default search action
23. ACSAC 2007: Miami Beach, Florida, USA
- 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA. IEEE Computer Society 2007, ISBN 0-7695-3060-5
Distinguished Practitioner
- Richard A. Kemmerer:
So You Think You Can Dance? 3-17
Operating Systems Security and Trusted Computing
- Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick D. McDaniel:
Establishing and Sustaining System Integrity via Root of Trust Installation. 19-29 - Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan:
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. 30-39 - Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin:
Toward a Medium-Robustness Separation Kernel Protection Profile. 40-51
Malware and Intrusion Detection
- Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis. 53-63 - Mengjun Xie, Zhenyu Wu, Haining Wang:
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. 64-73 - Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna:
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. 74-85
Database Security
- Kevin S. Killourhy, Roy A. Maxion:
Toward Realistic and Artifact-Free Insider-Threat Data. 87-96 - Meng Yu, Wanyu Zang, Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks. 97-106 - Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama:
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. 107-117
Applied Cryptography
- Carlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny:
Closed-Circuit Unobservable Voice over IP. 119-128 - Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis:
SSARES: Secure Searchable Automated Remote Email Storage. 129-139
Misuse Detection and Forensics
- Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu:
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask). 141-150 - Michael Meier, Ulrich Flegel, Sebastian Schmerl:
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. 151-160 - David Whyte, Paul C. van Oorschot, Evangelos Kranakis:
Tracking Darkports for Network Defense. 161-171
Invited Essayist
- Daniel J. Weitzner:
Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks. 173-175
Classic Paper
- Brian Randell, John M. Rushby:
Distributed Secure Systems: Then and Now. 177-199
Access Control
- Phillip L. Hellewell, Kent E. Seamons:
Extensible Pre-authentication Kerberos. 201-210 - Manigandan Radhakrishnan, Jon A. Solworth:
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP. 211-220 - Enriquillo Valdez, Reiner Sailer, Ronald Perez:
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control. 221-231
Wireless and Mobile Systems Security
- Iulia Ion, Boris Dragovic, Bruno Crispo:
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. 233-242 - Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Brian Rivera, Kelvin Marcus, Peter Kruus:
Countering False Accusations and Collusion in the Detection of In-Band Wormholes. 243-256 - Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. 257-267
Security Engineering
- Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara:
Security Usability Principles for Vulnerability Analysis and Risk Assessment. 269-278 - Jeff Yan, Ahmad Salah El Ahmad:
Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms. 279-291 - Paolina Centonze, Robert J. Flynn, Marco Pistoia:
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. 292-303
Security in P2P Systems
- Nathan S. Evans, Chris GauthierDickey, Christian Grothoff:
Routing in the Dark: Pitch Black. 305-314 - Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani Thuraisingham:
Centralized Security Labels in Decentralized P2P Networks. 315-324 - David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee:
A Taxonomy of Botnet Structures. 325-339
Distributed Systems Security
- Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins:
An Overview of the Annex System. 341-352 - Baris Coskun, Nasir D. Memon:
Efficient Detection of Delay-Constrained Relay Nodes. 353-362 - Ashish Gehani, Ulf Lindqvist:
Bonsai: Balanced Lineage Authentication. 363-373
Software and Applications Security
- Martin Szydlowski, Christopher Kruegel, Engin Kirda:
Secure Input for Web Applications. 375-384 - Bryan D. Payne, Wenke Lee:
Secure and Flexible Monitoring of Virtual Machines. 385-397 - Wei Li, Tzi-cker Chiueh:
Automated Format String Attack Prevention for Win32/X86 Binaries. 398-409
Malware
- Qinghua Zhang, Douglas S. Reeves:
MetaAware: Identifying Metamorphic Malware. 411-420 - Andreas Moser, Christopher Kruegel, Engin Kirda:
Limits of Static Analysis for Malware Detection. 421-430 - Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha:
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. 431-441
Assurance
- Boniface Hicks, Tim Misiak, Patrick D. McDaniel:
Channels: Runtime System Infrastructure for Security-Typed Languages. 443-452 - Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang:
Automated Security Debugging Using Program Structural Constraints. 453-462 - Deepak Chandra, Michael Franz:
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine. 463-475
Software Security
- Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou:
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. 477-486 - Asia Slowinska, Herbert Bos:
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. 487-500 - Kevin Borders, Atul Prakash, Mark Zielinski:
Spector: Automatically Analyzing Shell Code. 501-514
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.