default search action
ACM Transactions on Privacy and Security, Volume 21
Volume 21, Number 1, January 2018
- AbdelRahman Abdou, Paul C. van Oorschot:
Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication. 1:1-1:26 - Hao Shi, Jelena Mirkovic, Abdulla Alwabel:
Handling Anti-Virtual Machine Techniques in Malicious Software. 2:1-2:31 - Neil Zhenqiang Gong, Bin Liu:
Attribute Inference Attacks in Online Social Networks. 3:1-3:30 - Marcus Botacin, Paulo Lício de Geus, André Grégio:
Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging. 4:1-4:30 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Utilizing Performance Counters for Compromising Public Key Ciphers. 5:1-5:31
Volume 21, Number 2, February 2018
- Yihua Zhang, Marina Blanton, Ghada Almashaqbeh:
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler. 6:1-6:34 - Benny Pinkas, Thomas Schneider, Michael Zohner:
Scalable Private Set Intersection Based on OT Extension. 7:1-7:35 - Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. 8:1-8:34 - Roberto Giacobazzi, Isabella Mastroeni:
Abstract Non-Interference: A Unifying Framework for Weakening Information-flow. 9:1-9:31 - Yunmok Son, Juhwan Noh, Jaeyeong Choi, Yongdae Kim:
GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes. 10:1-10:25
Volume 21, Number 3, June 2018
- Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero:
Security Evaluation of a Banking Fraud Analysis System. 11:1-11:31 - Florian Kelbert, Alexander Pretschner:
Data Usage Control for Distributed Systems. 12:1-12:32 - Elizabeth Stobert, Robert Biddle:
The Password Life Cycle. 13:1-13:32 - Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. 14:1-14:32 - Siqi Zhao, Xuhua Ding:
FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems. 15:1-15:30
Volume 21, Number 4, October 2018
- Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. 16:1-16:28 - Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. 17:1-17:30 - Fanny Lalonde Lévesque, Sonia Chiasson, Anil Somayaji, José M. Fernandez:
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. 18:1-18:30 - Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam J. Aviv, Zheng Wang:
A Video-based Attack for Android Pattern Lock. 19:1-19:31 - Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz:
Verifiable Graph Processing. 20:1-20:23
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.