a rule sharing collaborative intrusion detection network.
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar
2011Poster: Towards detecting DMA malware.
Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner
2011Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing.
Xiaoxin Wu, Lei Xu, Xinwen Zhang
2011Poster: a geometric approach for multicast authentication in adversarial channels.
Seyed Ali Ahmadzadeh, Gordon B. Agnew
2011Poster: a path-cutting approach to blocking XSS worms in social web networks.
Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen
2011Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system.
Henning Perl, Michael Brenner, Matthew Smith
2011Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici
2011Poster: arbitrators in the security infrastructure, supporting positive anonymity.
Shlomi Dolev, Niv Gilboa, Ofer Hermoni
2011Poster: attribute based broadcast encryption with permanent revocation.
Shlomi Dolev, Niv Gilboa, Marina Kopeetsky
2011Poster: can it be more practical?: improving mouse dynamics biometric performance.
Chao Shen, Zhongmin Cai, Xiaohong Guan
2011Poster: collaborative policy administration.
Weili Han, Zheran Fang, Weifeng Chen, Wenyuan Xu, Chang Lei
2011Poster: control-flow integrity for smartphones.
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
2011Poster: fast, automatic iPhone shoulder surfing.
Stefano Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero
2011Poster: inference attacks against searchable encryption protocols.
Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu
2011Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Rishab Nithyanand, Radu Sion, John Solis
2011Poster: mimicry attacks against wireless link signature.
Yao Liu, Peng Ning
2011Poster: on quantitative information flow metrics.
Ji Zhu, Mudhakar Srivatsa
2011Poster: on trust evaluation with missing information in reputation systems.
Xi Gong, Ting Yu, Adam J. Lee
2011Poster: online spam filtering in social networks.
Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary
2011Poster: practical embedded remote attestation using physically unclonable functions.
Ünal Koçabas, Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz
2011Poster: preliminary analysis of Google+'s privacy.
Shah Mahmood, Yvo Desmedt
2011Poster: privacy-preserving profile similarity computation in online social networks.
Arjan Jeckmans, Qiang Tang, Pieter H. Hartel
2011Poster: protecting information in systems of systems.
Daniel Trivellato, Nicola Zannone, Sandro Etalle
2011Poster: recoverable botnets: a hybrid C&C approach.
Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu
2011Poster: shaping network topology for privacy and performance.
Nayantara Mallesh, Matthew K. Wright
2011Poster: temporal attribute-based encryption in clouds.
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen
2011Poster: the quest for security against privilege escalation attacks on android.
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
2011Poster: towards attribute based group key management.
Mohamed Nabeel, Elisa Bertino
2011Poster: towards formal verification of DIFC policies.
Zhi Yang, Lihua Yin, Miyi Duan, Shuyuan Jin
2011Poster: trans-organizational role-based access control.
Ramon Francisco Pacquiao Mejia, Yuichi Kaji, Hiroyuki Seki
2011Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configuration.
Ben Niu, Gang Tan
2011Poster: using quantified risk and benefit to strengthen the security of information sharing.
Weili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen
2011Practical PIR for electronic commerce.
Ryan Henry, Femi G. Olumofin, Ian Goldberg
2011Practical delegation of computation using multiple servers.
Ran Canetti, Ben Riva, Guy N. Rothblum
2011Predictive mitigation of timing channels in interactive systems.
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
2011Privacy and accountability for location-based aggregate statistics.
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li
2011Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011
Yan Chen, George Danezis, Vitaly Shmatikov
2011Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu
2011Proofs of ownership in remote storage systems.
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
2011Protecting consumer privacy from electric load monitoring.
Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello
2011Reflections on the evolution of internet threats: the growing imperative for a cyber secure society.
Farnam Jahanian
2011SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
Prateek Saxena, David Molnar, Benjamin Livshits
2011SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms.
Ahmed M. Azab, Peng Ning, Xiaolan Zhang
2011SURF: detecting and measuring search poisoning.
Long Lu, Roberto Perdisci, Wenke Lee
2011Sedic: privacy-aware data intensive computing on hybrid clouds.
Kehuan Zhang, Xiao-yong Zhou, Yangyi Chen, Xiaofeng Wang, Yaoping Ruan
2011Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov
2011Televisions, video privacy, and powerline electromagnetic interference.
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel
2011Text-based CAPTCHA strengths and weaknesses.
Elie Bursztein, Matthieu Martin, John C. Mitchell
2011The power of procrastination: detection and mitigation of execution-stalling malicious code.
Clemens Kolbitsch, Engin Kirda, Christopher Kruegel
2011These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall
2011Trace equivalence decision: negative tests and non-determinism.
Vincent Cheval, Hubert Comon-Lundh, Stéphanie Delaune
2011Trust-based anonymous communication: adversary models and routing algorithms.
Aaron Johnson, Paul F. Syverson, Roger Dingledine, Nick Mathewson
2011Unicorn: two-factor attestation for data security.
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, David Lie
2011VIPER: verifying the integrity of PERipherals' firmware.
Yanlin Li, Jonathan M. McCune, Adrian Perrig
2011VMCrypt: modular software architecture for scalable secure computation.
Lior Malka
2011WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction.
Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan
2011iSpy: automatic reconstruction of typed input from compromising reflections.
Rahul Raguram, Andrew M. White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm