


default search action
SysSec@DIMVA 2011: Amsterdam, The Netherlands
- First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011. IEEE 2011, ISBN 978-1-4577-1528-0
- Wei Ming Khoo, Pietro Lio'
:
Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families. 3-10 - George Noseevich, Andrew Petukhov:
Detecting Insufficient Access Control in Web Applications. 11-18 - Fernand Lone Sang, Vincent Nicomette, Yves Deswarte
:
I/O Attacks in Intel PC-based Architectures and Countermeasures. 19-26 - Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis:
CAPTCHuring Automated (Smart) Phone Attacks. 27-34 - Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis:
Outsourcing Malicious Infrastructure to the Cloud. 35-42 - Naveed Ahmed, Christian Damsgaard Jensen
:
Demarcation of Security in Authentication Protocols. 43-50 - Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou
, Anup K. Ghosh, Dawson R. Engler, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. 53-56 - Christian Grothoff:
The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. 57-58 - Spyros K. Kollias, Vasileios Vlachos
, Alexandros Papanikolaou
, Vassilis Assimakopoulos:
Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data. 59-62 - Markus Wehner, Sven Zeisberg, Alexis Olivereau, Nouha Oualha, Laura Gheorghe, Emil Slusanschi
, Basil Hess, Felix von Reischach, Mike Ludwig, David Bateman:
A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security Project. 63-66 - Magnus Almgren
, Zhang Fu, Erland Jonsson, Pierre Kleberger
, Andreas Larsson, Farnaz Moradi, Tomas Olovsson, Marina Papatriantafilou
, L. Pirzadeh, Philippas Tsigas
:
Mapping Systems Security Research at Chalmers. 67-70 - Zinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen:
Exploring the Landscape of Cybercrime. 71-74 - Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth:
CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap. 75-78 - Dennis Gamayunov
:
Towards Malware-Resistant Networking Environment. 79-82 - Xenofontas A. Dimitropoulos:
Research Roadmap on Security Measurements. 83-85 - Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frederic Tronel, Valérie Viet Triem Tong:
From SSIR to CIDre: A New Security Research Group in Rennes, France. 86-89 - James Clarke, Neeraj Suri
, Michel Riguidel, Aljosa Pasic
:
Building a Long Term Strategy for International Collaboration in Trustworthy ICT: Security, Privacy and Trust in Global Networks and Services. 90-93 - Jeff Yan:
System Security Research at Newcastle. 94-95 - Piotr Kijewski, Adam Kozakiewicz:
Security Research at NASK: Supporting the Operational Needs of a CERT Team and More. 96-99 - Kiril Boyanov:
The Security Aspects of the Research Activities in IICT-BAS. 100-102 - Adam Lackorzynski, Alexander Warg:
Less is More - A Secure Microkernel-Based Operating System. 103-106 - Konrad Rieck:
Computer Security and Machine Learning: Worst Enemies or Best Friends? 107-110 - Herbert Bos
, Lorenzo Cavallaro
, Andrew S. Tanenbaum:
Systems Security at VU University Amsterdam. 111-114 - Marco Cova:
System Security Research at Birmingham: Current Status and Some Future Work. 115-118 - Simha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August:
The SPARCHS Project: Hardware Support for Software Security. 119-122 - Birhanu Eshete
, Adolfo Villafiorita
, Komminist Weldemariam:
Malicious Website Detection: Effectiveness and Efficiency Issues. 123-126 - Federico Maggi
, Stefano Zanero
:
Systems Security Research at Politecnico di Milano. 127-130 - Thorsten Holz
:
Systems Security Research at Ruhr-University Bochum. 131-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.