default search action
Digital Threats: Research and Practice, Volume 1
Volume 1, Number 1, March 2020
- Arun Lakhotia, Leigh Metcalf:
Digital Threats: Research and Practice Inaugural Issue Editorial. 1:1-1:3 - Andrew Cormack, Jeroen van der Ham:
Introduction to the FIRST Special Issue. 2:1-2:3 - François Durvaux, Marc Durvaux:
SCA-Pitaya: A Practical and Affordable Side-Channel Attack Setup for Power Leakage-Based Evaluations. 3:1-3:16 - Olivier van der Toorn, Anna Sperotto:
Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats. 4:1-4:13 - Chin-Wei Tien, Shang-Wen Chen, Tao Ban, Sy-Yen Kuo:
Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features. 5:1-5:19 - Jan Kohlrausch, Eugene A. Brin:
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness. 6:1-6:21 - Desiree Sacher:
Fingerpointing False Positives: How to Better Integrate Continuous Improvement into Security Monitoring. 7:1-7:7
Volume 1, Number 2, June 2020
- Louis Waked, Mohammad Mannan, Amr M. Youssef:
The Sorry State of TLS Security in Enterprise Interception Appliances. 8:1-8:26 - Diksha Shukla, Partha Pratim Kundu, Ravichandra Malapati, Sujit Poudel, Zhanpeng Jin, Vir V. Phoha:
Thinking Unveiled: An Inference and Correlation Model to Attack EEG Biometrics. 9:1-9:29 - Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Gaurav Somani, Akka Zemmari, Manoj Singh Gaur:
Vulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. 10:1-10:25 - Mark Yep-Kui Chua, George O. M. Yee, Yuan Xiang Gu, Chung-Horng Lung:
Threats to Online Advertising and Countermeasures: A Technical Survey. 11:1-11:27 - Xinyi Zhou, Atishay Jain, Vir V. Phoha, Reza Zafarani:
Fake News Early Detection: A Theory-driven Model. 12:1-12:25 - Matthijs R. Koot:
Field Note on CVE-2019-11510: Pulse Connect Secure SSL-VPN in the Netherlands. 13:1-13:7
Volume 1, Number 3, September 2020
- Renée Burton:
Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks. 14:1-14:26 - Daniel Scofield, Craig Miles, Stephen Kuhn:
Automated Model Learning for Accurate Detection of Malicious Digital Documents. 15:1-15:21 - Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti:
Malware Triage for Early Identification of Advanced Persistent Threat Activities. 16:1-16:17 - Antonín Steinhauser, Petr Tuma:
Database Traffic Interception for Graybox Detection of Stored and Context-sensitive XSS. 17:1-17:23 - Robert S. Gutzwiller, Josiah Dykstra, Bryan D. Payne:
Gaps and Opportunities in Situational Awareness for Cybersecurity. 18:1-18:6
Volume 1, Number 4, December 2020
- Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:
Introduction to the ACSAC'19 Special Issue - Part 1. 19e:1-19e:3 - Ioannis Agadakos, Nicholas DeMarinis, Di Jin, Kent Williams-King, Jearson Alfajardo, Benjamin Shteinfeld, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis:
Large-scale Debloating of Binary Shared Libraries. 19:1-19:28 - Tapti Palit, Fabian Monrose, Michalis Polychronakis:
Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data. 20:1-20:26 - Ronny Chevalier, David Plaquin, Chris I. Dalton, Guillaume Hiet:
Intrusion Survivability for Commodity Operating Systems. 21:1-21:30 - Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
Securing Applications against Side-channel Attacks through Resource Access Veto. 22:1-22:29 - Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones. 23:1-23:29 - Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos:
Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing. 24:1-24:24 - Martin Ukrop, Lydia Kraus, Vashek Matyas:
Will You Trust This TLS Certificate?: Perceptions of People Working in IT (Extended Version). 25:1-25:29
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.