default search action
Search dblp for Publications
export results for "stream:conf/acsac:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/acsac/0021ZCPTLY23, author = {Yu Zheng and Qizhi Zhang and Sherman S. M. Chow and Yuxiang Peng and Sijun Tan and Lichun Li and Shan Yin}, title = {Secure Softmax/Sigmoid for Machine-learning Computation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {463--476}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627175}, doi = {10.1145/3627106.3627175}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/0021ZCPTLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaiSZWCCR23, author = {Jianli Bai and Xiangfu Song and Xiaowu Zhang and Qifan Wang and Shujie Cui and Ee{-}Chien Chang and Giovanni Russello}, title = {Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {799--813}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627131}, doi = {10.1145/3627106.3627131}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaiSZWCCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BriongosKSW23, author = {Samira Briongos and Ghassan Karame and Claudio Soriente and Annika Wilde}, title = {No Forking Way: Detecting Cloning Attacks on Intel {SGX} Applications}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {744--758}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627187}, doi = {10.1145/3627106.3627187}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BriongosKSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CarboneriGKP23, author = {Alberto Carboneri and Mohammad Ghasemisharif and Soroush Karami and Jason Polakis}, title = {When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {44--55}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627186}, doi = {10.1145/3627106.3627186}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CarboneriGKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CastilloRF0S23, author = {Jorge Castillo and Phillip Rieger and Hossein Fereidooni and Qian Chen and Ahmad{-}Reza Sadeghi}, title = {{FLEDGE:} Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {647--661}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627194}, doi = {10.1145/3627106.3627194}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CastilloRF0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chen00ZJL23, author = {Joann Qiongna Chen and Tianhao Wang and Zhikun Zhang and Yang Zhang and Somesh Jha and Zhou Li}, title = {Differentially Private Resource Allocation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {772--786}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627181}, doi = {10.1145/3627106.3627181}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Chen00ZJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenAC23, author = {Yufan Chen and Arjun Arunasalam and Z. Berkay Celik}, title = {Can Large Language Models Provide Security {\&} Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {366--378}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627196}, doi = {10.1145/3627106.3627196}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChiAR23, author = {Andrew Chi and Blake Anderson and Michael K. Reiter}, title = {Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {550--564}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627180}, doi = {10.1145/3627106.3627180}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChiAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChiEM23, author = {Andrew Chi and Brandon Enright and David A. McGrew}, title = {Detecting Weak Keys in Manufacturing Certificates: {A} Case Study}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {759--771}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627120}, doi = {10.1145/3627106.3627120}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChiEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CuiM23, author = {Bo Cui and Tianyu Mei}, title = {{ABFL:} {A} Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {636--646}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627121}, doi = {10.1145/3627106.3627121}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CuiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DengHW23, author = {Zeyu Deng and Long Huang and Chen Wang}, title = {Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {451--462}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627195}, doi = {10.1145/3627106.3627195}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DengHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DinaS023, author = {Ayesha S. Dina and A. B. Siddique and D. Manivannan}, title = {{FS3:} Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {138--149}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627193}, doi = {10.1145/3627106.3627193}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DinaS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EckelGGK23, author = {Michael Eckel and Dominik Roy George and Bj{\"{o}}rn Grohmann and Christoph Krau{\ss}}, title = {Remote Attestation with Constrained Disclosure}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {718--731}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627118}, doi = {10.1145/3627106.3627118}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EckelGGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FranzenWG23, author = {Fabian Franzen and Andreas Chris Wilhelmer and Jens Grossklags}, title = {RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {677--690}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627197}, doi = {10.1145/3627106.3627197}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FranzenWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GanzIHR23, author = {Tom Ganz and Erik Imgrund and Martin H{\"{a}}rterich and Konrad Rieck}, title = {{PAVUDI:} Patch-based Vulnerability Discovery using Machine Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {704--717}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627188}, doi = {10.1145/3627106.3627188}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GanzIHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GerettoHGBKG23, author = {Elia Geretto and Julius Hohnerlein and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe and Klaus von Gleissenthall}, title = {Triereme: Speeding up hybrid fuzzing through efficient query scheduling}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {56--70}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627173}, doi = {10.1145/3627106.3627173}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GerettoHGBKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InnocentiGOMCK23, author = {Tommaso Innocenti and Matteo Golinelli and Kaan Onarlioglu and Seyed Ali Mirheidari and Bruno Crispo and Engin Kirda}, title = {OAuth 2.0 Redirect {URI} Validation Falls Short, Literally}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {256--267}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627140}, doi = {10.1145/3627106.3627140}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/InnocentiGOMCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KaplanLGQ23, author = {Berkay Kaplan and Israel J. Lopez{-}Toledo and Carl A. Gunter and Jingyu Qian}, title = {A Tagging Solution to Discover IoT Devices in Apartments}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {205--215}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627108}, doi = {10.1145/3627106.3627108}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KaplanLGQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KernKH23, author = {Dustin Kern and Christoph Krau{\ss} and Matthias Hollick}, title = {Detection of Anomalies in Electric Vehicle Charging Sessions}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {298--309}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627127}, doi = {10.1145/3627106.3627127}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KernKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KoideFN023, author = {Takashi Koide and Naoki Fukushi and Hiroki Nakano and Daiki Chiba}, title = {PhishReplicant: {A} Language Model-based Approach to Detect Generated Squatting Domain Names}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {1--13}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627111}, doi = {10.1145/3627106.3627111}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KoideFN023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KotziasRPSB23, author = {Platon Kotzias and Kevin A. Roundy and Michalis Pachilakis and Iskander S{\'{a}}nchez{-}Rola and Leyla Bilge}, title = {Scamdog Millionaire: Detecting E-commerce Scams in the Wild}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {29--43}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627184}, doi = {10.1145/3627106.3627184}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KotziasRPSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LadisaPRMB23, author = {Piergiorgio Ladisa and Serena Elisa Ponta and Nicola Ronzoni and Matias Martinez and Olivier Barais}, title = {On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {71--82}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627138}, doi = {10.1145/3627106.3627138}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LadisaPRMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiGL0LXX23, author = {Sijia Li and Gaopeng Gou and Chang Liu and Gang Xiong and Zhen Li and Junchao Xiao and Xinyu Xing}, title = {{TGC:} Transaction Graph Contrast Network for Ethereum Phishing Scam Detection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {352--365}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627109}, doi = {10.1145/3627106.3627109}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiGL0LXX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiLG23, author = {Fabing Li and Xiang Li and Mingyu Gao}, title = {Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {621--635}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627145}, doi = {10.1145/3627106.3627145}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuJLLWL23, author = {Xinyu Liu and Ze Jin and Jiaxi Liu and Wei Liu and Xiaoxi Wang and Qixu Liu}, title = {ANDetect: {A} Third-party Ad Network Libraries Detection Framework for Android Applications}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {98--112}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627182}, doi = {10.1145/3627106.3627182}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiuJLLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuZM23, author = {Zihao Liu and Yan Zhang and Chenglin Miao}, title = {Protecting Your Voice from Speech Synthesis Attacks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {394--408}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627183}, doi = {10.1145/3627106.3627183}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiuZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaarSRGM23, author = {Lukas Maar and Martin Schwarzl and Fabian Rauscher and Daniel Gruss and Stefan Mangard}, title = {{DOPE:} DOmain Protection Enforcement with {PKS}}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {662--676}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627113}, doi = {10.1145/3627106.3627113}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaarSRGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MahmudKC0TM23, author = {Farabi Mahmud and Sungkeun Kim and Harpreet Singh Chawla and Eun Jung Kim and Chia{-}Che Tsai and Abdullah Muzahid}, title = {Attack of the Knights: Non Uniform Cache Side Channel Attack}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {691--703}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627199}, doi = {10.1145/3627106.3627199}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MahmudKC0TM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MengYZGDC0Z23, author = {Jie Meng and Zeyu Yang and Zhenyong Zhang and Yangyang Geng and Ruilong Deng and Peng Cheng and Jiming Chen and Jianying Zhou}, title = {SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {310--323}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627179}, doi = {10.1145/3627106.3627179}, timestamp = {Tue, 09 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MengYZGDC0Z23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MirianHSV23, author = {Ariana Mirian and Grant Ho and Stefan Savage and Geoffrey M. Voelker}, title = {An Empirical Analysis of Enterprise-Wide Mandatory Password Updates}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {150--162}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627198}, doi = {10.1145/3627106.3627198}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MirianHSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MooreKC23, author = {Marina Moore and Trishank Karthik Kuppusamy and Justin Cappos}, title = {Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {83--97}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627129}, doi = {10.1145/3627106.3627129}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MooreKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuraliJSZJ0023, author = {Srinivasan Murali and Wenqiang Jin and Vighnesh Sivaraman and Huadi Zhu and Tianxi Ji and Pan Li and Ming Li}, title = {Continuous Authentication Using Human-Induced Electric Potential}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {409--423}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627124}, doi = {10.1145/3627106.3627124}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuraliJSZJ0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NarayananCRABYF23, author = {Vikram Narayanan and Cl{\'{a}}udio Carvalho and Angelo Ruocco and Gheorghe Alm{\'{a}}si and James Bottomley and Mengmei Ye and Tobin Feldman{-}Fitzthum and Daniele Buono and Hubertus Franke and Anton Burtsev}, title = {Remote attestation of confidential VMs using ephemeral vTPMs}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {732--743}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627112}, doi = {10.1145/3627106.3627112}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NarayananCRABYF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NichollsKL23, author = {Jack Nicholls and Aditya Kuppa and Nhien{-}An Le{-}Khac}, title = {FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {324--336}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627200}, doi = {10.1145/3627106.3627200}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NichollsKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OchoaVTB23, author = {Mart{\'{\i}}n Ochoa and Hern{\'{a}}n Vanegas and Jorge Toro{-}Pozo and David A. Basin}, title = {SealClub: Computer-aided Paper Document Authentication}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {163--177}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627176}, doi = {10.1145/3627106.3627176}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OchoaVTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkAWMGKN23, author = {Seonhye Park and Alsharif Abuadbba and Shuo Wang and Kristen Moore and Yansong Gao and Hyoungshick Kim and Surya Nepal}, title = {DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {535--549}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627204}, doi = {10.1145/3627106.3627204}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ParkAWMGKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Plappert023, author = {Christian Plappert and Andreas Fuchs}, title = {Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {268--282}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627135}, doi = {10.1145/3627106.3627135}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Plappert023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Plappert023a, author = {Christian Plappert and Andreas Fuchs}, title = {Secure and Lightweight {ECU} Attestations for Resilient Over-the-Air Updates in Connected Vehicles}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {283--297}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627202}, doi = {10.1145/3627106.3627202}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Plappert023a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Pourbemany023, author = {Jafar Pourbemany and Ye Zhu}, title = {Cross Body Signal Pairing {(CBSP):} {A} Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {424--438}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627185}, doi = {10.1145/3627106.3627185}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Pourbemany023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PutzMMS23, author = {Philipp P{\"{u}}tz and Richard Mitev and Markus Miettinen and Ahmad{-}Reza Sadeghi}, title = {Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {190--204}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627133}, doi = {10.1145/3627106.3627133}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PutzMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/QuiringMR23, author = {Erwin Quiring and Andreas M{\"{u}}ller and Konrad Rieck}, title = {On the Detection of Image-Scaling Attacks in Machine Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {506--520}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627134}, doi = {10.1145/3627106.3627134}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/QuiringMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SaeifSG23, author = {Saeif Alhazbi and Savio Sciancalepore and Gabriele Oligeri}, title = {The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {439--450}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627192}, doi = {10.1145/3627106.3627192}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SaeifSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SebastianDCSB23, author = {Silvia Sebasti{\'{a}}n and Raluca{-}Georgia Diugan and Juan Caballero and Iskander S{\'{a}}nchez{-}Rola and Leyla Bilge}, title = {Domain and Website Attribution beyond {WHOIS}}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {124--137}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627190}, doi = {10.1145/3627106.3627190}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SebastianDCSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SeeG0K23, author = {Richard August See and Maximilian Gehring and Mathias Fischer and Shankar Karuppayah}, title = {Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {594--608}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627139}, doi = {10.1145/3627106.3627139}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SeeG0K23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SeonghunRB23, author = {Son Seonghun and Debopriya Roy Dipta and Berk G{\"{u}}lmezoglu}, title = {DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {379--393}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627191}, doi = {10.1145/3627106.3627191}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SeonghunRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SeveriBOHKM23, author = {Giorgio Severi and Simona Boboila and Alina Oprea and John T. Holodnak and Kendra Kratkiewicz and Jason Matterer}, title = {Poisoning Network Flow Classifiers}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {337--351}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627123}, doi = {10.1145/3627106.3627123}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SeveriBOHKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShaonRK23, author = {Fahad Shaon and Sazzadur Rahaman and Murat Kantarcioglu}, title = {The Queen's Guard: {A} Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {241--255}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627132}, doi = {10.1145/3627106.3627132}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShaonRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StivalaAMGFP23, author = {Giada Stivala and Sahar Abdelnabi and Andrea Mengascini and Mariano Graziano and Mario Fritz and Giancarlo Pellegrino}, title = {From Attachments to {SEO:} Click Here to Learn More about Clickbait PDFs!}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {14--28}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627172}, doi = {10.1145/3627106.3627172}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StivalaAMGFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TanX0023, author = {Mingtian Tan and Xiaofei Xie and Jun Sun and Tianhao Wang}, title = {Mitigating Membership Inference Attacks via Weighted Smoothing}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {787--798}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627189}, doi = {10.1145/3627106.3627189}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TanX0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TedeschiSP23, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {178--189}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627174}, doi = {10.1145/3627106.3627174}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TedeschiSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TekgulA23, author = {Buse G. A. Tekgul and N. Asokan}, title = {{FLARE:} Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {492--505}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627128}, doi = {10.1145/3627106.3627128}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TekgulA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangGWZLG023, author = {Ke Wang and Jianbo Gao and Qiao Wang and Jiashuo Zhang and Yue Li and Zhi Guan and Zhong Chen}, title = {Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {216--228}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627110}, doi = {10.1145/3627106.3627110}, timestamp = {Wed, 01 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangGWZLG023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangW23, author = {Xiuling Wang and Wendy Hui Wang}, title = {Link Membership Inference Attacks against Unsupervised Graph Representation Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {477--491}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627115}, doi = {10.1145/3627106.3627115}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeeksCAKYV23, author = {Connor Weeks and Aravind Cheruvu and Sifat Muhammad Abdullah and Shravya Kanchi and Daphne Yao and Bimal Viswanath}, title = {A First Look at Toxicity Injection Attacks on Open-domain Chatbots}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {521--534}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627122}, doi = {10.1145/3627106.3627122}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeeksCAKYV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuZHJDCX23, author = {Shaowen Xu and Qihang Zhou and Heqing Huang and Xiaoqi Jia and Haichao Du and Yang Chen and Yamin Xie}, title = {Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {229--240}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627137}, doi = {10.1145/3627106.3627137}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuZHJDCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YoonCK23, author = {DaeGeun Yoon and Taejoong Chung and Yongdae Kim}, title = {Delegation of {TLS} Authentication to CDNs using Revocable Delegated Credentials}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {113--123}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627144}, doi = {10.1145/3627106.3627144}, timestamp = {Sat, 17 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YoonCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhanBLHZGP23, author = {Dazhi Zhan and Wei Bai and Xin Liu and Yue Hu and Lei Zhang and Shize Guo and Zhisong Pan}, title = {PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {580--593}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627178}, doi = {10.1145/3627106.3627178}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhanBLHZGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangDNBBS23, author = {Yizhe Zhang and Hongying Dong and Alastair Nottingham and Molly Buchanan and Donald E. Brown and Yixin Sun}, title = {Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {565--579}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627126}, doi = {10.1145/3627106.3627126}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangDNBBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhuangZTLWZ023, author = {Xirong Zhuang and Lan Zhang and Chen Tang and Huiqi Liu and Bin Wang and Yan Zheng and Bo Ren}, title = {DeepContract: Controllable Authorization of Deep Learning Models}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {609--620}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627107}, doi = {10.1145/3627106.3627107}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhuangZTLWZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2023, title = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106}, doi = {10.1145/3627106}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0001YKD022, author = {Zheng Yang and Chao Yin and Junming Ke and Tien Tuan Anh Dinh and Jianying Zhou}, title = {If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {727--741}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567983}, doi = {10.1145/3564625.3567983}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/0001YKD022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0004GR22, author = {Markus Bauer and Ilya Grishchenko and Christian Rossow}, title = {TyPro: Forward {CFI} for C-Style Indirect Function Calls Using Type Propagation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {346--360}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564627}, doi = {10.1145/3564625.3564627}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/0004GR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0022X00LH22, author = {Ning Wang and Yang Xiao and Yimin Chen and Ning Zhang and Wenjing Lou and Y. Thomas Hou}, title = {Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {647--657}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564652}, doi = {10.1145/3564625.3564652}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/0022X00LH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AhnAKP22, author = {Sunwoo Ahn and Seonggwan Ahn and Hyungjoon Koo and Yunheung Paek}, title = {Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {361--374}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567975}, doi = {10.1145/3564625.3567975}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AhnAKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AnwarCHSKO22, author = {Afsah Anwar and Yi Hui Chen and Roy Hodgman and Tom Sellers and Engin Kirda and Alina Oprea}, title = {A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {251--266}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564649}, doi = {10.1145/3564625.3564649}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AnwarCHSKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ApruzzeseCY22, author = {Giovanni Apruzzese and Mauro Conti and Ying Yuan}, title = {SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {171--185}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567980}, doi = {10.1145/3564625.3567980}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ApruzzeseCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaeB0P22, author = {Yechan Bae and Sarbartha Banerjee and Sangho Lee and Marcus Peinado}, title = {Spacelord: Private and Secure Smart Space Sharing}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {427--439}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564637}, doi = {10.1145/3564625.3564637}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaeB0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaruaPF22, author = {Anomadarshi Barua and Lelin Pan and Mohammad Abdullah Al Faruque}, title = {BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {440--454}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564638}, doi = {10.1145/3564625.3564638}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaruaPF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BitsikasP22, author = {Evangelos Bitsikas and Christina P{\"{o}}pper}, title = {You have been warned: Abusing 5G's Warning and Emergency Systems}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {561--575}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3568000}, doi = {10.1145/3564625.3568000}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BitsikasP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BuchholzAWNK22, author = {Erik Buchholz and Alsharif Abuadbba and Shuo Wang and Surya Nepal and Salil Subhash Kanhere}, title = {Reconstruction Attack on Differential Private Trajectory Protection Mechanisms}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {279--292}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564628}, doi = {10.1145/3564625.3564628}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BuchholzAWNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoL0H22, author = {Ying Cao and Ruigang Liang and Kai Chen and Peiwei Hu}, title = {Boosting Neural Networks to Decompile Optimized Binaries}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {508--518}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567998}, doi = {10.1145/3564625.3567998}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CaoL0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChehTC22, author = {Carmen Cheh and Nicholas Tay and Binbin Chen}, title = {From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {400--411}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564654}, doi = {10.1145/3564625.3564654}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChehTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CsikorRL22, author = {Levente Csikor and Sriram Ramachandran and Anantharaman Lakshminarayanan}, title = {ZeroDNS: Towards Better Zero Trust Security using {DNS}}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {699--713}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567968}, doi = {10.1145/3564625.3567968}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CsikorRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DaiHXZX022, author = {Xiaohai Dai and Liping Huang and Jiang Xiao and Zhaonan Zhang and Xia Xie and Hai Jin}, title = {Trebiz: Byzantine Fault Tolerance with Byzantine Merchants}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {923--935}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567976}, doi = {10.1145/3564625.3567976}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DaiHXZX022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DiaoZZK22, author = {Yufeng Diao and Yichi Zhang and Guodong Zhao and Mohamed Khamis}, title = {Drone Authentication via Acoustic Fingerprint}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {658--668}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564653}, doi = {10.1145/3564625.3564653}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DiaoZZK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DiptaG22, author = {Debopriya Roy Dipta and Berk G{\"{u}}lmezoglu}, title = {{DF-SCA:} Dynamic Frequency Side Channel Attacks are Practical}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {841--853}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567979}, doi = {10.1145/3564625.3567979}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DiptaG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ErbaT22, author = {Alessandro Erba and Nils Ole Tippenhauer}, title = {Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {412--426}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564633}, doi = {10.1145/3564625.3564633}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ErbaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FainchteinAS22, author = {Rahel A. Fainchtein and Adam J. Aviv and Micah Sherr}, title = {User Perceptions of the Privacy and Usability of Smart {DNS}}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {591--604}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567978}, doi = {10.1145/3564625.3567978}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FainchteinAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FangLGB22, author = {Minghong Fang and Jia Liu and Neil Zhenqiang Gong and Elizabeth S. Bentley}, title = {AFLGuard: Byzantine-robust Asynchronous Federated Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {632--646}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567991}, doi = {10.1145/3564625.3567991}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FangLGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FaulkenberryAMA22, author = {Aaron Faulkenberry and Athanasios Avgetidis and Zane Ma and Omar Alrawi and Charles Lever and Panagiotis Kintis and Fabian Monrose and Angelos D. Keromytis and Manos Antonakakis}, title = {View from Above: Exploring the Malware Ecosystem from the Upper {DNS} Hierarchy}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {240--250}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564646}, doi = {10.1145/3564625.3564646}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FaulkenberryAMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GerettoGBK22, author = {Elia Geretto and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe}, title = {Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {375--387}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564639}, doi = {10.1145/3564625.3564639}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GerettoGBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Gong0BSSX0HF22, author = {Chen Gong and Zhou Yang and Yunpeng Bai and Jieke Shi and Arunesh Sinha and Bowen Xu and David Lo and Xinwen Hou and Guoliang Fan}, title = {Curiosity-Driven and Victim-Aware Adversarial Policies}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {186--200}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564636}, doi = {10.1145/3564625.3564636}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Gong0BSSX0HF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Gotte0022, author = {Jan Sebastian G{\"{o}}tte and Liran Katzir and Bj{\"{o}}rn Scheuermann}, title = {Ripples in the Pond: Transmitting Information through Grid Frequency Modulation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {455--466}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564640}, doi = {10.1145/3564625.3564640}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Gotte0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuoWZZ22, author = {Yinggang Guo and Zicheng Wang and Bingnan Zhong and Qingkai Zeng}, title = {Formal Modeling and Security Analysis for Intra-level Privilege Separation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {88--101}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567984}, doi = {10.1145/3564625.3567984}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuoWZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuptaDSVKK22, author = {Rajat Gupta and Lukas Patrick Dresel and Noah Spahn and Giovanni Vigna and Christopher Kruegel and Taesoo Kim}, title = {{POPKORN:} Popping Windows Kernel Drivers At Scale}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {854--868}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564631}, doi = {10.1145/3564625.3564631}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuptaDSVKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HaydariCZMP22, author = {Ammar Haydari and Chen{-}Nee Chuah and H. Michael Zhang and Jane MacFarlane and Sean Peisert}, title = {Differentially Private Map Matching for Mobility Trajectories}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {293--303}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567974}, doi = {10.1145/3564625.3567974}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HaydariCZMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HeoGJK0PKSL22, author = {Jeongyoon Heo and Sangwon Gil and Youngman Jung and Jinmok Kim and Donguk Kim and Woojin Park and Yongdae Kim and Kang G. Shin and Choong{-}Hoon Lee}, title = {Are There Wireless Hidden Cameras Spying on Me?}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {714--726}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564632}, doi = {10.1145/3564625.3564632}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HeoGJK0PKSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InamGLMMG0H22, author = {Muhammad Adil Inam and Akul Goyal and Jason Liu and Jaron Mink and Noor Michael and Sneha Gaur and Adam Bates and Wajih Ul Hassan}, title = {FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {813--826}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567990}, doi = {10.1145/3564625.3567990}, timestamp = {Mon, 29 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/InamGLMMG0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KleinMBKJ22, author = {David Klein and Marius Musch and Thomas Barber and Moritz Kopmann and Martin Johns}, title = {Accept All Exploits: Exploring the Security Impact of Cookie Banners}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {911--922}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564647}, doi = {10.1145/3564625.3564647}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KleinMBKJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KoikeKYK22, author = {Yuki Koike and Hiroyuki Katsura and Hiromu Yakura and Yuma Kurogome}, title = {{SLOPT:} Bandit Optimization Framework for Mutation-Based Fuzzing}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {519--533}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564659}, doi = {10.1145/3564625.3564659}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KoikeKYK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LandenCIMWL22, author = {Matthew Landen and Key{-}whan Chung and Moses Ike and Sarah Mackay and Jean{-}Paul Watson and Wenke Lee}, title = {{DRAGON:} Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {13--27}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567969}, doi = {10.1145/3564625.3567969}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LandenCIMWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Lang0MLWL22, author = {Fan Lang and Wei Wang and Lingjia Meng and Jingqiang Lin and Qiongxiao Wang and Linli Lu}, title = {MoLE: Mitigation of Side-channel Attacks against {SGX} via Dynamic Data Location Escape}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {978--988}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3568002}, doi = {10.1145/3564625.3568002}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Lang0MLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Li0LZML22, author = {Wenqing Li and Shijie Jia and Limin Liu and Fangyu Zheng and Yuan Ma and Jingqiang Lin}, title = {CryptoGo: Automatic Detection of Go Cryptographic {API} Misuses}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {318--331}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567989}, doi = {10.1145/3564625.3567989}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Li0LZML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiCXBL22, author = {Yong{-}Gang Li and Yeh{-}Ching Chung and Jinbiao Xing and Yu Bao and Guoyuan Lin}, title = {MProbe: Make the code probing meaningless}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {214--226}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567967}, doi = {10.1145/3564625.3567967}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiCXBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuSSJM22, author = {Yushan Liu and Xiaokui Shu and Yixin Sun and Jiyong Jang and Prateek Mittal}, title = {{RAPID:} Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {827--840}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567997}, doi = {10.1145/3564625.3567997}, timestamp = {Sat, 28 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiuSSJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuoXX22, author = {Yu Luo and Weifeng Xu and Dianxiang Xu}, title = {Compact Abstract Graphs for Detecting Code Vulnerability with {GNN} Models}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {497--507}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564655}, doi = {10.1145/3564625.3564655}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuoXX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaRE22, author = {Xinshu Ma and Florentin Rochet and Tariq Elahi}, title = {Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {132--145}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567996}, doi = {10.1145/3564625.3567996}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaRE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MahmudETEOS22, author = {Samin Yaseer Mahmud and K. Virgil English and Seaver Thorn and William Enck and Adam Oest and Muhammad Saad}, title = {Analysis of Payment Service Provider SDKs in Android}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {576--590}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564641}, doi = {10.1145/3564625.3564641}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MahmudETEOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MansouriOJ22, author = {Mohamad Mansouri and Melek {\"{O}}nen and Wafa Ben Jaballah}, title = {Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {146--158}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3568135}, doi = {10.1145/3564625.3568135}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MansouriOJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MatteiMKV22, author = {James Mattei and Madeline McLaughlin and Samantha Katcher and Daniel Votipka}, title = {A Qualitative Evaluation of Reverse Engineering Tool Usability}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {619--631}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567993}, doi = {10.1145/3564625.3567993}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MatteiMKV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MiaoXLLMD22, author = {Yinbin Miao and Rongpeng Xie and Xinghua Li and Ximeng Liu and Zhuo Ma and Robert H. Deng}, title = {Compressed Federated Learning Based on Adaptive Local Differential Privacy}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {159--170}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567973}, doi = {10.1145/3564625.3567973}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MiaoXLLMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NaHKS22, author = {Seung Ho Na and Hyeong Gwon Hong and Junmo Kim and Seungwon Shin}, title = {Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {332--345}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564657}, doi = {10.1145/3564625.3564657}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NaHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Oh0QKL22, author = {ChangSeok Oh and Sangho Lee and Chenxiong Qian and Hyungjoon Koo and Wenke Lee}, title = {DeView: Confining Progressive Web Applications by Debloating Web APIs}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {881--895}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567987}, doi = {10.1145/3564625.3567987}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Oh0QKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PecholtW22, author = {Joana Pecholt and Sascha Wessel}, title = {CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {989--998}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564648}, doi = {10.1145/3564625.3564648}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PecholtW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Picazo-SanchezE22, author = {Pablo Picazo{-}Sanchez and Benjamin Eriksson and Andrei Sabelfeld}, title = {No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {896--910}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567988}, doi = {10.1145/3564625.3567988}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Picazo-SanchezE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RenWLLVL0C22, author = {Qian Ren and Yingjun Wu and Han Liu and Yue Li and Anne Victor and Hong Lei and Lei Wang and Bangdao Chen}, title = {Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {117--131}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567995}, doi = {10.1145/3564625.3567995}, timestamp = {Wed, 01 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RenWLLVL0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SabryS22, author = {Moe Sabry and Reza Samavi}, title = {ArchiveSafe {LT:} Secure Long-term Archiving System}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {936--948}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564635}, doi = {10.1145/3564625.3564635}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SabryS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SathayeNR22, author = {Harshad Sathaye and Guevara Noubir and Aanjhan Ranganathan}, title = {On the Implications of Spoofing and Jamming Aviation Datalink Applications}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {548--560}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564651}, doi = {10.1145/3564625.3564651}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SathayeNR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SciancaleporeG22, author = {Savio Sciancalepore and Dominik Roy George}, title = {Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {1--12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564626}, doi = {10.1145/3564625.3564626}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SciancaleporeG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SeoKMYPLSK22, author = {Minjae Seo and Jaehan Kim and Eduard Marin and Myoungsung You and Taejune Park and Seungsoo Lee and Seungwon Shin and Jinwoo Kim}, title = {Heimdallr: Fingerprinting {SD-WAN} Control-Plane Architecture via Encrypted Control Traffic}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {949--963}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564642}, doi = {10.1145/3564625.3564642}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SeoKMYPLSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenDC22, author = {Zhuojia Shen and Komail Dharsee and John Criswell}, title = {Randezvous: Making Randomization Effective on MCUs}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {28--41}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567970}, doi = {10.1145/3564625.3567970}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShenDC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenZWB22, author = {Liyue Shen and Yanjun Zhang and Jingwei Wang and Guangdong Bai}, title = {Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {201--213}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564658}, doi = {10.1145/3564625.3564658}, timestamp = {Wed, 28 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ShenZWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SrinivasaPV22, author = {Shreyas Srinivasa and Jens Myrup Pedersen and Emmanouil Vasilomanolakis}, title = {Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {742--755}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564645}, doi = {10.1145/3564625.3564645}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SrinivasaPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SrivastavaNHBP22, author = {Prashast Srivastava and Stefan Nagy and Matthew Hicks and Antonio Bianchi and Mathias Payer}, title = {One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {388--399}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564643}, doi = {10.1145/3564625.3564643}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SrivastavaNHBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SultanaZZZMCCZS22, author = {Nik Sultana and Henry Zhu and Ke Zhong and Zhilei Zheng and Ruijie Mao and Digvijaysinh Chauhan and Stephen Carrasquillo and Junyong Zhao and Lei Shi and Nikos Vasilakis and Boon Thau Loo}, title = {Towards Practical Application-level Support for Privilege Separation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {71--87}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564664}, doi = {10.1145/3564625.3564664}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SultanaZZZMCCZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ThapaJACPN22, author = {Chandra Thapa and Seung Ick Jang and Muhammad Ejaz Ahmed and Seyit Camtepe and Josef Pieprzyk and Surya Nepal}, title = {Transformer-Based Language Models for Software Vulnerability Detection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {481--496}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567985}, doi = {10.1145/3564625.3567985}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ThapaJACPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ToffaliniP0C22, author = {Flavio Toffalini and Mathias Payer and Jianying Zhou and Lorenzo Cavallaro}, title = {Designing a Provenance Analysis for {SGX} Enclaves}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {102--116}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567994}, doi = {10.1145/3564625.3567994}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ToffaliniP0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Wang22, author = {Xian Wang}, title = {ENIDrift: {A} Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {785--798}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567992}, doi = {10.1145/3564625.3567992}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Wang22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangHXG22, author = {Yizhuo Wang and Yikun Hu and Xuangan Xiao and Dawu Gu}, title = {iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {964--977}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3568001}, doi = {10.1145/3564625.3568001}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangHXG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangLHWYC22, author = {Xutong Wang and Chaoge Liu and Xiaohui Hu and Zhi Wang and Jie Yin and Xiang Cui}, title = {Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {267--278}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564661}, doi = {10.1145/3564625.3564661}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangLHWYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangYLMHX0Y22, author = {Xiaolei Wang and Lin Yang and Dongyang Li and Linru Ma and Yongzhong He and Junchao Xiao and Jiyuan Liu and Yuexiang Yang}, title = {{MADDC:} Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {769--784}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567972}, doi = {10.1145/3564625.3567972}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangYLMHX0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Wu0C22, author = {Bingkun Wu and Weizhi Meng and Wei{-}Yang Chiu}, title = {Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {799--812}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564656}, doi = {10.1145/3564625.3564656}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Wu0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WuMCFLA22, author = {Xiaoyuan Wu and Collins W. Munyendo and Eddie Cosic and Genevieve A. Flynn and Olivia Legault and Adam J. Aviv}, title = {User Perceptions of Five-Word Passwords}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {605--618}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567981}, doi = {10.1145/3564625.3567981}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WuMCFLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuWKLP22, author = {Jing Xu and Rui Wang and Stefanos Koffas and Kaitai Liang and Stjepan Picek}, title = {More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {684--698}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567999}, doi = {10.1145/3564625.3567999}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XuWKLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuWRWV22, author = {Nuo Xu and Binghui Wang and Ran Ran and Wujie Wen and Parv Venkitasubramaniam}, title = {NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {669--683}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567986}, doi = {10.1145/3564625.3567986}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuWRWV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanWJYSW22, author = {Jia Yan and Ming Wan and Xiangkun Jia and Lingyun Ying and Purui Su and Zhanyi Wang}, title = {DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {227--239}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567982}, doi = {10.1145/3564625.3567982}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YanWJYSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangSXLWZQY022, author = {Yutian Yang and Wenbo Shen and Xun Xie and Kangjie Lu and Mingsen Wang and Tianyu Zhou and Chenggang Qin and Wang Yu and Kui Ren}, title = {Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {869--880}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564634}, doi = {10.1145/3564625.3564634}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangSXLWZQY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZangrandiEBSAC22, author = {Luca Morgese Zangrandi and Thijs van Ede and Tim M. Booij and Savio Sciancalepore and Luca Allodi and Andrea Continella}, title = {Stepping out of the {MUD:} Contextual threat information for IoT devices with manufacturer-provided behavior profiles}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {467--480}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564644}, doi = {10.1145/3564625.3564644}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZangrandiEBSAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Zhang0T00CZ22, author = {Qifan Zhang and Junjie Shen and Mingtian Tan and Zhe Zhou and Zhou Li and Qi Alfred Chen and Haipeng Zhang}, title = {Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {56--70}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567977}, doi = {10.1145/3564625.3567977}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Zhang0T00CZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangYYZ022, author = {Zhechang Zhang and Bin Yuan and Kehan Yang and Deqing Zou and Hai Jin}, title = {StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {756--768}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564650}, doi = {10.1145/3564625.3564650}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangYYZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhaoWZCY22, author = {Yiru Zhao and Xiaoke Wang and Lei Zhao and Yueqiang Cheng and Heng Yin}, title = {Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {534--547}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564660}, doi = {10.1145/3564625.3564660}, timestamp = {Wed, 31 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhaoWZCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhdanovaUHZHH22, author = {Maria Zhdanova and Julian Urbansky and Anne Hagemeier and Daniel Zelle and Isabelle Herrmann and Dorian H{\"{o}}ffner}, title = {Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {42--55}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3568136}, doi = {10.1145/3564625.3568136}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhdanovaUHZHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhengHSXZ22, author = {Jieyu Zheng and Feng He and Shiyu Shen and Chenxi Xue and Yunlei Zhao}, title = {Parallel Small Polynomial Multiplication for Dilithium: {A} Faster Design and Implementation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {304--317}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564629}, doi = {10.1145/3564625.3564629}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhengHSXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2022, title = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625}, doi = {10.1145/3564625}, isbn = {978-1-4503-9759-9}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0001JNLD021, author = {Zheng Yang and Chenglu Jin and Jianting Ning and Zengpeng Li and Anh Dinh and Jianying Zhou}, title = {Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {497--512}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488009}, doi = {10.1145/3485832.3488009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/0001JNLD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AbidiKS21, author = {Ismi Abidi and Vireshwar Kumar and Rijurekha Sen}, title = {Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {323--336}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485909}, doi = {10.1145/3485832.3485909}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AbidiKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AmichE21, author = {Abderrahmen Amich and Birhanu Eshete}, title = {Morphence: Moving Target Defense Against Adversarial Examples}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {61--75}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485899}, doi = {10.1145/3485832.3485899}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AmichE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AndalibiDKLC21, author = {Vafa Andalibi and Jayati Dev and DongInn Kim and Eliot Lear and L. Jean Camp}, title = {Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description {(MUD)}}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {337--348}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485879}, doi = {10.1145/3485832.3485879}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AndalibiDKLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BanescuVGAP21, author = {Sebastian Banescu and Samuel Valenzuela and Marius Guggenmos and Mohsen Ahmadvand and Alexander Pretschner}, title = {Dynamic Taint Analysis versus Obfuscated Self-Checking}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {182--193}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485926}, doi = {10.1145/3485832.3485926}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BanescuVGAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BehniaY21, author = {Rouzbeh Behnia and Attila Altay Yavuz}, title = {Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {119--130}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488023}, doi = {10.1145/3485832.3488023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BehniaY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BitsikasP21, author = {Evangelos Bitsikas and Christina P{\"{o}}pper}, title = {Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {900--915}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485914}, doi = {10.1145/3485832.3485914}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BitsikasP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chen0C0MSW021, author = {Xiaoyi Chen and Ahmed Salem and Dingfan Chen and Michael Backes and Shiqing Ma and Qingni Shen and Zhonghai Wu and Yang Zhang}, title = {BadNL: Backdoor Attacks against {NLP} Models with Semantic-preserving Improvements}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {554--569}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485837}, doi = {10.1145/3485832.3485837}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Chen0C0MSW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChowLZJ21, author = {Sherman S. M. Chow and Ming Li and Yongjun Zhao and Wenqiang Jin}, title = {Sipster: Settling {IOU} Privately and Quickly with Smart Meters}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {219--234}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488029}, doi = {10.1145/3485832.3488029}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChowLZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Cronin0WC21, author = {Patrick Cronin and Xing Gao and Haining Wang and Chase Cotton}, title = {An Exploration of {ARM} System-Level Cache and {GPU} Side Channels}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {784--795}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485902}, doi = {10.1145/3485832.3485902}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Cronin0WC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DaiS21, author = {Tianxiang Dai and Haya Schulmann}, title = {SMap: Internet-wide Scanning for Spoofing}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {1039--1050}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485917}, doi = {10.1145/3485832.3485917}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DaiS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DelshadtehraniC21, author = {Leila Delshadtehrani and Sadullah Canakci and William Blair and Manuel Egele and Ajay Joshi}, title = {FlexFilt: Towards Flexible Instruction Filtering for Security}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {646--659}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488019}, doi = {10.1145/3485832.3488019}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DelshadtehraniC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DemiccoEP21, author = {David Demicco and Rukayat Erinfolami and Aravind Prakash}, title = {Program Obfuscation via {ABI} Debiasing}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {146--157}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488017}, doi = {10.1145/3485832.3488017}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DemiccoEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EloulMM21, author = {Shaltiel Eloul and Sean J. Moran and Jacob Mendel}, title = {Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {761--772}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485913}, doi = {10.1145/3485832.3485913}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EloulMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FangSGLPCZLZS21, author = {Dongliang Fang and Zhanwei Song and Le Guan and Puzhuo Liu and Anni Peng and Kai Cheng and Yaowen Zheng and Peng Liu and Hongsong Zhu and Limin Sun}, title = {ICS3Fuzzer: {A} Framework for Discovering Protocol Implementation Bugs in {ICS} Supervisory Software by Fuzzing}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {849--860}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488028}, doi = {10.1145/3485832.3488028}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FangSGLPCZLZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoDC21, author = {Mingyuan Gao and Hung Dang and Ee{-}Chien Chang}, title = {{TEEKAP:} Self-Expiring Data Capsule using Trusted Execution Environment}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {235--247}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485919}, doi = {10.1145/3485832.3485919}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GazdagGGHL21, author = {Stefan{-}Lukas Gazdag and Sophia Grundner{-}Culemann and Tobias Guggemos and Tobias Heider and Daniel Loebenberger}, title = {A formal analysis of IKEv2's post-quantum extension}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {91--105}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485885}, doi = {10.1145/3485832.3485885}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GazdagGGHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GhorbaniMZPNC21, author = {Mohammad Mahdi Ghorbani and Fereydoun Farrahi Moghaddam and Mengyuan Zhang and Makan Pourzandi and Kim Khoa Nguyen and Mohamed Cheriet}, title = {DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {837--848}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485907}, doi = {10.1145/3485832.3485907}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GhorbaniMZPNC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuanXGLCL21, author = {Zhong Guan and Gang Xiong and Gaopeng Gou and Zhen Li and Mingxin Cui and Chang Liu}, title = {{BAPM:} Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {248--259}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485891}, doi = {10.1145/3485832.3485891}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuanXGLCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HanRT21, author = {Yufei Han and Kevin Alejandro Roundy and Acar Tamersoy}, title = {Towards Stalkerware Detection with Precise Warnings}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {957--969}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485901}, doi = {10.1145/3485832.3485901}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HanRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HaoLXC021, author = {Meng Hao and Hongwei Li and Guowen Xu and Hanxiao Chen and Tianwei Zhang}, title = {Efficient, Private and Robust Federated Learning}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {45--60}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488014}, doi = {10.1145/3485832.3488014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HaoLXC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HetzeltRBMS21, author = {Felicitas Hetzelt and Martin Radev and Robert Buhren and Mathias Morbitzer and Jean{-}Pierre Seifert}, title = {{VIA:} Analyzing Device Interfaces of Protected Virtual Machines}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {273--284}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488011}, doi = {10.1145/3485832.3488011}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HetzeltRBMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HongWL21, author = {Hyunji Hong and Seunghoon Woo and Heejo Lee}, title = {Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {194--206}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488026}, doi = {10.1145/3485832.3488026}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HongWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Hu021, author = {Hailong Hu and Jun Pang}, title = {Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {1--16}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485838}, doi = {10.1145/3485832.3485838}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Hu021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuaOJFP21, author = {Baojian Hua and Wanrong Ouyang and Chengman Jiang and Qiliang Fan and Zhizhong Pan}, title = {Rupair: Towards Automatic Buffer Overflow Detection and Rectification for Rust}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {812--823}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485841}, doi = {10.1145/3485832.3485841}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuaOJFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KaneiHSA21, author = {Fumihiro Kanei and Ayako Akiyama Hasegawa and Eitaro Shioji and Mitsuaki Akiyama}, title = {A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {349--364}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485922}, doi = {10.1145/3485832.3485922}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KaneiHSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KangKLK21, author = {Honggoo Kang and Yonghwi Kwon and Sangjin Lee and Hyungjoon Koo}, title = {SoftMark: Software Watermarking via a Binary Function Relocation}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {169--181}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488027}, doi = {10.1145/3485832.3488027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KangKLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KhanWYD021, author = {Sojhal Ismail Khan and Dominika C. Woszczyk and Chengzeng You and Soteris Demetriou and Muhammad Naveed}, title = {Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {944--956}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485888}, doi = {10.1145/3485832.3485888}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KhanWYD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KianiALLL21, author = {Sohaib Kiani and Sana Awan and Chao Lan and Fengjun Li and Bo Luo}, title = {Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {31--44}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485904}, doi = {10.1145/3485832.3485904}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KianiALLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimK21, author = {Beom Heyn Kim and Hyoungshick Kim}, title = {Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {285--296}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485886}, doi = {10.1145/3485832.3485886}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KimK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiourtiLRSJ21, author = {Panagiota Kiourti and Wenchao Li and Anirban Roy and Karan Sikka and Susmit Jha}, title = {{MISA:} Online Defense of Trojaned Models using Misattributions}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {570--585}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485908}, doi = {10.1145/3485832.3485908}, timestamp = {Mon, 05 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KiourtiLRSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KohlerLB0M21, author = {Sebastian K{\"{o}}hler and Giulio Lovisotto and Simon Birnbach and Richard Baker and Ivan Martinovic}, title = {They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in {CMOS} Image Sensors}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {399--413}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488016}, doi = {10.1145/3485832.3488016}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KohlerLB0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KooPK21, author = {Hyungjoon Koo and Soyeon Park and Taesoo Kim}, title = {A Look Back on a Function Identification Problem}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {158--168}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488018}, doi = {10.1145/3485832.3488018}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KooPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KuhnapfelPNSRW21, author = {Niclas K{\"{u}}hnapfel and Stefan Preu{\ss}ler and Maximilian Noppel and Thomas Schneider and Konrad Rieck and Christian Wressnegger}, title = {LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {796--811}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485911}, doi = {10.1145/3485832.3485911}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KuhnapfelPNSRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeELPQJZB21, author = {Tuan Le and Sriharsha Etigowni and Sizhuang Liang and Xirui Peng and H. Jerry Qi and Mehdi Javanmard and Saman A. Zonouz and Raheem Beyah}, title = {Physical Logic Bombs in 3D Printers via Emerging 4D Techniques}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {732--747}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485880}, doi = {10.1145/3485832.3485880}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LeELPQJZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeuKRC21, author = {Patrick Leu and Martin Kotuliak and Marc Roeschlin and Srdjan Capkun}, title = {Security of Multicarrier Time-of-Flight Ranging}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {887--899}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485898}, doi = {10.1145/3485832.3485898}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeuKRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiQCLX21, author = {Deqiang Li and Tian Qiu and Shuo Chen and Qianmu Li and Shouhuai Xu}, title = {Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {596--608}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485916}, doi = {10.1145/3485832.3485916}, timestamp = {Sat, 30 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiQCLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiZG021, author = {Zecheng Li and Yu Zhou and Songtao Guo and Bin Xiao}, title = {SolSaviour: {A} Defending Framework for Deployed Defective Smart Contracts}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {748--760}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488015}, doi = {10.1145/3485832.3488015}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiZG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiZWLC21, author = {Mengyuan Li and Yinqian Zhang and Huibo Wang and Kang Li and Yueqiang Cheng}, title = {{TLB} Poisoning Attacks on {AMD} Secure Encrypted Virtualization}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {609--619}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485876}, doi = {10.1145/3485832.3485876}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiZWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Liu0LLDS21, author = {Mingxuan Liu and Yiming Zhang and Baojun Liu and Zhou Li and Haixin Duan and Donghong Sun}, title = {Detecting and Characterizing {SMS} Spearphishing Attacks}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {930--943}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488012}, doi = {10.1145/3485832.3488012}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Liu0LLDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuDH21, author = {Duo Lu and Yuli Deng and Dijiang Huang}, title = {Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {468--481}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485906}, doi = {10.1145/3485832.3485906}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuFX21, author = {Xiaofeng Lu and Zhenhan Feng and Jupeng Xia}, title = {An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {365--374}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485895}, doi = {10.1145/3485832.3485895}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuFX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Luo0YZW21, author = {Lannan Luo and Qiang Zeng and Bokai Yang and Fei Zuo and Junzhe Wang}, title = {Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {982--995}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488022}, doi = {10.1145/3485832.3488022}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Luo0YZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaHL21, author = {Huanyu Ma and Shuai Han and Hao Lei}, title = {Optimized Paillier's Cryptosystem with Fast Encryption and Decryption}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {106--118}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485842}, doi = {10.1145/3485832.3485842}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MarsonAAMK21, author = {Giorgia Azzurra Marson and S{\'{e}}bastien Andreina and Lorenzo Alluminio and Konstantin Munichev and Ghassan Karame}, title = {Mitosis: Practically Scaling Permissioned Blockchains}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {773--783}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485915}, doi = {10.1145/3485832.3485915}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MarsonAAMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MoukarzelH21, author = {Michael Moukarzel and Matthew Hicks}, title = {RingRAM: {A} Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {660--674}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485905}, doi = {10.1145/3485832.3485905}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MoukarzelH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Munch0Y21, author = {Jean{-}Pierre M{\"{u}}nch and Thomas Schneider and Hossein Yalame}, title = {{VASA:} Vector {AES} Instructions for Security Applications}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {131--145}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485897}, doi = {10.1145/3485832.3485897}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Munch0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NezhadH21, author = {Mahshid Mehr Nezhad and Feng Hao}, title = {OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {375--384}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485887}, doi = {10.1145/3485832.3485887}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NezhadH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OeschGR21, author = {Sean Oesch and Anuj Gautam and Scott Ruoti}, title = {The Emperor's New Autofill Framework: {A} Security Analysis of Autofill on iOS and Android}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {996--1010}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485884}, doi = {10.1145/3485832.3485884}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/OeschGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PanZYY21, author = {Xudong Pan and Mi Zhang and Yifan Yan and Min Yang}, title = {Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {634--645}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485881}, doi = {10.1145/3485832.3485881}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PanZYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkJ021, author = {Namgyu Park and Sangwoo Ji and Jong Kim}, title = {Detecting Audio Adversarial Examples with Logit Noising}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {586--595}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485912}, doi = {10.1145/3485832.3485912}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkJ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkNNCS21, author = {Taejune Park and Jaehyun Nam and Seung Ho Na and Jaewoong Chung and Seungwon Shin}, title = {Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in {DPI}}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {620--633}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485878}, doi = {10.1145/3485832.3485878}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkNNCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PeseSLS21, author = {Mert D. Pes{\'{e}} and Jay W. Schauer and Junhui Li and Kang G. Shin}, title = {{S2-CAN:} Sufficiently Secure Controller Area Network}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {425--438}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485883}, doi = {10.1145/3485832.3485883}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PeseSLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Pham0MH21, author = {Duy{-}Phuc Pham and Damien Marion and Matthieu Mastio and Annelie Heuser}, title = {Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {706--719}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485894}, doi = {10.1145/3485832.3485894}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Pham0MH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PhamHTCT21, author = {Thai{-}Dien Pham and Thien{-}Lac Ho and Tram Truong Huu and Tien{-}Dung Cao and Hong Linh Truong}, title = {MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {1025--1038}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485925}, doi = {10.1145/3485832.3485925}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PhamHTCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RazaGLA21, author = {Muhammad Taqi Raza and Yunqi Guo and Songwu Lu and Fatima Muhammad Anwar}, title = {On Key Reinstallation Attacks over 4G {LTE} Control-Plane: Feasibility and Negative Impact}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {877--886}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485833}, doi = {10.1145/3485832.3485833}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RazaGLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RezaeiH21, author = {Fatemeh Rezaei and Amir Houmansadr}, title = {{FINN:} Fingerprinting Network Flows using Neural Networks}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {1011--1024}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488010}, doi = {10.1145/3485832.3488010}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RezaeiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RiveraMSOB21, author = {Elijah Rivera and Samuel Mergendahl and Howard E. Shrobe and Hamed Okhravi and Nathan Burow}, title = {Keeping Safe Rust Safe with Galeed}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {824--836}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485903}, doi = {10.1145/3485832.3485903}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RiveraMSOB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RocklPHMF21, author = {Jonas R{\"{o}}ckl and Mykolai Protsenko and Monika Huber and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Advanced System Resiliency Based on Virtualization Techniques for IoT Devices}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {455--467}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485836}, doi = {10.1145/3485832.3485836}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RocklPHMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RuggiaLVCM21, author = {Antonio Ruggia and Eleonora Losiouk and Luca Verderame and Mauro Conti and Alessio Merlo}, title = {Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {970--981}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488021}, doi = {10.1145/3485832.3488021}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RuggiaLVCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SajidWAAIDK21, author = {Md Sajidul Islam Sajid and Jinpeng Wei and Basel Abdeen and Ehab Al{-}Shaer and Md. Mazharul Islam and Walter Diong and Latifur Khan}, title = {{SODA:} {A} System for Cyber Deception Orchestration and Automation}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {675--689}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485918}, doi = {10.1145/3485832.3485918}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SajidWAAIDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SaniYBD21, author = {Abubakar Sadiq Sani and Dong Yuan and Elisa Bertino and Zhao Yang Dong}, title = {Crypto-Chain: {A} Relay Resilience Framework for Smart Vehicles}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {439--454}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485920}, doi = {10.1145/3485832.3485920}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SaniYBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianA21, author = {Maliheh Shirvanian and Shashank Agrawal}, title = {2D-2FA: {A} New Dimension in Two-Factor Authentication}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {482--496}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485910}, doi = {10.1145/3485832.3485910}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SimmonsDOR21, author = {James Simmons and Oumar Diallo and Sean Oesch and Scott Ruoti}, title = {Systematization of Password ManagerUse Cases and Design Paradigms}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {528--540}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485889}, doi = {10.1145/3485832.3485889}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SimmonsDOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SivakumaranB21, author = {Pallavi Sivakumaran and Jorge Blasco}, title = {argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped {ARM} Cortex-M Binaries}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {861--876}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488007}, doi = {10.1145/3485832.3488007}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SivakumaranB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SongC00021, author = {Qiyang Song and Jiahao Cao and Kun Sun and Qi Li and Ke Xu}, title = {Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {260--272}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485921}, doi = {10.1145/3485832.3485921}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SongC00021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StojkovskiLKR21, author = {Borce Stojkovski and Gabriele Lenzini and Vincent Koenig and Salvador Rivas}, title = {What's in a Cyber Threat Intelligence sharing platform?: {A} mixed-methods user experience investigation of {MISP}}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {385--398}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488030}, doi = {10.1145/3485832.3488030}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StojkovskiLKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Tan0021, author = {Mingtian Tan and Zhe Zhou and Zhou Li}, title = {The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {17--30}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485840}, doi = {10.1145/3485832.3485840}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Tan0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TedeschiSP21, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {{ARID:} Anonymous Remote IDentification of Unmanned Aerial Vehicles}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {207--218}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485834}, doi = {10.1145/3485832.3485834}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TedeschiSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UetzHHSH21, author = {Rafael Uetz and Christian Hemminghaus and Louis Hackl{\"{a}}nder and Philipp Schlipper and Martin Henze}, title = {Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {690--705}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488020}, doi = {10.1145/3485832.3488020}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/UetzHHSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WalkerS21, author = {Payton Walker and Nitesh Saxena}, title = {Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {414--424}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485896}, doi = {10.1145/3485832.3485896}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WalkerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiZGDFWLW21, author = {Rong Wei and Fangyu Zheng and Lili Gao and Jiankuo Dong and Guang Fan and Lipeng Wan and Jingqiang Lin and Yuewu Wang}, title = {Heterogeneous-PAKE: Bridging the Gap between {PAKE} Protocols and Their Real-World Deployment}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {76--90}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485877}, doi = {10.1145/3485832.3485877}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeiZGDFWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WuLNL21, author = {Yi Wu and Zhuohang Li and Nicholas Van Nostrand and Jian Liu}, title = {Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {916--929}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485839}, doi = {10.1145/3485832.3485839}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WuLNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangWLYLGLLLH21, author = {Zijie Yang and Binghui Wang and Haoran Li and Dong Yuan and Zhuotao Liu and Neil Zhenqiang Gong and Chang Liu and Qi Li and Xiao Liang and Shaofeng Hu}, title = {On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {297--310}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488013}, doi = {10.1145/3485832.3488013}, timestamp = {Sun, 27 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YangWLYLGLLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangL0ZTKM21, author = {Yumei Zhang and Xinzhi Liu and Cong Sun and Dongrui Zeng and Gang Tan and Xiao Kan and Siqi Ma}, title = {ReCFA: Resilient Control-Flow Attestation}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {311--322}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485900}, doi = {10.1145/3485832.3485900}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangL0ZTKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangWRZXH21, author = {Haodong Zhang and Chuanwang Wang and Wenqiang Ruan and Junjie Zhang and Ming Xu and Weili Han}, title = {Digit Semantics based Optimization for Practical Password Cracking Tools}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {513--527}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488025}, doi = {10.1145/3485832.3488025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangWRZXH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangWYCMZWLW21, author = {Shize Zhang and Zhiliang Wang and Jiahai Yang and Xin Cheng and Xiaoqian Ma and Hui Zhang and Bo Wang and Zimu Li and Jianping Wu}, title = {MineHunter: {A} Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {1051--1063}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485835}, doi = {10.1145/3485832.3485835}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangWYCMZWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangYF21, author = {Zhaohe John Zhang and Edwin Yang and Song Fang}, title = {CommanderGabble: {A} Universal Attack Against {ASR} Systems Leveraging Fast Speech}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {720--731}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485892}, doi = {10.1145/3485832.3485892}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangYT21, author = {Yihe Zhang and Xu Yuan and Nian{-}Feng Tzeng}, title = {Platform-Oblivious Anti-Spam Gateway}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {1064--1077}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488024}, doi = {10.1145/3485832.3488024}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangYT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhuWCLMIQCKSHLZ21, author = {Shitong Zhu and Zhongjie Wang and Xun Chen and Shasha Li and Keyu Man and Umar Iqbal and Zhiyun Qian and Kevin S. Chan and Srikanth V. Krishnamurthy and Zubair Shafiq and Yu Hao and Guoren Li and Zheng Zhang and Xiaochen Zou}, title = {Eluding ML-based Adblockers With Actionable Adversarial Examples}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {541--553}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488008}, doi = {10.1145/3485832.3488008}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhuWCLMIQCKSHLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2021, title = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832}, doi = {10.1145/3485832}, isbn = {978-1-4503-8579-4}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0001SMZGAKP20, author = {Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas E. Anderson and Arvind Krishnamurthy and Bryan Parno}, title = {Talek: Private Group Messaging with Hidden Access Patterns}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {84--99}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427231}, doi = {10.1145/3427228.3427231}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/0001SMZGAKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/0023LLWXL20, author = {Tao Liu and Zihao Liu and Qi Liu and Wujie Wen and Wenyao Xu and Ming Li}, title = {StegoNet: Turn Deep Neural Network into a Stegomalware}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {928--938}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427268}, doi = {10.1145/3427228.3427268}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/0023LLWXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlderBOP20, author = {Fritz Alder and Jo Van Bulck and David F. Oswald and Frank Piessens}, title = {Faulty Point Unit: {ABI} Poisoning Attacks on Intel {SGX}}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {415--427}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427270}, doi = {10.1145/3427228.3427270}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AlderBOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Ali-GombeTGR20, author = {Aisha I. Ali{-}Gombe and Alexandra Tambaoan and Angela Gurfolino and Golden G. Richard III}, title = {App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {28--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427244}, doi = {10.1145/3427228.3427244}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Ali-GombeTGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AliEDMY20, author = {Suzan Ali and Mounir Elgharabawy and Quentin Duchaussoy and Mohammad Mannan and Amr M. Youssef}, title = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {69--83}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427287}, doi = {10.1145/3427228.3427287}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AliEDMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AmmarC20, author = {Mahmoud Ammar and Bruno Crispo}, title = {Verify{\&}Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {717--732}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427253}, doi = {10.1145/3427228.3427253}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AmmarC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AndriamilantoAG20, author = {Nampoina Andriamilanto and Tristan Allard and Ga{\"{e}}tan Le Guelvouit}, title = {FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {627--642}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427297}, doi = {10.1145/3427228.3427297}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AndriamilantoAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BauerB20, author = {Luke A. Bauer and Vincent Bindschaedler}, title = {Towards Realistic Membership Inferences: The Case of Survey Data}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {116--128}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427282}, doi = {10.1145/3427228.3427282}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BauerB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BelyavskyBCRU20, author = {Dmitry Belyavsky and Billy Bob Brumley and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Luis Rivera{-}Zamarripa and Igor Ustinov}, title = {Set It and Forget It! Turnkey {ECC} for Instant Integration}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {760--771}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427291}, doi = {10.1145/3427228.3427291}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BelyavskyBCRU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BragaFS20, author = {Daniel De Almeida Braga and Pierre{-}Alain Fouque and Mohamed Sabt}, title = {Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {291--303}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427295}, doi = {10.1145/3427228.3427295}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BragaFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoGM020, author = {Chen Cao and Le Guan and Jiang Ming and Peng Liu}, title = {Device-agnostic Firmware Execution is Possible: {A} Concolic Execution Approach for Peripheral Emulation}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {746--759}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427280}, doi = {10.1145/3427228.3427280}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaoGM020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chinprutthiwong20, author = {Phakpoom Chinprutthiwong and Raj Vardhan and Guangliang Yang and Guofei Gu}, title = {Security Study of Service Worker Cross-Site Scripting}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {643--654}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427290}, doi = {10.1145/3427228.3427290}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Chinprutthiwong20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CozziVDSBB20, author = {Emanuele Cozzi and Pierre{-}Antoine Vervier and Matteo Dell'Amico and Yun Shen and Leyla Bilge and Davide Balzarotti}, title = {The Tangled Genealogy of IoT Malware}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {1--16}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427256}, doi = {10.1145/3427228.3427256}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CozziVDSBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DasJWAPM20, author = {Sanjeev Das and Kedrian James and Jan Werner and Manos Antonakakis and Michalis Polychronakis and Fabian Monrose}, title = {A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {345--359}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427269}, doi = {10.1145/3427228.3427269}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DasJWAPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DoanAR20, author = {Bao Gia Doan and Ehsan Abbasnejad and Damith C. Ranasinghe}, title = {Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {897--912}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427264}, doi = {10.1145/3427228.3427264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DoanAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DuYZDWH0020, author = {Kun Du and Hao Yang and Yubao Zhang and Haixin Duan and Haining Wang and Shuang Hao and Zhou Li and Min Yang}, title = {Understanding Promotion-as-a-Service on GitHub}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {597--610}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427258}, doi = {10.1145/3427228.3427258}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DuYZDWH0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ErbaTGPCZT20, author = {Alessandro Erba and Riccardo Taormina and Stefano Galelli and Marcello Pogliani and Michele Carminati and Stefano Zanero and Nils Ole Tippenhauer}, title = {Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {480--495}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427660}, doi = {10.1145/3427228.3427660}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ErbaTGPCZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FerrariCPZ20, author = {Dario Ferrari and Michele Carminati and Mario Polino and Stefano Zanero}, title = {NoSQL Breakdown: {A} Large-scale Analysis of Misconfigured NoSQL Services}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {567--581}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427260}, doi = {10.1145/3427228.3427260}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FerrariCPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FormanA20, author = {Timothy J. Forman and Adam J. Aviv}, title = {Double Patterns: {A} Usable Solution to Increase the Security of Android Unlock Patterns}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {219--233}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427252}, doi = {10.1145/3427228.3427252}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FormanA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GalhardoMBG20, author = {Carlos Cardoso Galhardo and Peter Mell and Irena Bojanova and Assane Gueye}, title = {Measurements of the Most Significant Software Security Weaknesses}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {154--164}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427257}, doi = {10.1145/3427228.3427257}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GalhardoMBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GreubelPK20, author = {Andr{\'{e}} Greubel and Steffen Pohl and Samuel Kounev}, title = {Quantifying measurement quality and load distribution in Tor}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {129--140}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427238}, doi = {10.1145/3427228.3427238}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GreubelPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GulerGGJOBGH20, author = {Emre G{\"{u}}ler and Philipp G{\"{o}}rz and Elia Geretto and Andrea Jemmett and Sebastian {\"{O}}sterlund and Herbert Bos and Cristiano Giuffrida and Thorsten Holz}, title = {Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {360--372}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427266}, doi = {10.1145/3427228.3427266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GulerGGJOBGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HassanLJ0ZWCLRG20, author = {Wajih Ul Hassan and Ding Li and Kangkook Jee and Xiao Yu and Kexuan Zou and Dawei Wang and Zhengzhang Chen and Zhichun Li and Junghwan Rhee and Jiaping Gui and Adam Bates}, title = {This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {165--178}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427255}, doi = {10.1145/3427228.3427255}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HassanLJ0ZWCLRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KaczmarczyckGIP20, author = {Fabian Kaczmarczyck and Bernhard Grill and Luca Invernizzi and Jennifer Pullman and Cecilia M. Procopiuc and David Tao and Borbala Benko and Elie Bursztein}, title = {Spotlight: Malware Lead Generation at Scale}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {17--27}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427273}, doi = {10.1145/3427228.3427273}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KaczmarczyckGIP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KhanCSA0K20, author = {Hassan Khan and Jason Ceci and Jonah Stegman and Adam J. Aviv and Rozita Dara and Ravi Kuber}, title = {Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: {A} Holistic View of {PIN} Authentication in Digital Lives and Beyond}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {249--262}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427240}, doi = {10.1145/3427228.3427240}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KhanCSA0K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimKKKJK20, author = {Mingeun Kim and Dongkwan Kim and Eunsoo Kim and Suryeon Kim and Yeongjin Jang and Yongdae Kim}, title = {FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {733--745}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427294}, doi = {10.1145/3427228.3427294}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KimKKKJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KuppaAL20, author = {Aditya Kuppa and Lamine M. Aouad and Nhien{-}An Le{-}Khac}, title = {Effect of Security Controls on Patching Window: {A} Causal Inference based Approach}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {556--566}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427271}, doi = {10.1145/3427228.3427271}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KuppaAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiaoWCHD20, author = {Song Liao and Christin Wilson and Long Cheng and Hongxin Hu and Huixing Deng}, title = {Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {856--869}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427250}, doi = {10.1145/3427228.3427250}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiaoWCHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LinTG20, author = {Yuhang Lin and Olufogorehan Tunde{-}Onadele and Xiaohui Gu}, title = {{CDL:} Classified Distributed Learning for Detecting Security Attacks in Containerized Applications}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {179--188}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427236}, doi = {10.1145/3427228.3427236}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LinTG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuthraCOHF20, author = {Aman Luthra and James Cavanaugh and Hugo Renzzo Oclese and Rina M. Hirsch and Xiang Fu}, title = {ZeroAUDIT}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {798--812}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427249}, doi = {10.1145/3427228.3427249}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LuthraCOHF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaLYLNB20, author = {Siqi Ma and Hehao Li and Wenbo Yang and Juanru Li and Surya Nepal and Elisa Bertino}, title = {Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {320--331}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427263}, doi = {10.1145/3427228.3427263}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaLYLNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MahdaviHKKLPSOK20, author = {Rasoul Akhavan Mahdavi and Thomas Humphries and Bailey Kacsmar and Simeon Krastnikov and Nils Lukas and John A. Premkumar and Masoumeh Shafieinejad and Simon Oya and Florian Kerschbaum and Erik{-}Oliver Blass}, title = {Practical Over-Threshold Multi-Party Private Set Intersection}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {772--783}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427267}, doi = {10.1145/3427228.3427267}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MahdaviHKKLPSOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MainardiSBP20, author = {Nicholas Mainardi and Davide Sampietro and Alessandro Barenghi and Gerardo Pelosi}, title = {Efficient Oblivious Substring Search via Architectural Support}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {526--541}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427296}, doi = {10.1145/3427228.3427296}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MainardiSBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MatsumotoBDOP20, author = {Stephanos Matsumoto and Jay Bosamiya and Yucheng Dai and Paul C. van Oorschot and Bryan Parno}, title = {{CAPS:} Smoothly Transitioning to a More Resilient Web {PKI}}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {655--668}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427284}, doi = {10.1145/3427228.3427284}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MatsumotoBDOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MichaelMLGH020, author = {Noor Michael and Jaron Mink and Jason Liu and Sneha Gaur and Wajih Ul Hassan and Adam Bates}, title = {On the Forensic Validity of Approximated Audit Logs}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {189--202}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427272}, doi = {10.1145/3427228.3427272}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MichaelMLGH020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MitevPMES20, author = {Richard Mitev and Anna Pazii and Markus Miettinen and William Enck and Ahmad{-}Reza Sadeghi}, title = {LeakyPick: IoT Audio Spy Detector}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {694--705}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427277}, doi = {10.1145/3427228.3427277}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MitevPMES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MunteanNLTG020, author = {Paul Muntean and Matthias Neumayer and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, title = {{\(\rho\)}FEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {466--479}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427246}, doi = {10.1145/3427228.3427246}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MunteanNLTG020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NguyenD0B20, author = {Duc Cuong Nguyen and Erik Derr and Michael Backes and Sven Bugiel}, title = {Up2Dep: Android Tool Support to Fix Insecure Code Dependencies}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {263--276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427658}, doi = {10.1145/3427228.3427658}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NguyenD0B20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OeschADKSWR20, author = {Sean Oesch and Ruba Abu{-}Salma and Oumar Diallo and Juliane Kr{\"{a}}mer and James Simmons and Justin Wu and Scott Ruoti}, title = {Understanding User Perceptions of Security and Privacy for Group Chat: {A} Survey of Users in the {US} and {UK}}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {234--248}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427275}, doi = {10.1145/3427228.3427275}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/OeschADKSWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Patrick-EvansCK20, author = {James Patrick{-}Evans and Lorenzo Cavallaro and Johannes Kinder}, title = {Probabilistic Naming of Functions in Stripped Binaries}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {373--385}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427265}, doi = {10.1145/3427228.3427265}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Patrick-EvansCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PennekampBLDXFB20, author = {Jan Pennekamp and Erik Buchholz and Yannik Lockner and Markus Dahlmanns and Tiandong Xi and Marcel Fey and Christian Brecher and Christian Hopmann and Klaus Wehrle}, title = {Privacy-Preserving Production Process Parameter Exchange}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {510--525}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427248}, doi = {10.1145/3427228.3427248}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PennekampBLDXFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PriyadarshanNS20, author = {Soumyakant Priyadarshan and Huan Nguyen and R. Sekar}, title = {Practical Fine-Grained Binary Code Randomization{\textdagger}}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {401--414}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427292}, doi = {10.1145/3427228.3427292}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PriyadarshanNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PuMWRV20, author = {Jiameng Pu and Neal Mangaokar and Bolun Wang and Chandan K. Reddy and Bimal Viswanath}, title = {NoiseScope: Detecting Deepfake Images in a Blind Setting}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {913--927}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427285}, doi = {10.1145/3427228.3427285}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PuMWRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RabadiT20, author = {Dima Rabadi and Sin G. Teo}, title = {Advanced Windows Methods on Malware Detection and Classification}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {54--68}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427242}, doi = {10.1145/3427228.3427242}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RabadiT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ReenR20, author = {Gaganjeet Singh Reen and Christian Rossow}, title = {DPIFuzz: {A} Differential Fuzzing Framework to Detect {DPI} Elusion Strategies for {QUIC}}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {332--344}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427662}, doi = {10.1145/3427228.3427662}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ReenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RosenbergSER20, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {611--626}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427230}, doi = {10.1145/3427228.3427230}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RosenbergSER20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RossoCGA20, author = {Martin Rosso and Michele Campobasso and Ganduulga Gankhuyag and Luca Allodi}, title = {{SAIBERSOC:} Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {141--153}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427233}, doi = {10.1145/3427228.3427233}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RossoCGA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SankaranD020, author = {Arnav Sankaran and Pubali Datta and Adam Bates}, title = {Workflow Integration Alleviates Identity and Access Management in Serverless Computing}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {496--509}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427665}, doi = {10.1145/3427228.3427665}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SankaranD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchonherrEZHK20, author = {Lea Sch{\"{o}}nherr and Thorsten Eisenhofer and Steffen Zeiler and Thorsten Holz and Dorothea Kolossa}, title = {Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {843--855}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427276}, doi = {10.1145/3427228.3427276}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchonherrEZHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SebastianC20, author = {Silvia Sebasti{\'{a}}n and Juan Caballero}, title = {AVclass2: Massive Malware Tag Extraction from {AV} Labels}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {42--53}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427261}, doi = {10.1145/3427228.3427261}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SebastianC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenD20, author = {Zekun Shen and Brendan Dolan{-}Gavitt}, title = {HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {454--465}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427645}, doi = {10.1145/3427228.3427645}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShenD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShiW0SW20, author = {Cong Shi and Yan Wang and Yingying Chen and Nitesh Saxena and Chen Wang}, title = {WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {829--842}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427259}, doi = {10.1145/3427228.3427259}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShiW0SW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianMSA20, author = {Maliheh Shirvanian and Manar Mohamed and Nitesh Saxena and S. Abhishek Anand}, title = {Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {870--883}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427289}, doi = {10.1145/3427228.3427289}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianMSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShresthaLS20, author = {Prakash Shrestha and Zengrui Liu and Nitesh Saxena}, title = {IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {706--716}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427279}, doi = {10.1145/3427228.3427279}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShresthaLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SuzakiTGM20, author = {Kuniyasu Suzaki and Akira Tsukamoto and Andy Green and Mohammad Mannan}, title = {Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {428--441}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427293}, doi = {10.1145/3427228.3427293}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SuzakiTGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TaiJHZDZ20, author = {Jianwei Tai and Xiaoqi Jia and Qingjia Huang and Weijuan Zhang and Haichao Du and Shengzhi Zhang}, title = {{SEEF-ALDR:} {A} Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {939--950}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427274}, doi = {10.1145/3427228.3427274}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TaiJHZDZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Thomasset020, author = {Corentin Thomasset and David Barrera}, title = {SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {542--555}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427235}, doi = {10.1145/3427228.3427235}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Thomasset020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TianLLS020, author = {Yangguang Tian and Nan Li and Yingjiu Li and Pawel Szalachowski and Jianying Zhou}, title = {Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {813--828}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427247}, doi = {10.1145/3427228.3427247}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TianLLS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UcciPLA20, author = {Daniele Ucci and Roberto Perdisci and Jaewoo Lee and Mustaque Ahamad}, title = {Towards a Practical Differentially Private Collaborative Phone Blacklisting System}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {100--115}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427239}, doi = {10.1145/3427228.3427239}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/UcciPLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WanS00H20, author = {Shengye Wan and Mingshen Sun and Kun Sun and Ning Zhang and Xu He}, title = {RusTEE: Developing Memory-Safe {ARM} TrustZone Applications}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {442--453}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427262}, doi = {10.1145/3427228.3427262}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WanS00H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WieflingDI20, author = {Stephan Wiefling and Markus D{\"{u}}rmuth and Luigi Lo Iacono}, title = {More Than Just Good Passwords? {A} Study on Usability and Security Perceptions of Risk-based Authentication}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {203--218}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427243}, doi = {10.1145/3427228.3427243}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WieflingDI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XiaoSZLH20, author = {Yang Xiao and Shanghao Shi and Ning Zhang and Wenjing Lou and Y. Thomas Hou}, title = {Session Key Distribution Made Practical for {CAN} and {CAN-FD} Message Authentication}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {681--693}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427278}, doi = {10.1145/3427228.3427278}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XiaoSZLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuD020, author = {Xuening Xu and Xiaojiang Du and Qiang Zeng}, title = {Attacking Graph-Based Classification without Changing Existing Connections}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {951--962}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427245}, doi = {10.1145/3427228.3427245}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XuD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuLRSXNY0D20, author = {Guowen Xu and Hongwei Li and Hao Ren and Jianfei Sun and Shengmin Xu and Jianting Ning and Haomiao Yang and Kan Yang and Robert H. Deng}, title = {Secure and Verifiable Inference in Deep Neural Networks}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {784--797}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427232}, doi = {10.1145/3427228.3427232}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XuLRSXNY0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XueNHLHP20, author = {Nian Xue and Liang Niu and Xianbin Hong and Zhen Li and Larissa Hoffaeller and Christina P{\"{o}}pper}, title = {DeepSIM: {GPS} Spoofing Detection on UAVs using Satellite Imagery Matching}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {304--319}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427254}, doi = {10.1145/3427228.3427254}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XueNHLHP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XueWLZZHLLM20, author = {Tao Xue and Yu Wen and Bo Luo and Boyang Zhang and Yang Zheng and Yanfei Hu and Yingjiu Li and Gang Li and Dan Meng}, title = {GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {582--596}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427640}, doi = {10.1145/3427228.3427640}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XueWLZZHLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YagemannCURSL20, author = {Carter Yagemann and Simon P. Chung and Erkam Uzun and Sai Ragam and Brendan Saltaformaggio and Wenke Lee}, title = {On the Feasibility of Automating Stock Market Manipulation}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {277--290}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427241}, doi = {10.1145/3427228.3427241}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YagemannCURSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YilmazSC20, author = {Fadi Yilmaz and Meera Sridhar and Wontae Choi}, title = {Guide Me to Exploit: Assisted {ROP} Exploit Generation for ActionScript Virtual Machine}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {386--400}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427568}, doi = {10.1145/3427228.3427568}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YilmazSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangQFYLXS20, author = {Yiming Zhang and Yiyue Qian and Yujie Fan and Yanfang Ye and Xin Li and Qi Xiong and Fudong Shao}, title = {dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {669--680}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427603}, doi = {10.1145/3427228.3427603}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangQFYLXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangTWR0020, author = {Linghan Zhang and Sheng Tan and Zi Wang and Yili Ren and Zhi Wang and Jie Yang}, title = {VibLive: {A} Continuous Liveness Detection for Secure Voice User Interface in IoT Environment}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {884--896}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427281}, doi = {10.1145/3427228.3427281}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangTWR0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2020, title = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228}, doi = {10.1145/3427228}, isbn = {978-1-4503-8858-0}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AgadakosJWKP19, author = {Ioannis Agadakos and Di Jin and David Williams{-}King and Vasileios P. Kemerlis and Georgios Portokalidis}, editor = {David M. Balenson}, title = {Nibbler: debloating binary shared libraries}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {70--83}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359823}, doi = {10.1145/3359789.3359823}, timestamp = {Thu, 30 May 2024 10:08:27 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AgadakosJWKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AhmadvandFB19, author = {Mohsen Ahmadvand and Dennis Fischer and Sebastian Banescu}, editor = {David M. Balenson}, title = {{SIP} shaker: software integrity protection composition}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {203--214}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359848}, doi = {10.1145/3359789.3359848}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AhmadvandFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Alves-FossS19, author = {Jim Alves{-}Foss and Jia Song}, editor = {David M. Balenson}, title = {Function boundary detection in stripped binaries}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {84--96}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359825}, doi = {10.1145/3359789.3359825}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Alves-FossS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AraujoAAGHK19, author = {Frederico Araujo and Gbadebo Ayoade and Khaled Al{-}Naami and Yang Gao and Kevin W. Hamlen and Latifur Khan}, editor = {David M. Balenson}, title = {Improving intrusion detectors by crook-sourcing}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {245--256}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359822}, doi = {10.1145/3359789.3359822}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AraujoAAGHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BenadjilaMRTT19, author = {Ryad Benadjila and Arnauld Michelizza and Mathieu Renard and Philippe Thierry and Philippe Trebuchet}, editor = {David M. Balenson}, title = {WooKey: designing a trusted and efficient {USB} device}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {673--686}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359802}, doi = {10.1145/3359789.3359802}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BenadjilaMRTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BrasserCDFKS19, author = {Ferdinand Brasser and Srdjan Capkun and Alexandra Dmitrienko and Tommaso Frassetto and Kari Kostiainen and Ahmad{-}Reza Sadeghi}, editor = {David M. Balenson}, title = {{DR.SGX:} automated and adjustable side-channel protection for {SGX} using data location randomization}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {788--800}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359809}, doi = {10.1145/3359789.3359809}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BrasserCDFKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChevalierPDH19, author = {Ronny Chevalier and David Plaquin and Chris I. Dalton and Guillaume Hiet}, editor = {David M. Balenson}, title = {Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {762--775}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359792}, doi = {10.1145/3359789.3359792}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChevalierPDH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CristalliLBL19, author = {Stefano Cristalli and Long Lu and Danilo Bruschi and Andrea Lanzi}, editor = {David M. Balenson}, title = {Detecting (absent) app-to-app authentication on cross-device short-distance channels}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {328--338}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359814}, doi = {10.1145/3359789.3359814}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CristalliLBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DashKP19, author = {Pritam Dash and Mehdi Karimibiuki and Karthik Pattabiraman}, editor = {David M. Balenson}, title = {Out of control: stealthy attacks against robotic vehicles protected by control-based techniques}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {660--672}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359847}, doi = {10.1145/3359789.3359847}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DashKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DickinsonSS19, author = {Luke Dickinson and Trevor Smith and Kent E. Seamons}, editor = {David M. Balenson}, title = {Leveraging locality of reference for certificate revocation}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {514--528}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359819}, doi = {10.1145/3359789.3359819}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DickinsonSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Fass0S19, author = {Aurore Fass and Michael Backes and Ben Stock}, editor = {David M. Balenson}, title = {JStap: a static pre-filter for malicious JavaScript detection}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {257--269}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359813}, doi = {10.1145/3359789.3359813}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Fass0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ForuhandehMGLC19, author = {Mahsa Foruhandeh and Yanmao Man and Ryan M. Gerdes and Ming Li and Thidapat Chantem}, editor = {David M. Balenson}, title = {{SIMPLE:} single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {229--244}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359834}, doi = {10.1145/3359789.3359834}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ForuhandehMGLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoXW0RN19, author = {Yansong Gao and Chang Xu and Derui Wang and Shiping Chen and Damith Chinthana Ranasinghe and Surya Nepal}, editor = {David M. Balenson}, title = {{STRIP:} a defence against trojan attacks on deep neural networks}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {113--125}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359790}, doi = {10.1145/3359789.3359790}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GaoXW0RN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GeCGL0ZL19, author = {Huangyi Ge and Sze Yiu Chau and Victor E. Gonsalves and Huian Li and Tianhao Wang and Xukai Zou and Ninghui Li}, editor = {David M. Balenson}, title = {Koinonia: verifiable e-voting with long-term privacy}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {270--285}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359804}, doi = {10.1145/3359789.3359804}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GeCGL0ZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GencLS19, author = {Ziya Alper Gen{\c{c}} and Gabriele Lenzini and Daniele Sgandurra}, editor = {David M. Balenson}, title = {A game of "Cut and Mouse": bypassing antivirus by simulating user inputs}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {456--465}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359844}, doi = {10.1145/3359789.3359844}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GencLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuiXLKC19, author = {Jiaping Gui and Xusheng Xiao and Ding Li and Chung Hwan Kim and Haifeng Chen}, editor = {David M. Balenson}, title = {Progressive processing of system-behavioral query}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {378--389}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359818}, doi = {10.1145/3359789.3359818}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuiXLKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Hasegawa0SA19, author = {Ayako Akiyama Hasegawa and Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama}, editor = {David M. Balenson}, title = {I know what you did last login: inconsistent messages tell existence of a target's account to insiders}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {732--746}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359832}, doi = {10.1145/3359789.3359832}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Hasegawa0SA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HauserMS0VK19, author = {Christophe Hauser and Jayakrishna Menon and Yan Shoshitaishvili and Ruoyu Wang and Giovanni Vigna and Christopher Kruegel}, editor = {David M. Balenson}, title = {Sleak: automating address space layout derandomization}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {190--202}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359820}, doi = {10.1145/3359789.3359820}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HauserMS0VK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HeZL19, author = {Zecheng He and Tianwei Zhang and Ruby B. Lee}, editor = {David M. Balenson}, title = {Model inversion attacks against collaborative inference}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {148--162}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359824}, doi = {10.1145/3359789.3359824}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HeZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HerzbergK19, author = {Amir Herzberg and Yehonatan Kfir}, editor = {David M. Balenson}, title = {The chatty-sensor: a provably-covert channel in cyber physical systems}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {638--649}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359794}, doi = {10.1145/3359789.3359794}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HerzbergK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JangK19, author = {Joonun Jang and Huy Kang Kim}, editor = {David M. Balenson}, title = {FuzzBuilder: automated building greybox fuzzing environment for {C/C++} library}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {627--637}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359846}, doi = {10.1145/3359789.3359846}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JangK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jiang0LLGM19, author = {Fangjie Jiang and Quanwei Cai and Jingqiang Lin and Bo Luo and Le Guan and Ziqiang Ma}, editor = {David M. Balenson}, title = {{TF-BIV:} transparent and fine-grained binary integrity verification in the cloud}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {57--69}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359795}, doi = {10.1145/3359789.3359795}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Jiang0LLGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JinYD019, author = {Chenglu Jin and Zheng Yang and Marten van Dijk and Jianying Zhou}, editor = {David M. Balenson}, title = {Proof of aliveness}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {1--16}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359827}, doi = {10.1145/3359789.3359827}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JinYD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JindalSALKV19, author = {Chani Jindal and Christopher Salls and Hojjat Aghakhani and Keith Long and Christopher Kruegel and Giovanni Vigna}, editor = {David M. Balenson}, title = {Neurlux: dynamic malware analysis without feature engineering}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {444--455}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359835}, doi = {10.1145/3359789.3359835}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JindalSALKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KarimCHCB19, author = {Imtiaz Karim and Fabrizio Cicala and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino}, editor = {David M. Balenson}, title = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface for Android smartphones}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {529--543}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359833}, doi = {10.1145/3359789.3359833}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KarimCHCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KurogomeOKIHMS19, author = {Yuma Kurogome and Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Syogo Hayashi and Tatsuya Mori and Koushik Sen}, editor = {David M. Balenson}, title = {{EIGER:} automated {IOC} generation for accurate and interpretable endpoint malware detection}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {687--701}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359808}, doi = {10.1145/3359789.3359808}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KurogomeOKIHMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiHZG19, author = {Zheng Li and Chengyu Hu and Yang Zhang and Shanqing Guo}, editor = {David M. Balenson}, title = {How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of {DNN}}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {126--137}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359801}, doi = {10.1145/3359789.3359801}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiHZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiLLTL019, author = {Yu Li and Yannan Liu and Min Li and Ye Tian and Bo Luo and Qiang Xu}, editor = {David M. Balenson}, title = {{D2NN:} a fine-grained dual modular redundancy framework for deep neural networks}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {138--147}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359831}, doi = {10.1145/3359789.3359831}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiLLTL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaFLLNOBDMJ19, author = {Siqi Ma and Runhan Feng and Juanru Li and Yang Liu and Surya Nepal and Diethelm Ostry and Elisa Bertino and Robert H. Deng and Zhuo Ma and Sanjay Jha}, editor = {David M. Balenson}, title = {An empirical study of {SMS} one-time password authentication in Android apps}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {339--354}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359828}, doi = {10.1145/3359789.3359828}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaFLLNOBDMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MainardiBP19, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, editor = {David M. Balenson}, title = {Privacy preserving substring search protocol with polylogarithmic communication cost}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {297--312}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359842}, doi = {10.1145/3359789.3359842}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MainardiBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MambrettiNSKRK19, author = {Andrea Mambretti and Matthias Neugschwandtner and Alessandro Sorniotti and Engin Kirda and William K. Robertson and Anil Kurmus}, editor = {David M. Balenson}, title = {Speculator: a tool to analyze speculative execution attacks and mitigations}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {747--761}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359837}, doi = {10.1145/3359789.3359837}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MambrettiNSKRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MarchalS19, author = {Samuel Marchal and Sebastian Szyller}, editor = {David M. Balenson}, title = {Detecting organized eCommerce fraud using scalable categorical clustering}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {215--228}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359810}, doi = {10.1145/3359789.3359810}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MarchalS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MofradALYCZ19, author = {Saeid Mofrad and Ishtiaq Ahmed and Shiyong Lu and Ping Yang and Heming Cui and Fengwei Zhang}, editor = {David M. Balenson}, title = {SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {390--403}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359845}, doi = {10.1145/3359789.3359845}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MofradALYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MohamedSS19, author = {Manar Mohamed and Prakash Shrestha and Nitesh Saxena}, editor = {David M. Balenson}, title = {Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {355--365}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359838}, doi = {10.1145/3359789.3359838}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MohamedSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MunteanNLTG019, author = {Paul Muntean and Matthias Neumayer and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, editor = {David M. Balenson}, title = {Analyzing control flow integrity with {LLVM-CFI}}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {584--597}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359806}, doi = {10.1145/3359789.3359806}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MunteanNLTG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Naderi-Afooshteh19, author = {Abbas Naderi{-}Afooshteh and Yonghwi Kwon and Anh Nguyen{-}Tuong and Mandana Bagheri{-}Marzijarani and Jack W. Davidson}, editor = {David M. Balenson}, title = {Cubismo: decloaking server-side malware via cubist program analysis}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {430--443}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359821}, doi = {10.1145/3359789.3359821}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Naderi-Afooshteh19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NagendraYPD19, author = {Vasudevan Nagendra and Vinod Yegneswaran and Phillip A. Porras and Samir R. Das}, editor = {David M. Balenson}, title = {Coordinated dataflow protection for ultra-high bandwidth science networks}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {568--583}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359843}, doi = {10.1145/3359789.3359843}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NagendraYPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NajafiMP0M19, author = {Pejman Najafi and Alexander M{\"{u}}hle and Wenzel P{\"{u}}nter and Feng Cheng and Christoph Meinel}, editor = {David M. Balenson}, title = {MalRank: a measure of maliciousness in SIEM-based knowledge graphs}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {417--429}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359791}, doi = {10.1145/3359789.3359791}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NajafiMP0M19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NakatsukaPT19, author = {Yoshimichi Nakatsuka and Andrew Paverd and Gene Tsudik}, editor = {David M. Balenson}, title = {PDoT: private DNS-over-TLS with {TEE} support}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {489--499}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359793}, doi = {10.1145/3359789.3359793}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NakatsukaPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NamAG19, author = {Myoung Jin Nam and Periklis Akritidis and David J. Greaves}, editor = {David M. Balenson}, title = {{FRAMER:} a tagged-pointer capability system with memory safety applications}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {612--626}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359799}, doi = {10.1145/3359789.3359799}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NamAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OllivierBBM19, author = {Mathilde Ollivier and S{\'{e}}bastien Bardin and Richard Bonichon and Jean{-}Yves Marion}, editor = {David M. Balenson}, title = {How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {177--189}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359812}, doi = {10.1145/3359789.3359812}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OllivierBBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OsmanMHY19, author = {Tousif Osman and Mohammad Mannan and Urs Hengartner and Amr M. Youssef}, editor = {David M. Balenson}, title = {AppVeto: mobile application self-defense through resource access veto}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {366--377}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359839}, doi = {10.1145/3359789.3359839}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OsmanMHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PalitMP19, author = {Tapti Palit and Fabian Monrose and Michalis Polychronakis}, editor = {David M. Balenson}, title = {Mitigating data leakage by protecting memory-resident sensitive data}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {598--611}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359815}, doi = {10.1145/3359789.3359815}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PalitMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PawlowskiVAKHGB19, author = {Andre Pawlowski and Victor van der Veen and Dennis Andriesse and Erik van der Kouwe and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, editor = {David M. Balenson}, title = {{VPS:} excavating high-level {C++} constructs from low-level binaries to protect dynamic dispatching}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {97--112}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359797}, doi = {10.1145/3359789.3359797}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PawlowskiVAKHGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PoeplauF19, author = {Sebastian Poeplau and Aur{\'{e}}lien Francillon}, editor = {David M. Balenson}, title = {Systematic comparison of symbolic execution systems: intermediate representation and its generation}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {163--176}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359796}, doi = {10.1145/3359789.3359796}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PoeplauF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RondonBAU19, author = {Luis Puche Rondon and Leonardo Babun and Kemal Akkaya and A. Selcuk Uluagac}, editor = {David M. Balenson}, title = {HDMI-walk: attacking {HDMI} distribution networks via consumer electronic control protocol}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {650--659}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359841}, doi = {10.1145/3359789.3359841}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RondonBAU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Sanchez-RolaBS19, author = {Iskander S{\'{a}}nchez{-}Rola and Davide Balzarotti and Igor Santos}, editor = {David M. Balenson}, title = {BakingTimer: privacy analysis of server-side request processing time}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {478--488}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359803}, doi = {10.1145/3359789.3359803}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Sanchez-RolaBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SandersY19, author = {Matthew W. Sanders and Chuan Yue}, editor = {David M. Balenson}, title = {Mining least privilege attribute based access control policies}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {404--416}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359805}, doi = {10.1145/3359789.3359805}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SandersY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShejwalkarHPG19, author = {Virat Shejwalkar and Amir Houmansadr and Hossein Pishro{-}Nik and Dennis Goeckel}, editor = {David M. Balenson}, title = {Revisiting utility metrics for location privacy-preserving mechanisms}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {313--327}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359829}, doi = {10.1145/3359789.3359829}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShejwalkarHPG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SikderBAU19, author = {Amit Kumar Sikder and Leonardo Babun and Hidayet Aksu and A. Selcuk Uluagac}, editor = {David M. Balenson}, title = {Aegis: a context-aware security framework for smart home systems}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {28--41}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359840}, doi = {10.1145/3359789.3359840}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SikderBAU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SlaterNMMT19, author = {David Slater and Scott Novotney and Jessica Moore and Sean Morgan and Scott Tenaglia}, editor = {David M. Balenson}, title = {Robust keystroke transcription from the acoustic side-channel}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {776--787}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359816}, doi = {10.1145/3359789.3359816}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SlaterNMMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SpoorenVJJD19, author = {Jan Spooren and Thomas Vissers and Peter Janssen and Wouter Joosen and Lieven Desmet}, editor = {David M. Balenson}, title = {Premadoma: an operational solution for {DNS} registries to prevent malicious domain registrations}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {557--567}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359836}, doi = {10.1145/3359789.3359836}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SpoorenVJJD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StylianopoulosK19, author = {Charalampos Stylianopoulos and Simon Kindstr{\"{o}}m and Magnus Almgren and Olaf Landsiedel and Marina Papatriantafilou}, editor = {David M. Balenson}, title = {Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {17--27}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359811}, doi = {10.1145/3359789.3359811}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StylianopoulosK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UkropKMW19, author = {Martin Ukrop and Lydia Kraus and Vashek Matyas and Heider Ahmad Mutleq Wahsheh}, editor = {David M. Balenson}, title = {Will you trust this {TLS} certificate?: perceptions of people working in {IT}}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {718--731}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359800}, doi = {10.1145/3359789.3359800}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/UkropKMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UrbanDHP19, author = {Tobias Urban and Martin Degeling and Thorsten Holz and Norbert Pohlmann}, editor = {David M. Balenson}, title = {"\emph{Your hashed {IP} address: Ubuntu.}": perspectives on transparency tools for online advertising}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {702--717}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359798}, doi = {10.1145/3359789.3359798}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/UrbanDHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UsuiOKIMM19, author = {Toshinori Usui and Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Jun Miyoshi and Kanta Matsuura}, editor = {David M. Balenson}, title = {My script engines know what you did in the dark: converting engines into script {API} tracers}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {466--477}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359849}, doi = {10.1145/3359789.3359849}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/UsuiOKIMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VaidyaWS19, author = {Tavish Vaidya and Tim Walsh and Micah Sherr}, editor = {David M. Balenson}, title = {Whisper: a unilateral defense against VoIP traffic re-identification attacks}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {286--296}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359807}, doi = {10.1145/3359789.3359807}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VaidyaWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangALW0S19, author = {Chen Wang and S. Abhishek Anand and Jian Liu and Payton Walker and Yingying Chen and Nitesh Saxena}, editor = {David M. Balenson}, title = {Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {42--56}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359830}, doi = {10.1145/3359789.3359830}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangALW0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangDZH0LWDSSLG19, author = {Hao Yang and Kun Du and Yubao Zhang and Shuang Hao and Zhou Li and Mingxuan Liu and Haining Wang and Hai{-}Xin Duan and Yazhou Shi and XiaoDong Su and Guang Liu and Zhifeng Geng and Jianping Wu}, editor = {David M. Balenson}, title = {Casino royale: a deep exploration of illegal online gambling}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {500--513}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359817}, doi = {10.1145/3359789.3359817}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YangDZH0LWDSSLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangHJSLLWSZL19, author = {Yu Zhang and Wei Huo and Kunpeng Jian and Ji Shi and Haoliang Lu and Longquan Liu and Chen Wang and Dandan Sun and Chao Zhang and Baoxu Liu}, editor = {David M. Balenson}, title = {SRFuzzer: an automatic fuzzing framework for physical {SOHO} router devices to discover multi-type vulnerabilities}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {544--556}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359826}, doi = {10.1145/3359789.3359826}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangHJSLLWSZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2019, editor = {David M. Balenson}, title = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789}, doi = {10.1145/3359789}, isbn = {978-1-4503-7628-0}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AckerHS18, author = {Steven {Van Acker} and Daniel Hausknecht and Andrei Sabelfeld}, title = {Raising the Bar: Evaluating Origin-wide Security Manifests}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {342--354}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274701}, doi = {10.1145/3274694.3274701}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AckerHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AhmadvandHBP18, author = {Mohsen Ahmadvand and Anahit Hayrapetyan and Sebastian Banescu and Alexander Pretschner}, title = {Practical Integrity Protection with Oblivious Hashing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {40--52}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274732}, doi = {10.1145/3274694.3274732}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AhmadvandHBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Ahmed0M18, author = {Chuadhry Mujeeb Ahmed and Jianying Zhou and Aditya P. Mathur}, title = {Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in {CPS}}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {566--581}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274748}, doi = {10.1145/3274694.3274748}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Ahmed0M18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AllenLCJCL18, author = {Joey Allen and Matthew Landen and Sanya Chaba and Yang Ji and Simon Pak Ho Chung and Wenke Lee}, title = {Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {210--221}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274744}, doi = {10.1145/3274694.3274744}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AllenLCJCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AndreAS18, author = {Andr{\'{e}} Greubel and Alexandra Dmitrienko and Samuel Kounev}, title = {SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {677--691}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274722}, doi = {10.1145/3274694.3274722}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AndreAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivWK18, author = {Adam J. Aviv and Flynn Wolf and Ravi Kuber}, title = {Comparing Video Based Shoulder Surfing with Live Simulation}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {453--466}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274702}, doi = {10.1145/3274694.3274702}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaekKC0SDA18, author = {Jaejong Baek and Sukwha Kyung and Haehyun Cho and Ziming Zhao and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {278--288}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274753}, doi = {10.1145/3274694.3274753}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BaekKC0SDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BlanchardMS18, author = {Nikola K. Blanchard and Cl{\'{e}}ment Malaingre and Ted Selker}, title = {Improving security and usability of passphrases with guided word choice}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {723--732}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274734}, doi = {10.1145/3274694.3274734}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BlanchardMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CastellanosO018, author = {John Henry Castellanos and Mart{\'{\i}}n Ochoa and Jianying Zhou}, title = {Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {582--594}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274745}, doi = {10.1145/3274694.3274745}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CastellanosO018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChauWWCKL18, author = {Sze Yiu Chau and Bincheng Wang and Jianxiong Wang and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {236--251}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274752}, doi = {10.1145/3274694.3274752}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChoZKPL0DA18, author = {Haehyun Cho and Penghui Zhang and Donguk Kim and Jinbum Park and Choong{-}Hoon Lee and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Prime+Count: Novel Cross-world Covert Channels on {ARM} TrustZone}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {441--452}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274704}, doi = {10.1145/3274694.3274704}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChoZKPL0DA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ContinellaPPZ18, author = {Andrea Continella and Mario Polino and Marcello Pogliani and Stefano Zanero}, title = {There's a Hole in that Bucket!: {A} Large-scale Analysis of Misconfigured {S3} Buckets}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {702--711}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274736}, doi = {10.1145/3274694.3274736}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ContinellaPPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CoptyDEEMZ18, author = {Fady Copty and Matan Danos and Orit Edelstein and Cindy Eisner and Dov Murik and Benjamin Zeltser}, title = {Accurate Malware Detection by Extreme Abstraction}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {101--111}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274700}, doi = {10.1145/3274694.3274700}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CoptyDEEMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DemoulinVPDQSZC18, author = {Henri Maxime Demoulin and Tavish Vaidya and Isaac Pedisich and Bob DiMaiolo and Jingyu Qian and Chirag Shah and Yuankai Zhang and Ang Chen and Andreas Haeberlen and Boon Thau Loo and Linh Thi Xuan Phan and Micah Sherr and Clay Shields and Wenchao Zhou}, title = {DeDoS: Defusing DoS with Dispersion Oriented Software}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {712--722}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274727}, doi = {10.1145/3274694.3274727}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DemoulinVPDQSZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EcheverriaCKLSZ18, author = {Juan Echeverr{\'{\i}}a and Emiliano De Cristofaro and Nicolas Kourtellis and Ilias Leontiadis and Gianluca Stringhini and Shi Zhou}, title = {{LOBO:} Evaluation of Generalization Deficiencies in Twitter Bot Classifiers}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {137--146}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274738}, doi = {10.1145/3274694.3274738}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EcheverriaCKLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EtigowniHKDZ18, author = {Sriharsha Etigowni and Shamina Hossain{-}McKenzie and Maryam Kazerooni and Katherine R. Davis and Saman A. Zonouz}, title = {Crystal (ball): {I} Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {553--565}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274724}, doi = {10.1145/3274694.3274724}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/EtigowniHKDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FangYGL18, author = {Minghong Fang and Guolei Yang and Neil Zhenqiang Gong and Jia Liu}, title = {Poisoning Attacks to Graph-Based Recommender Systems}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {381--392}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274706}, doi = {10.1145/3274694.3274706}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FangYGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FarhangWKG018, author = {Sadegh Farhang and Jake Weidman and Mohammad Mahdi Kamani and Jens Grossklags and Peng Liu}, title = {Take It or Leave It: {A} Survey Study on Operating System Upgrade Practices}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {490--504}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274733}, doi = {10.1145/3274694.3274733}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FarhangWKG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FarkhaniJARKO18, author = {Reza Mirzazade Farkhani and Saman Jafari and Sajjad Arshad and William K. Robertson and Engin Kirda and Hamed Okhravi}, title = {On the Effectiveness of Type-based Control Flow Integrity}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {28--39}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274739}, doi = {10.1145/3274694.3274739}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FarkhaniJARKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FutagamiUK18, author = {Shota Futagami and Tomoya Unoki and Kenichi Kourai}, title = {Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {430--440}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274749}, doi = {10.1145/3274694.3274749}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FutagamiUK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GarmanySGKBH18, author = {Behrad Garmany and Martin Stoffel and Robert Gawlik and Philipp Koppe and Tim Blazytko and Thorsten Holz}, title = {Towards Automated Generation of Exploitation Primitives for Web Browsers}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {300--312}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274723}, doi = {10.1145/3274694.3274723}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GarmanySGKBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Goer0ABG18, author = {Franck de Go{\"{e}}r and Sanjay Rawat and Dennis Andriesse and Herbert Bos and Roland Groz}, title = {Now You See Me: Real-time Dynamic Function Call Detection}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {618--628}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274712}, doi = {10.1145/3274694.3274712}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Goer0ABG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ImCW18, author = {Bumjin Im and Ang Chen and Dan S. Wallach}, title = {An Historical Analysis of the SEAndroid Policy Evolution}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {629--640}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274709}, doi = {10.1145/3274694.3274709}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ImCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jain0GB18, author = {Vivek Jain and Sanjay Rawat and Cristiano Giuffrida and Herbert Bos}, title = {{TIFF:} Using Input Type Inference To Improve Fuzzing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {505--517}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274746}, doi = {10.1145/3274694.3274746}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jain0GB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JunaidMK18, author = {Mohsin Junaid and Jiang Ming and David Chenho Kung}, title = {StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {198--209}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274707}, doi = {10.1145/3274694.3274707}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JunaidMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KesarwaniMAM18, author = {Manish Kesarwani and Bhaskar Mukhoty and Vijay Arya and Sameep Mehta}, title = {Model Extraction Warning in MLaaS Paradigm}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {371--380}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274740}, doi = {10.1145/3274694.3274740}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KesarwaniMAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KouweKOBG18, author = {Erik van der Kouwe and Taddeus Kroes and Chris Ouwehand and Herbert Bos and Cristiano Giuffrida}, title = {Type-After-Type: Practical and Complete Type-Safe Memory Reuse}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {17--27}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274705}, doi = {10.1145/3274694.3274705}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KouweKOBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiangBLLT18, author = {Weixin Liang and Kai Bu and Ke Li and Jinhong Li and Arya Tavakoli}, title = {MemCloak: Practical Access Obfuscation for Untrusted Memory}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {187--197}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274695}, doi = {10.1145/3274694.3274695}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiangBLLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LinLWJ0Z18, author = {Xin Lin and Lingguang Lei and Yuewu Wang and Jiwu Jing and Kun Sun and Quan Zhou}, title = {A Measurement Study on Linux Container Security: Attacks and Countermeasures}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {418--429}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274720}, doi = {10.1145/3274694.3274720}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LinLWJ0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuLD18, author = {Ximing Liu and Yingjiu Li and Robert H. Deng}, title = {Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {53--65}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274699}, doi = {10.1145/3274694.3274699}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiuLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuZLZ018, author = {Changming Liu and Deqing Zou and Peng Luo and Bin B. Zhu and Hai Jin}, title = {A Heuristic Framework to Detect Concurrency Vulnerabilities}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {529--541}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274718}, doi = {10.1145/3274694.3274718}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiuZLZ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuZLZL18, author = {Bo Lu and Xiaokuan Zhang and Ziman Ling and Yinqian Zhang and Zhiqiang Lin}, title = {A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {89--100}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274714}, doi = {10.1145/3274694.3274714}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuZLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MachiryRGFCKV18, author = {Aravind Machiry and Nilo Redini and Eric Gustafson and Yanick Fratantonio and Yung Ryn Choe and Christopher Kruegel and Giovanni Vigna}, title = {Using Loops For Malware Classification Resilient to Feature-unaware Perturbations}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {112--123}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274731}, doi = {10.1145/3274694.3274731}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MachiryRGFCKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ManiVDS18, author = {Akshaya Mani and Tavish Vaidya and David Dworken and Micah Sherr}, title = {An Extensive Evaluation of the Internet's Open Proxies}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {252--265}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274711}, doi = {10.1145/3274694.3274711}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ManiVDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MayerSV18, author = {Peter Mayer and Christian Schwartz and Melanie Volkamer}, title = {On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {733--748}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274747}, doi = {10.1145/3274694.3274747}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MayerSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McCulleyR18, author = {Shane McCulley and Vassil Roussev}, title = {Latent Typing Biometrics in Online Collaboration Services}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {66--76}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274754}, doi = {10.1145/3274694.3274754}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McCulleyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MishraP18, author = {Shachee Mishra and Michalis Polychronakis}, title = {Shredder: Breaking Exploits through {API} Specialization}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {1--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274703}, doi = {10.1145/3274694.3274703}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MishraP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NeupaneSSSB18, author = {Ajaya Neupane and Kiavash Satvat and Nitesh Saxena and Despina Stavrinos and Haley Johnson Bishop}, title = {Do Social Disorders Facilitate Social Engineering?: {A} Case Study of Autism and Phishing Attacks}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {467--477}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274730}, doi = {10.1145/3274694.3274730}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NeupaneSSSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NikolicKSSH18, author = {Ivica Nikolic and Aashish Kolluri and Ilya Sergey and Prateek Saxena and Aquinas Hobor}, title = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {653--663}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274743}, doi = {10.1145/3274694.3274743}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NikolicKSSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OpreaLNB18, author = {Alina Oprea and Zhou Li and Robin Norris and Kevin D. Bowers}, title = {{MADE:} Security Analytics for Enterprise Threat Detection}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {124--136}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274710}, doi = {10.1145/3274694.3274710}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/OpreaLNB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PangDMG18, author = {Chengbin Pang and Yunlan Du and Bing Mao and Shanqing Guo}, title = {Mapping to Bits: Efficiently Detecting Type Confusion Errors}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {518--528}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274719}, doi = {10.1145/3274694.3274719}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PangDMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ProskurinLMEZ18, author = {Sergej Proskurin and Tamas K. Lengyel and Marius Momeu and Claudia Eckert and Apostolis Zarras}, title = {Hiding in the Shadows: Empowering {ARM} for Stealthy Virtual Machine Introspection}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {407--417}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274698}, doi = {10.1145/3274694.3274698}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ProskurinLMEZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RahmanNS18, author = {Md. Lutfor Rahman and Ajaya Neupane and Chengyu Song}, title = {{IAC:} On the Feasibility of Utilizing Neural Signals for Access Control}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {641--652}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274713}, doi = {10.1145/3274694.3274713}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RahmanNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RamanathanMYZ18, author = {Sivaramakrishnan Ramanathan and Jelena Mirkovic and Minlan Yu and Ying Zhang}, title = {{SENSS} Against Volumetric DDoS Attacks}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {266--277}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274717}, doi = {10.1145/3274694.3274717}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RamanathanMYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RodriguezP18, author = {Juan D. Parra Rodriguez and Joachim Posegga}, title = {{RAPID:} Resource and API-Based Detection Against In-Browser Miners}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {313--326}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274735}, doi = {10.1145/3274694.3274735}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RodriguezP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchillingWNM18, author = {Robert Schilling and Mario Werner and Pascal Nasahl and Stefan Mangard}, title = {Pointing in the Right Direction - Securing Memory Accesses in a Faulty World}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {595--604}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274728}, doi = {10.1145/3274694.3274728}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchillingWNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SyBFF18, author = {Erik Sy and Christian Burkert and Hannes Federrath and Mathias Fischer}, title = {Tracking Users across the Web via {TLS} Session Resumption}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {289--299}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274708}, doi = {10.1145/3274694.3274708}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SyBFF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TorresSS18, author = {Christof Ferreira Torres and Julian Sch{\"{u}}tte and Radu State}, title = {Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {664--676}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274737}, doi = {10.1145/3274694.3274737}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TorresSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TranLKBS18, author = {Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena}, title = {Obscuro: {A} Bitcoin Mixer using Trusted Execution Environments}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {692--701}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274750}, doi = {10.1145/3274694.3274750}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TranLKBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TuveriHGB18, author = {Nicola Tuveri and Sohaib ul Hassan and Cesar Pereida Garc{\'{\i}}a and Billy Bob Brumley}, title = {Side-Channel Analysis of {SM2:} {A} Late-Stage Featurization Case Study}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {147--160}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274725}, doi = {10.1145/3274694.3274725}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TuveriHGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangKMZX18, author = {Fei Wang and Yonghwi Kwon and Shiqing Ma and Xiangyu Zhang and Dongyan Xu}, title = {Lprov: Practical Library-aware Provenance Tracing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {605--617}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274751}, doi = {10.1145/3274694.3274751}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangKMZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiLLL018, author = {Lingxiao Wei and Bo Luo and Yu Li and Yannan Liu and Qiang Xu}, title = {I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {393--406}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274696}, doi = {10.1145/3274694.3274696}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeiLLL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WermkeHARTF18, author = {Dominik Wermke and Nicolas Huaman and Yasemin Acar and Bradley Reaves and Patrick Traynor and Sascha Fahl}, title = {A Large Scale Investigation of Obfuscation Use in Google Play}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {222--235}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274726}, doi = {10.1145/3274694.3274726}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WermkeHARTF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WichelmannMES18, author = {Jan Wichelmann and Ahmad Moghimi and Thomas Eisenbarth and Berk Sunar}, title = {MicroWalk: {A} Framework for Finding Side Channels in Binaries}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {161--173}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274741}, doi = {10.1145/3274694.3274741}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WichelmannMES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WieseWM018, author = {Oliver Wiese and Christoph Weinhold and Jan{-}Ole Malchow and Volker Roth}, title = {I Need this Back, Later!: An Exploration of Practical Secret Sharing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {478--489}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274729}, doi = {10.1145/3274694.3274729}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WieseWM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuWLGCJ18, author = {Yixiao Xu and Tao Wang and Qi Li and Qingyuan Gong and Yang Chen and Yong Jiang}, title = {A Multi-tab Website Fingerprinting Attack}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {327--341}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274697}, doi = {10.1145/3274694.3274697}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XuWLGCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YeHCL0XWX18, author = {Yanfang Ye and Shifu Hou and Lingwei Chen and Xin Li and Liang Zhao and Shouhuai Xu and Jiabin Wang and Qi Xiong}, title = {{ICSD:} An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {542--552}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274742}, doi = {10.1145/3274694.3274742}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YeHCL0XWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangZL18, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, title = {Analyzing Cache Side Channels Using Deep Neural Networks}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {174--186}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274715}, doi = {10.1145/3274694.3274715}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhouTWWLZ18, author = {Zhe Zhou and Di Tang and Wenhao Wang and Xiaofeng Wang and Zhou Li and Kehuan Zhang}, title = {Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {77--88}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274721}, doi = {10.1145/3274694.3274721}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhouTWWLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZiegeldorfMW18, author = {Jan Henrik Ziegeldorf and Jan Metzke and Klaus Wehrle}, title = {{SHIELD:} {A} Framework for Efficient and Secure Machine Learning Classification in Constrained Environments}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {355--370}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274716}, doi = {10.1145/3274694.3274716}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZiegeldorfMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2018, title = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694}, doi = {10.1145/3274694}, isbn = {978-1-4503-6569-7}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AbbasiHZE17, author = {Ali Abbasi and Thorsten Holz and Emmanuele Zambon and Sandro Etalle}, title = {{ECFI:} Asynchronous Control Flow Integrity for Programmable Logic Controllers}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {437--448}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134618}, doi = {10.1145/3134600.3134618}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AbbasiHZE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivDWK17, author = {Adam J. Aviv and John T. Davin and Flynn Wolf and Ravi Kuber}, title = {Towards Baselines for Shoulder Surfing on Mobile Authentication}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {486--498}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134609}, doi = {10.1145/3134600.3134609}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivDWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AzimpourkiviTC17, author = {Mozhgan Azimpourkivi and Umut Topkara and Bogdan Carbunar}, title = {A Secure Mobile Authentication Alternative to Biometrics}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {28--41}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134619}, doi = {10.1145/3134600.3134619}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AzimpourkiviTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BarronN17, author = {Timothy Barron and Nick Nikiforakis}, title = {Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {387--398}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134614}, doi = {10.1145/3134600.3134614}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BarronN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BellafqiraCBQC17, author = {Reda Bellafqira and Gouenou Coatrieux and Dalel Bouslimi and Gwenol{\'{e}} Quellec and Michel Cozic}, title = {Proxy Re-Encryption Based on Homomorphic Encryption}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {154--161}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134616}, doi = {10.1145/3134600.3134616}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BellafqiraCBQC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BianchiGFKV17, author = {Antonio Bianchi and Eric Gustafson and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {16--27}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134615}, doi = {10.1145/3134600.3134615}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiEC17, author = {Riccardo Bortolameotti and Thijs van Ede and Marco Caselli and Maarten H. Everts and Pieter H. Hartel and Rick Hofstede and Willem Jonker and Andreas Peter}, title = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive Application Fingerprinting}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {373--386}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134605}, doi = {10.1145/3134600.3134605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BulckMP17, author = {Jo Van Bulck and Jan Tobias M{\"{u}}hlberg and Frank Piessens}, title = {VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {225--237}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134623}, doi = {10.1145/3134600.3134623}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BulckMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoG17, author = {Xiaoyu Cao and Neil Zhenqiang Gong}, title = {Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {278--287}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134606}, doi = {10.1145/3134600.3134606}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaoG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenDBJC17, author = {Binbin Chen and Xinshu Dong and Guangdong Bai and Sumeet Jauhar and Yueqiang Cheng}, title = {Secure and Efficient Software-based Attestation for Industrial Control Devices with {ARM} Processors}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {425--436}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134621}, doi = {10.1145/3134600.3134621}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChenDBJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenHCGHR17, author = {Shang{-}Tse Chen and Yufei Han and Duen Horng Chau and Christopher S. Gates and Michael Hart and Kevin A. Roundy}, title = {Predicting Cyber Threats with Virtual Security Products}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {189--199}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134617}, doi = {10.1145/3134600.3134617}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChenHCGHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenHY17, author = {Lingwei Chen and Shifu Hou and Yanfang Ye}, title = {SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {362--372}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134636}, doi = {10.1145/3134600.3134636}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChenHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenLEAZ17, author = {Haining Chen and Ninghui Li and William Enck and Yousra Aafer and Xiangyu Zhang}, title = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {553--565}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134638}, doi = {10.1145/3134600.3134638}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenLEAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChengTY17, author = {Long Cheng and Ke Tian and Danfeng (Daphne) Yao}, title = {Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {315--326}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134640}, doi = {10.1145/3134600.3134640}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChengTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChevalierVPH17, author = {Ronny Chevalier and Maugan Villatel and David Plaquin and Guillaume Hiet}, title = {Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {399--411}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134622}, doi = {10.1145/3134600.3134622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChevalierVPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DabrowskiUW17, author = {Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl}, title = {Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {303--314}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134639}, doi = {10.1145/3134600.3134639}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DabrowskiUW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DellAmicoBKEV17, author = {Matteo Dell'Amico and Leyla Bilge and Ashwin Kumar Kayyoor and Petros Efstathopoulos and Pierre{-}Antoine Vervier}, title = {Lean On Me: Mining Internet Service Dependencies From Large-Scale {DNS} Data}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {449--460}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134637}, doi = {10.1145/3134600.3134637}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DellAmicoBKEV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DengM17, author = {Xiyue Deng and Jelena Mirkovic}, title = {Commoner Privacy And {A} Study On Network Traces}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {566--576}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134602}, doi = {10.1145/3134600.3134602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DengM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GosainACA17, author = {Devashish Gosain and Anshika Agarwal and Sambuddho Chakravarty and Hrishikesh B. Acharya}, title = {The Devil's in The Details: Placing Decoy Routers in the Internet}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {577--589}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134608}, doi = {10.1145/3134600.3134608}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GosainACA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuanJCZLLLXX17, author = {Le Guan and Shijie Jia and Bo Chen and Fengwei Zhang and Bo Luo and Jingqiang Lin and Peng Liu and Xinyu Xing and Luning Xia}, title = {Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {339--349}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134647}, doi = {10.1145/3134600.3134647}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuanJCZLLLXX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HusariAACN17, author = {Ghaith Husari and Ehab Al{-}Shaer and Mohiuddin Ahmed and Bill Chu and Xi Niu}, title = {TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of {CTI} Sources}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {103--115}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134646}, doi = {10.1145/3134600.3134646}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HusariAACN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jang0J17, author = {Uyeong Jang and Xi Wu and Somesh Jha}, title = {Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {262--277}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134635}, doi = {10.1145/3134600.3134635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jang0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JiangZAWCLG17, author = {Jianyu Jiang and Shixiong Zhao and Danish Alsayed and Yuexuan Wang and Heming Cui and Feng Liang and Zhaoquan Gu}, title = {Kakute: {A} Precise, Unified Information Flow Analysis System for Big-data Security}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {79--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134607}, doi = {10.1145/3134600.3134607}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JiangZAWCLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JohnsonBS17, author = {Peter C. Johnson and Sergey Bratus and Sean W. Smith}, title = {Protecting Against Malicious Bits On the Wire: Automatically Generating a {USB} Protocol Parser for a Production Kernel}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {528--541}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134630}, doi = {10.1145/3134600.3134630}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JohnsonBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimHHJ17, author = {Jun Young Kim and Ralph Holz and Wen Hu and Sanjay Jha}, title = {Automated Analysis of Secure Internet of Things Protocols}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {238--249}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134624}, doi = {10.1145/3134600.3134624}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KimHHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimKCKSZX17, author = {Taegyu Kim and Chung Hwan Kim and Hongjun Choi and Yonghwi Kwon and Brendan Saltaformaggio and Xiangyu Zhang and Dongyan Xu}, title = {RevARM: {A} Platform-Agnostic {ARM} Binary Rewriter for Security Applications}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {412--424}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134627}, doi = {10.1145/3134600.3134627}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KimKCKSZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeeKK17, author = {Hoyeon Lee and Seungyeon Kim and Taekyoung Kwon}, title = {Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {512--527}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134643}, doi = {10.1145/3134600.3134643}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeeKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MirkovicKR17, author = {Jelena Mirkovic and Erik Kline and Peter L. Reiher}, title = {{RESECT:} Self-Learning Traffic Filters for {IP} Spoofing Defense}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {474--485}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134644}, doi = {10.1145/3134600.3134644}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MirkovicKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NemecKSSM17, author = {Mat{\'{u}}s Nemec and Dusan Klinec and Petr Svenda and Peter Sekan and Vashek Matyas}, title = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {162--175}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134612}, doi = {10.1145/3134600.3134612}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NemecKSSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OgasawaraK17, author = {Junya Ogasawara and Kenji Kono}, title = {Nioh: Hardening The Hypervisor by Filtering Illegal {I/O} Requests to Virtual Devices}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {542--552}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134648}, doi = {10.1145/3134600.3134648}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OgasawaraK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PeetersHMGHH17, author = {Roel Peeters and Jens Hermans and Pieter Maene and Katri Grenman and Kimmo Halunen and Juha H{\"{a}}iki{\"{o}}}, title = {n-Auth: Mobile Authentication Done Right}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {1--15}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134613}, doi = {10.1145/3134600.3134613}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PeetersHMGHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyKDH17, author = {Jannik Pewny and Philipp Koppe and Lucas Davi and Thorsten Holz}, title = {Breaking and Fixing Destructive Code Read Defenses}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {55--67}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134626}, doi = {10.1145/3134600.3134626}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnyKDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/QuachCP17, author = {Anh Quach and Matthew Cole and Aravind Prakash}, title = {Supplementing Modern Software Defenses with Stack-Pointer Sanity}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {116--127}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134641}, doi = {10.1145/3134600.3134641}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/QuachCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RoundyTSHKDS17, author = {Kevin A. Roundy and Acar Tamersoy and Michael Spertus and Michael Hart and Daniel Kats and Matteo Dell'Amico and Robert Scott}, title = {Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {200--211}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134645}, doi = {10.1145/3134600.3134645}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RoundyTSHKDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SallsSSKV17, author = {Christopher Salls and Yan Shoshitaishvili and Nick Stephens and Christopher Kruegel and Giovanni Vigna}, title = {Piston: Uncooperative Remote Runtime Patching}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {141--153}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134611}, doi = {10.1145/3134600.3134611}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianSG17, author = {Maliheh Shirvanian and Nitesh Saxena and Jesvin James George}, title = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study of Remote Key-Fingerprint Verification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {499--511}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134610}, doi = {10.1145/3134600.3134610}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SkowyraGBLO17, author = {Richard Skowyra and Steven R. Gomez and David Bigelow and James Landry and Hamed Okhravi}, title = {{QUASAR:} Quantitative Attack Space Analysis and Reasoning}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {68--78}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134633}, doi = {10.1145/3134600.3134633}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SkowyraGBLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SluganovicSDM17, author = {Ivo Sluganovic and Matej Serbec and Ante Derek and Ivan Martinovic}, title = {HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {250--261}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134625}, doi = {10.1145/3134600.3134625}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SluganovicSDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StoneCG17, author = {Chris McMahon Stone and Tom Chothia and Flavio D. Garcia}, title = {Spinner: Semi-Automatic Detection of Pinning without Hostname Verification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {176--188}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134628}, doi = {10.1145/3134600.3134628}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StoneCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StringhiniSHZ17, author = {Gianluca Stringhini and Yun Shen and Yufei Han and Xiangliang Zhang}, title = {Marmite: Spreading Malicious File Reputation Through Download Graphs}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {91--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134604}, doi = {10.1145/3134600.3134604}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StringhiniSHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ThomasOCR17, author = {Richard James Thomas and Mihai Ordean and Tom Chothia and Joeri de Ruiter}, title = {{TRAKS:} {A} Universal Key Management Scheme for {ERTMS}}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {327--338}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134631}, doi = {10.1145/3134600.3134631}, timestamp = {Sun, 28 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ThomasOCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangZZY17, author = {Xiaolei Wang and Sencun Zhu and Dehua Zhou and Yuexiang Yang}, title = {Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {350--361}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134601}, doi = {10.1145/3134600.3134601}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeidmanG17, author = {Jake Weidman and Jens Grossklags}, title = {I Like It, but {I} Hate It: Employee Perceptions Towards an Institutional Transition to {BYOD} Second-Factor Authentication}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {212--224}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134629}, doi = {10.1145/3134600.3134629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeidmanG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeissbacherMSSR17, author = {Michael Weissbacher and Enrico Mariconti and Guillermo Suarez{-}Tangil and Gianluca Stringhini and William K. Robertson and Engin Kirda}, title = {Ex-Ray: Detection of History-Leaking Browser Extensions}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {590--602}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134632}, doi = {10.1145/3134600.3134632}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeissbacherMSSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanSCX17, author = {Hua Yan and Yulei Sui and Shiping Chen and Jingling Xue}, title = {Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {42--54}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134620}, doi = {10.1145/3134600.3134620}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YanSCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangK0G17, author = {Wei Yang and Deguang Kong and Tao Xie and Carl A. Gunter}, title = {Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {288--302}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134642}, doi = {10.1145/3134600.3134642}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangK0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YoonSPYKFOV17, author = {Changhoon Yoon and Seungwon Shin and Phillip A. Porras and Vinod Yegneswaran and Heedo Kang and Martin W. Fong and Brian O'Connor and Thomas Vachuska}, title = {A Security-Mode for Carrier-Grade {SDN} Controllers}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {461--473}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134603}, doi = {10.1145/3134600.3134603}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YoonSPYKFOV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangPS17, author = {Mingwei Zhang and Michalis Polychronakis and R. Sekar}, title = {Protecting {COTS} Binaries from Disclosure-guided Code Reuse Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {128--140}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134634}, doi = {10.1145/3134600.3134634}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2017, title = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600}, doi = {10.1145/3134600}, isbn = {978-1-4503-5345-8}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AgadakosHDSP16, author = {Ioannis Agadakos and Per A. Hallgren and Dimitrios Damopoulos and Andrei Sabelfeld and Georgios Portokalidis}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Location-enhanced authentication using the IoT: because you cannot be in two places at once}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {251--264}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991090}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AgadakosHDSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Al-NaamiCMKLHT16, author = {Khaled Al{-}Naami and Swarup Chandra and Ahmad Mustafa and Latifur Khan and Zhiqiang Lin and Kevin W. Hamlen and Bhavani Thuraisingham}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Adaptive encrypted traffic fingerprinting with bi-directional dependence}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {177--188}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991123}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Al-NaamiCMKLHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlShehriC16, author = {Mohammad N. AlShehri and Heather Crawford}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Using image saliency and regions of interest to encourage stronger graphical passwords}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {127--138}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991108}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlShehriC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlacaO16, author = {Furkan Alaca and Paul C. van Oorschot}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Device fingerprinting for augmenting web authentication: classification and analysis of methods}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {289--301}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991091}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlacaO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlgwilCLY16, author = {Abdalnaser Algwil and Dan Ciresan and Bei{-}Bei Liu and Jeff Yan}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {A security analysis of automated chinese turing tests}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {520--532}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991083}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlgwilCLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AllanBFPY16, author = {Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Amplifying side channels through performance degradation}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {422--435}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991084}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AllanBFPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlrwaisYALOWL16, author = {Sumayah A. Alrwais and Kan Yuan and Eihal Alowaisheq and Xiaojing Liao and Alina Oprea and XiaoFeng Wang and Zhou Li}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Catching predators at watering holes: finding and understanding strategically compromised websites}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {153--166}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991112}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlrwaisYALOWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ApplebaumMSKW16, author = {Andy Applebaum and Doug Miller and Blake Strom and Chris Korban and Ross Wolf}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Intelligent, automated red team emulation}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {363--373}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991111}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ApplebaumMSKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BanescuCGNP16, author = {Sebastian Banescu and Christian S. Collberg and Vijay Ganesh and Zack Newsham and Alexander Pretschner}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Code obfuscation against symbolic execution attacks}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {189--200}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991114}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BanescuCGNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BeaumontMM16, author = {Mark R. Beaumont and Jim McCarthy and Toby C. Murray}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {533--545}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991087}, timestamp = {Thu, 08 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BeaumontMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiPE16, author = {Riccardo Bortolameotti and Andreas Peter and Maarten H. Everts and Willem Jonker and Pieter H. Hartel}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Reliably determining data leakage in the presence of strong attackers}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {484--495}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991095}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiPE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chang-FongE16, author = {Nicholas Chang{-}Fong and Aleksander Essex}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {324--335}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991106}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Chang-FongE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenJXL16, author = {Bo Chen and Shijie Jia and Luning Xia and Peng Liu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {496--507}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991101}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenJXL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16, author = {Andrea Continella and Alessandro Guagnelli and Giovanni Zingaro and Giulio De Pasquale and Alessandro Barenghi and Stefano Zanero and Federico Maggi}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {ShieldFS: a self-healing, ransomware-aware filesystem}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {336--347}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991110}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EtigowniTHZB16, author = {Sriharsha Etigowni and Dave (Jing) Tian and Grant Hernandez and Saman A. Zonouz and Kevin R. B. Butler}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{CPAC:} securing critical infrastructure with cyber-physical access control}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {139--152}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991126}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EtigowniTHZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FengS16, author = {Huan Feng and Kang G. Shin}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Understanding and defending the binder attack surface in Android}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {398--409}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991120}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FengS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HoangYG16, author = {Thang Hoang and Attila Altay Yavuz and Jorge Guajardo}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Practical and secure dynamic searchable encryption via oblivious access on distributed data structure}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {302--313}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991088}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HoangYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HorschWE16, author = {Julian Horsch and Sascha Wessel and Claudia Eckert}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {CoKey: fast token-based cooperative cryptography}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {314--323}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991117}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HorschWE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuangHML16, author = {Wei Huang and Zhen Huang and Dhaval Miyani and David Lie}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{LMP:} light-weighted memory protection with hardware assistance}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {460--470}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991089}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuangHML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InciIES16, author = {Mehmet Sinan Inci and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {436--447}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991113}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/InciIES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JansenTP16, author = {Kai Jansen and Nils Ole Tippenhauer and Christina P{\"{o}}pper}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Multi-receiver {GPS} spoofing detection: error models and realization}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {237--250}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991092}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JansenTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KarbabDDM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Cypider: building community-based cyber-defense infrastructure for android malware detection}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {348--362}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991124}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KarbabDDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimL016, author = {Hyungsub Kim and Sangho Lee and Jong Kim}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Inferring browser activity and status through remote monitoring of storage usage}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {410--421}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991080}, timestamp = {Thu, 08 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KimL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiZXJQH16, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Hai Jin and Hanchao Qi and Jie Hu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {VulPecker: an automated vulnerability detection system based on code similarity analysis}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {201--213}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991102}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiZXJQH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MarinSGCWP16, author = {Eduard Marin and Dave Singel{\'{e}}e and Flavio D. Garcia and Tom Chothia and Rik Willems and Bart Preneel}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {226--236}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991094}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MarinSGCWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MartinRB16, author = {Jeremy Martin and Erik C. Rye and Robert Beverly}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Decomposition of {MAC} address structure for granular device inference}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {78--88}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991098}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MartinRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MatsumotoSP16, author = {Stephanos Matsumoto and Samuel Steffen and Adrian Perrig}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{CASTLE:} {CA} signing in a touch-less environment}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {546--557}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991115}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MatsumotoSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MohamedS16, author = {Manar Mohamed and Nitesh Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Gametrics: towards attack-resilient behavioral authentication with simple cognitive games}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {277--288}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991096}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MohamedS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NappaMTKC16, author = {Antonio Nappa and Rana Faisal Munir and Irfan Khan Tanoli and Christian Kreibich and Juan Caballero}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {RevProbe: detecting silent reverse proxies in malicious server infrastructures}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {101--112}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991093}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NappaMTKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PeiGSM0ZSZX16, author = {Kexin Pei and Zhongshu Gu and Brendan Saltaformaggio and Shiqing Ma and Fei Wang and Zhiwei Zhang and Luo Si and Xiangyu Zhang and Dongyan Xu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{HERCULE:} attack story reconstruction via community discovery on correlated log graph}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {583--595}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991122}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PeiGSM0ZSZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyH16, author = {Jannik Pewny and Thorsten Holz}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {EvilCoder: automated bug insertion}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {214--225}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991103}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PewnyH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SarbinowskiKGA16, author = {Pawel Sarbinowski and Vasileios P. Kemerlis and Cristiano Giuffrida and Elias Athanasopoulos}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {VTPin: practical VTable hijacking protection for binaries}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {448--459}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991121}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SarbinowskiKGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchearCMRR16, author = {Nabil Schear and Patrick T. Cable II and Thomas M. Moyer and Bryan Richard and Robert Rudd}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Bootstrapping and maintaining trust in the cloud}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {65--77}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991104}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchearCMRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenTS16, author = {Shiqi Shen and Shruti Tople and Prateek Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Auror: defending against poisoning attacks in collaborative deep learning systems}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {508--519}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991125}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShenTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShiWHF16, author = {Yang Shi and Wujing Wei and Zongjian He and Hongfei Fan}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {16--29}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991086}, timestamp = {Sun, 15 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ShiWHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShresthaMTS16, author = {Babins Shrestha and Manar Mohamed and Sandeep Tamrakar and Nitesh Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Theft-resilient mobile wallets: transparently authenticating {NFC} users with tapping gesture biometrics}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {265--276}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991097}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShresthaMTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SommerAH16, author = {Robin Sommer and Johanna Amann and Seth Hall}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Spicy: a unified deep packet inspection framework for safely dissecting all your data}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {558--569}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991100}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SommerAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SonchackDASK16, author = {John Sonchack and Anurag Dubey and Adam J. Aviv and Jonathan M. Smith and Eric Keller}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Timing-based reconnaissance and defense in software-defined networks}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {89--100}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991081}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SonchackDASK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunHZZ16, author = {Pengfei Sun and Rui Han and Mingbo Zhang and Saman A. Zonouz}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Trace-free memory data structure forensics via past inference and future speculations}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {570--582}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991118}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunHZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunPGJ16, author = {Yuqiong Sun and Giuseppe Petracca and Xinyang Ge and Trent Jaeger}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Pileus: protecting user resources from vulnerable cloud services}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {52--64}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991109}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunPGJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TabriziP16, author = {Farid Molazem Tabrizi and Karthik Pattabiraman}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Formal security analysis of smart embedded systems}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {1--15}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991085}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TabriziP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ThaoO16, author = {Tran Phuong Thao and Kazumasa Omote}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{ELAR:} extremely lightweight auditing and repairing for cloud security}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {40--51}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991082}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ThaoO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TianCMCWT16, author = {Yuan Tian and Eric Yawei Chen and Xiaojun Ma and Shuo Chen and Xiao Wang and Patrick Tague}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Swords and shields: a study of mobile game hacks and existing defenses}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {386--397}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991119}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TianCMCWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TsankovPTVF16, author = {Petar Tsankov and Marco Pistoia and Omer Tripp and Martin T. Vechev and Pietro Ferrara}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{FASE:} functionality-aware security enforcement}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {471--483}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991116}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TsankovPTVF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangZLG16, author = {Hui Wang and Yuanyuan Zhang and Juanru Li and Dawu Gu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {167--176}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991105}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangZLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WooKAM16, author = {Simon S. Woo and Elsi Kaiser and Ron Artstein and Jelena Mirkovic}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Life-experience passwords (LEPs)}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {113--126}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991107}, timestamp = {Wed, 07 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WooKAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieZLW16, author = {Zhen Xie and Sencun Zhu and Qing Li and Wenjing Wang}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {You can promote, but you can't hide: large-scale abused app detection in mobile app stores}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {374--385}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991099}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangHL16, author = {Lei Yang and Abdulmalik Humayed and Fengjun Li}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {A multi-cloud based privacy-preserving data publishing scheme for the internet of things}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {30--39}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991127}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YangHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2016, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2991079}, doi = {10.1145/2991079}, isbn = {978-1-4503-4771-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlmeshekahGAS15, author = {Mohammed H. Almeshekah and Christopher N. Gutierrez and Mikhail J. Atallah and Eugene H. Spafford}, title = {ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {311--320}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818015}, doi = {10.1145/2818000.2818015}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AlmeshekahGAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivBK15, author = {Adam J. Aviv and Devon Budzitowski and Ravi Kuber}, title = {Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {301--310}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818014}, doi = {10.1145/2818000.2818014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BagciRMSH15, author = {Ibrahim Ethem Bagci and Utz Roedig and Ivan Martinovic and Matthias Schulz and Matthias Hollick}, title = {Using Channel State Information for Tamper Detection in the Internet of Things}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {131--140}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818028}, doi = {10.1145/2818000.2818028}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BagciRMSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BleikertzVGM15, author = {S{\"{o}}ren Bleikertz and Carsten Vogel and Thomas Gro{\ss} and Sebastian M{\"{o}}dersheim}, title = {Proactive Security Analysis of Changes in Virtualized Infrastructures}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {51--60}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818034}, doi = {10.1145/2818000.2818034}, timestamp = {Tue, 12 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BleikertzVGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BogaertsDLJ15, author = {Jasper Bogaerts and Maarten Decat and Bert Lagaisse and Wouter Joosen}, title = {Entity-Based Access Control: supporting more expressive access control policies}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {291--300}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818009}, doi = {10.1145/2818000.2818009}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BogaertsDLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoG0X15, author = {Chen Cao and Neng Gao and Peng Liu and Ji Xiang}, title = {Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {361--370}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818033}, doi = {10.1145/2818000.2818033}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaoG0X15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChangWCZ15, author = {Bing Chang and Zhan Wang and Bo Chen and Fengwei Zhang}, title = {MobiPluto: File System Friendly Deniable Storage for Mobile Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {381--390}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818046}, doi = {10.1145/2818000.2818046}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChangWCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CojocarZVBFB15, author = {Lucian Cojocar and Jonas Zaddach and Roel Verdult and Herbert Bos and Aur{\'{e}}lien Francillon and Davide Balzarotti}, title = {{PIE:} Parser Identification in Embedded Systems}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {251--260}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818035}, doi = {10.1145/2818000.2818035}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CojocarZVBFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CokerMDGS15, author = {Zack Coker and Michael Maass and Tianyuan Ding and Claire {Le Goues} and Joshua Sunshine}, title = {Evaluating the Flexibility of the Java Sandbox}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {1--10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818003}, doi = {10.1145/2818000.2818003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CokerMDGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DecatLJ15, author = {Maarten Decat and Bert Lagaisse and Wouter Joosen}, title = {Scalable and Secure Concurrent Evaluation of History-based Access Control Policies}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {281--290}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818008}, doi = {10.1145/2818000.2818008}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DecatLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EdwardsHFE15, author = {Benjamin Edwards and Steven A. Hofmeyr and Stephanie Forrest and Michel van Eeten}, title = {Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {391--400}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818010}, doi = {10.1145/2818000.2818010}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EdwardsHFE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15, author = {Luca Falsina and Yanick Fratantonio and Stefano Zanero and Christopher Kruegel and Giovanni Vigna and Federico Maggi}, title = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {201--210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818042}, doi = {10.1145/2818000.2818042}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FerraraTP15, author = {Pietro Ferrara and Omer Tripp and Marco Pistoia}, title = {MorphDroid: Fine-grained Privacy Verification}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {371--380}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818037}, doi = {10.1145/2818000.2818037}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FerraraTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoMSZ15, author = {Song Gao and Manar Mohamed and Nitesh Saxena and Chengcui Zhang}, title = {Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {11--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818006}, doi = {10.1145/2818000.2818006}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoMSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GelernterGH15, author = {Nethanel Gelernter and Yoel Grinstein and Amir Herzberg}, title = {Cross-Site Framing Attacks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {161--170}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818029}, doi = {10.1145/2818000.2818029}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GelernterGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GkaniatsouMBSFB15, author = {Andriana Gkaniatsou and Fiona McNeill and Alan Bundy and Graham Steel and Riccardo Focardi and Claudio Bozzato}, title = {Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {441--450}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818020}, doi = {10.1145/2818000.2818020}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GkaniatsouMBSFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GotzfriedMCMFV15, author = {Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Ruan de Clercq and Pieter Maene and Felix C. Freiling and Ingrid Verbauwhede}, title = {Soteria: Offline Software Protection within Low-cost Embedded Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {241--250}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2856129}, doi = {10.1145/2818000.2856129}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GotzfriedMCMFV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HallerGAPB15, author = {Istv{\'{a}}n Haller and Enes G{\"{o}}ktas and Elias Athanasopoulos and Georgios Portokalidis and Herbert Bos}, title = {ShrinkWrap: VTable Protection without Loose Ends}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {341--350}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818025}, doi = {10.1145/2818000.2818025}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HallerGAPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HupperichMKHG15, author = {Thomas Hupperich and Davide Maiorca and Marc K{\"{u}}hrer and Thorsten Holz and Giorgio Giacinto}, title = {On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {191--200}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818032}, doi = {10.1145/2818000.2818032}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HupperichMKHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JiYWLLB15, author = {Shouling Ji and Shukun Yang and Ting Wang and Changchang Liu and Wei{-}Han Lee and Raheem A. Beyah}, title = {{PARS:} {A} Uniform and Open-source Password Analysis and Research System}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {321--330}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818018}, doi = {10.1145/2818000.2818018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JiYWLLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KrentzM15, author = {Konrad{-}Felix Krentz and Christoph Meinel}, title = {Handling Reboots and Mobility in 802.15.4 Security}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {121--130}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818002}, doi = {10.1145/2818000.2818002}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KrentzM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiDP15, author = {Letitia W. Li and Guillaume Duc and Renaud Pacalet}, title = {Hardware-assisted Memory Tracing on New SoCs Embedding {FPGA} Fabrics}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {461--470}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818030}, doi = {10.1145/2818000.2818030}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiHYG15, author = {Tianlin Li and Yaohui Hu and Ping Yang and Kartik Gopalan}, title = {Privacy-preserving Virtual Machine}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {231--240}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818044}, doi = {10.1145/2818000.2818044}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiHYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaLKRZX15, author = {Shiqing Ma and Kyu Hyung Lee and Chung Hwan Kim and Junghwan Rhee and Xiangyu Zhang and Dongyan Xu}, title = {Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {401--410}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818039}, doi = {10.1145/2818000.2818039}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MaLKRZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MastiMKSC15, author = {Ramya Jayaram Masti and Claudio Marforio and Kari Kostiainen and Claudio Soriente and Srdjan Capkun}, title = {Logical Partitions on Many-Core Platforms}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {451--460}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818026}, doi = {10.1145/2818000.2818026}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MastiMKSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MayerV15, author = {Peter Mayer and Melanie Volkamer}, title = {Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {431--440}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818043}, doi = {10.1145/2818000.2818043}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MayerV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuttiBP15, author = {Simone Mutti and Enrico Bacis and Stefano Paraboschi}, title = {SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {411--420}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818041}, doi = {10.1145/2818000.2818041}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MuttiBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15, author = {Simone Mutti and Yanick Fratantonio and Antonio Bianchi and Luca Invernizzi and Jacopo Corbetta and Dhilung Kirat and Christopher Kruegel and Giovanni Vigna}, title = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {71--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818036}, doi = {10.1145/2818000.2818036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PanticH15, author = {Nick Pantic and Mohammad Iftekhar Husain}, title = {Covert Botnet Command and Control Using Twitter}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {171--180}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818047}, doi = {10.1145/2818000.2818047}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PanticH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PetraccaSJA15, author = {Giuseppe Petracca and Yuqiong Sun and Trent Jaeger and Ahmad Atamli}, title = {AuDroid: Preventing Attacks on Audio Channels in Mobile Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {181--190}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818005}, doi = {10.1145/2818000.2818005}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PetraccaSJA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PetsiosKPK15, author = {Theofilos Petsios and Vasileios P. Kemerlis and Michalis Polychronakis and Angelos D. Keromytis}, title = {DynaGuard: Armoring Canary-based Protections against Brute-force Attacks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {351--360}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818031}, doi = {10.1145/2818000.2818031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PetsiosKPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PettaiL15, author = {Martin Pettai and Peeter Laud}, title = {Combining Differential Privacy and Secure Multiparty Computation}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {421--430}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818027}, doi = {10.1145/2818000.2818027}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PettaiL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PrakashY15, author = {Aravind Prakash and Heng Yin}, title = {Defeating {ROP} Through Denial of Stack Pivot}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {111--120}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818023}, doi = {10.1145/2818000.2818023}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PrakashY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/QiaoZS15, author = {Rui Qiao and Mingwei Zhang and R. Sekar}, title = {A Principled Approach for {ROP} Defense}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {101--110}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818021}, doi = {10.1145/2818000.2818021}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/QiaoZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RanganathanDC15, author = {Aanjhan Ranganathan and Boris Danev and Srdjan Capkun}, title = {Proximity Verification for Contactless Access Control and Authentication Systems}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {271--280}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818004}, doi = {10.1145/2818000.2818004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RanganathanDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RaykovaLKG15, author = {Mariana Raykova and Hasnain Lakhani and Hasanat Kazmi and Ashish Gehani}, title = {Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {31--40}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818001}, doi = {10.1145/2818000.2818001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RaykovaLKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RoyDLHCORLG15, author = {Sankardas Roy and Jordan DeLoach and Yuping Li and Nic Herndon and Doina Caragea and Xinming Ou and Venkatesh Prasad Ranganath and Hongmin Li and Nicolais Guevara}, title = {Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {81--90}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818038}, doi = {10.1145/2818000.2818038}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RoyDLHCORLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianS15, author = {Maliheh Shirvanian and Nitesh Saxena}, title = {On the Security and Usability of Crypto Phones}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {21--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818007}, doi = {10.1145/2818000.2818007}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SzeS15, author = {Wai{-}Kit Sze and R. Sekar}, title = {Provenance-based Integrity Protection for Windows}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {211--220}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818011}, doi = {10.1145/2818000.2818011}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SzeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TianBB15, author = {Jing (Dave) Tian and Adam Bates and Kevin R. B. Butler}, title = {Defending Against Malicious {USB} Firmware with GoodUSB}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {261--270}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818040}, doi = {10.1145/2818000.2818040}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TianBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TranPS15, author = {Tung Tran and Riccardo Pelizzi and R. Sekar}, title = {JaTE: Transparent and Efficient JavaScript Confinement}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {151--160}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818019}, doi = {10.1145/2818000.2818019}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TranPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ValenteC15, author = {Junia Valente and Alvaro A. C{\'{a}}rdenas}, title = {Using Visual Challenges to Verify the Integrity of Security Cameras}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {141--150}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818045}, doi = {10.1145/2818000.2818045}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ValenteC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangYBSF15, author = {Minghua Wang and Heng Yin and Abhishek Vasisht Bhaskar and Purui Su and Dengguo Feng}, title = {Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {331--340}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818017}, doi = {10.1145/2818000.2818017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangYBSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangZLLYLG15, author = {Hui Wang and Yuanyuan Zhang and Juanru Li and Hui Liu and Wenbo Yang and Bodong Li and Dawu Gu}, title = {Vulnerability Assessment of OAuth Implementations in Android Applications}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {61--70}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818024}, doi = {10.1145/2818000.2818024}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangZLLYLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiYH15, author = {Jinpeng Wei and Lok K. Yan and Muhammad Azizul Hakim}, title = {{MOSE:} Live Migration Based On-the-Fly Software Emulation}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {221--230}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818022}, doi = {10.1145/2818000.2818022}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeiYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZandHVKK15, author = {Ali Zand and Amir Houmansadr and Giovanni Vigna and Richard A. Kemmerer and Christopher Kruegel}, title = {Know Your Achilles' Heel: Automatic Detection of Network Critical Services}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {41--50}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818012}, doi = {10.1145/2818000.2818012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZandHVKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangS15, author = {Mingwei Zhang and R. Sekar}, title = {Control Flow and Code Integrity for {COTS} binaries: An Effective Defense Against Real-World {ROP} Attacks}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {91--100}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818016}, doi = {10.1145/2818000.2818016}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2015, title = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2818000}, isbn = {978-1-4503-3682-6}, timestamp = {Tue, 15 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AltBD14, author = {Lance Alt and Robert Beverly and Alberto Dainotti}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Uncovering network tarpits with degreaser}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {156--165}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664285}, doi = {10.1145/2664243.2664285}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AltBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivF14, author = {Adam J. Aviv and Dane Fichter}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Understanding visual perceptions of usability and security of Android's graphical password pattern}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {286--295}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664253}, doi = {10.1145/2664243.2664253}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BackesBG14, author = {Michael Backes and Sven Bugiel and Sebastian Gerling}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Scippa: system-centric {IPC} provenance on Android}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {36--45}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664264}, doi = {10.1145/2664243.2664264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BackesBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BackesBGS14, author = {Michael Backes and Sven Bugiel and Sebastian Gerling and Philipp von Styp{-}Rekowsky}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Android security framework: extensible multi-layered access control on Android}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {46--55}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664265}, doi = {10.1145/2664243.2664265}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BackesBGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BalduzziPW14, author = {Marco Balduzzi and Alessandro Pasta and Kyle Wilhoit}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {A security evaluation of {AIS} automated identification system}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {436--445}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664257}, doi = {10.1145/2664243.2664257}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BalduzziPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BarretoCQM14, author = {Carlos A. Barreto and Alvaro A. C{\'{a}}rdenas and Nicanor Quijano and Eduardo Mojica{-}Nava}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{CPS:} market analysis of attacks against demand response in the smart grid}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {136--145}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664284}, doi = {10.1145/2664243.2664284}, timestamp = {Tue, 01 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BarretoCQM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BiedermannKS14, author = {Sebastian Biedermann and Stefan Katzenbeisser and Jakub Szefer}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Hot-hardening: getting more out of your security settings}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {6--15}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664246}, doi = {10.1145/2664243.2664246}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BiedermannKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BleikertzVG14, author = {S{\"{o}}ren Bleikertz and Carsten Vogel and Thomas Gro{\ss}}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {26--35}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664274}, doi = {10.1145/2664243.2664274}, timestamp = {Tue, 12 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BleikertzVG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoPCZ14, author = {Yinzhi Cao and Xiang Pan and Yan Chen and Jianwei Zhuge}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {466--475}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664256}, doi = {10.1145/2664243.2664256}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaoPCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CarnavaletM14, author = {Xavier de Carn{\'{e}} de Carnavalet and Mohammad Mannan}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Challenges and implications of verifiable builds for security-critical open-source software}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {16--25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664288}, doi = {10.1145/2664243.2664288}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CarnavaletM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CarterLT14, author = {Henry Carter and Charles Lever and Patrick Traynor}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Whitewash: outsourcing garbled circuit generation for mobile devices}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {266--275}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664255}, doi = {10.1145/2664243.2664255}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CarterLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DabrowskiPKMW14, author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Mulazzani and Edgar R. Weippl}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {IMSI-catch me if you can: IMSI-catcher-catchers}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {246--255}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664272}, doi = {10.1145/2664243.2664272}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DabrowskiPKMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DavidsonFL14, author = {Drew Davidson and Matt Fredrikson and Benjamin Livshits}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {MoRePriv: mobile {OS} support for application personalization and privacy}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {236--245}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664266}, doi = {10.1145/2664243.2664266}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DavidsonFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DenningKFRGK14, author = {Tamara Denning and Daniel B. Kramer and Batya Friedman and Matthew R. Reynolds and Brian T. Gill and Tadayoshi Kohno}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{CPS:} beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {426--435}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664289}, doi = {10.1145/2664243.2664289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DenningKFRGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DumanOURK14, author = {Sevtap Duman and Kaan Onarlioglu and Ali Osman Ulusoy and William K. Robertson and Engin Kirda}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {TrueClick: automatically distinguishing trick banners from genuine download links}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {456--465}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664279}, doi = {10.1145/2664243.2664279}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DumanOURK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EignerMPPK14, author = {Fabienne Eigner and Matteo Maffei and Ivan Pryvalov and Francesca Pampaloni and Aniket Kate}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Differentially private data aggregation with optimal utility}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {316--325}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664263}, doi = {10.1145/2664243.2664263}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EignerMPPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FengPYL14, author = {Qian Feng and Aravind Prakash and Heng Yin and Zhiqiang Lin}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{MACE:} high-coverage and robust memory analysis for commodity operating systems}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {196--205}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664248}, doi = {10.1145/2664243.2664248}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FengPYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoYBCDLC14, author = {Hongyu Gao and Yi Yang and Kai Bu and Yan Chen and Doug Downey and Kathy Lee and Alok N. Choudhary}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Spam ain't as diverse as it seems: throttling {OSN} spam with templates underneath}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {76--85}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664251}, doi = {10.1145/2664243.2664251}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoYBCDLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GawlikH14, author = {Robert Gawlik and Thorsten Holz}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Towards automated integrity protection of {C++} virtual function tables in binary programs}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {396--405}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664249}, doi = {10.1145/2664243.2664249}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GawlikH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GervaisCKG14, author = {Arthur Gervais and Srdjan Capkun and Ghassan O. Karame and Damian Gruber}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {On the privacy provisions of Bloom filters in lightweight bitcoin clients}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {326--335}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664267}, doi = {10.1145/2664243.2664267}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GervaisCKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GiontaAENZ14, author = {Jason Gionta and Ahmed M. Azab and William Enck and Peng Ning and Xiaolan Zhang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{SEER:} practical memory virus scanning as a service}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {186--195}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664271}, doi = {10.1145/2664243.2664271}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GiontaAENZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GroefMP14, author = {Willem De Groef and Fabio Massacci and Frank Piessens}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {NodeSentry: least-privilege library integration for server-side JavaScript}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {446--455}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664276}, doi = {10.1145/2664243.2664276}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GroefMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HadziosmanovicSZH14, author = {Dina Hadziosmanovic and Robin Sommer and Emmanuele Zambon and Pieter H. Hartel}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Through the eye of the {PLC:} semantic security monitoring for industrial processes}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {126--135}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664277}, doi = {10.1145/2664243.2664277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HadziosmanovicSZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HanMCZ14, author = {Rui Han and Alejandro Mesa and Mihai Christodorescu and Saman A. Zonouz}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {TroGuard: context-aware protection against web-based socially engineered trojans}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {66--75}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664270}, doi = {10.1145/2664243.2664270}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HanMCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HerzbergS14, author = {Amir Herzberg and Haya Schulmann}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{DNS} authentication as a service: preventing amplification attacks}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {356--365}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664281}, doi = {10.1145/2664243.2664281}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HerzbergS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HerzbergSC14, author = {Amir Herzberg and Haya Schulmann and Bruno Crispo}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Less is more: cipher-suite negotiation for {DNSSEC}}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {346--355}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664283}, doi = {10.1145/2664243.2664283}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HerzbergSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JingZAH14, author = {Yiming Jing and Ziming Zhao and Gail{-}Joon Ahn and Hongxin Hu}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Morpheus: automatically generating heuristics to detect Android emulators}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {216--225}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664250}, doi = {10.1145/2664243.2664250}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JingZAH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimLK14, author = {Hyungsub Kim and Sangho Lee and Jong Kim}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Exploring and mitigating privacy threats of {HTML5} geolocation {API}}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {306--315}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664247}, doi = {10.1145/2664243.2664247}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KimLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KrotofilCML14, author = {Marina Krotofil and Alvaro A. C{\'{a}}rdenas and Bradley Manning and Jason Larsen}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{CPS:} driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {146--155}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664290}, doi = {10.1145/2664243.2664290}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KrotofilCML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LengyelMPWVK14, author = {Tamas K. Lengyel and Steve Maresca and Bryan D. Payne and George D. Webster and Sebastian Vogl and Aggelos Kiayias}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Scalability, fidelity and stealth in the {DRAKVUF} dynamic malware analysis system}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {386--395}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664252}, doi = {10.1145/2664243.2664252}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LengyelMPWVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaoCGT14, author = {Weixuan Mao and Zhongmin Cai and Xiaohong Guan and Don Towsley}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Centrality metrics of importance in access behaviors and malware detections}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {376--385}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664286}, doi = {10.1145/2664243.2664286}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MaoCGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MeutznerNHK14, author = {Hendrik Meutzner and Viet{-}Hung Nguyen and Thorsten Holz and Dorothea Kolossa}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {276--285}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664262}, doi = {10.1145/2664243.2664262}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MeutznerNHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NakiblySMWE14, author = {Gabi Nakibly and Adi Sosnovich and Eitan Menahem and Ariel Waizel and Yuval Elovici}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{OSPF} vulnerability to persistent poisoning attacks: a systematic analysis}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {336--345}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664278}, doi = {10.1145/2664243.2664278}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NakiblySMWE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OliveiraRMYCZ14, author = {Daniela Oliveira and Marissa Rosenthal and Nicole Morin and Kuo{-}Chuan (Martin) Yeh and Justin Cappos and Yanyan Zhuang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {296--305}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664254}, doi = {10.1145/2664243.2664254}, timestamp = {Mon, 24 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/OliveiraRMYCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnySBHR14, author = {Jannik Pewny and Felix Schuster and Lukas Bernhard and Thorsten Holz and Christian Rossow}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Leveraging semantic signatures for bug search in binary programs}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {406--415}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664269}, doi = {10.1145/2664243.2664269}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnySBHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PomonisPJPK14, author = {Marios Pomonis and Theofilos Petsios and Kangkook Jee and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {IntFlow: improving the accuracy of arithmetic error detection using information flow tracking}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {416--425}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664282}, doi = {10.1145/2664243.2664282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PomonisPJPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RafiqueCHJ14, author = {M. Zubair Rafique and Juan Caballero and Christophe Huygens and Wouter Joosen}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Network dialog minimization and network dialog diffing: two novel primitives for network security applications}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {166--175}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664261}, doi = {10.1145/2664243.2664261}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RafiqueCHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RitzdorfKC14, author = {Hubert Ritzdorf and Nikolaos Karapanos and Srdjan Capkun}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Assisted deletion of related content}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {206--215}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664287}, doi = {10.1145/2664243.2664287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RitzdorfKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Rubin14, author = {Aviel D. Rubin}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {1--5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2684461}, doi = {10.1145/2664243.2684461}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Rubin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShaoLQZ014, author = {Yuru Shao and Xiapu Luo and Chenxiong Qian and Pengfei Zhu and Lei Zhang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Towards a scalable resource-driven approach for detecting repackaged Android applications}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {56--65}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664275}, doi = {10.1145/2664243.2664275}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShaoLQZ014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SlankasXWX14, author = {John Slankas and Xusheng Xiao and Laurie A. Williams and Tao Xie}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Relation extraction for inferring access control rules from natural language artifacts}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {366--375}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664280}, doi = {10.1145/2664243.2664280}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SlankasXWX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Strackx0P14, author = {Raoul Strackx and Bart Jacobs and Frank Piessens}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{ICE:} a passive, high-speed, state-continuity scheme}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {106--115}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664259}, doi = {10.1145/2664243.2664259}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Strackx0P14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunZLJ14, author = {Mingshen Sun and Min Zheng and John C. S. Lui and Xuxian Jiang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Design and implementation of an Android host-based intrusion prevention system}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {226--235}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664245}, doi = {10.1145/2664243.2664245}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunZLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TanBG14, author = {Samuel Junjie Tan and Sergey Bratus and Travis Goodspeed}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {116--125}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664268}, doi = {10.1145/2664243.2664268}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TanBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TangWLHJ14, author = {Yuzhe Richard Tang and Ting Wang and Ling Liu and Xin Hu and Jiyong Jang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Lightweight authentication of freshness in outsourced key-value stores}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {176--185}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664244}, doi = {10.1145/2664243.2664244}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TangWLHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VanhoefP14, author = {Mathy Vanhoef and Frank Piessens}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Advanced Wi-Fi attacks using commodity hardware}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {256--265}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664260}, doi = {10.1145/2664243.2664260}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/VanhoefP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZG14, author = {Chao Yang and Jialong Zhang and Guofei Gu}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {A taste of tweets: reverse engineering Twitter spammers}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {86--95}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664258}, doi = {10.1145/2664243.2664258}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangL14, author = {Tianwei Zhang and Ruby B. Lee}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {New models of cache architectures characterizing information leakage from cache side channels}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {96--105}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664273}, doi = {10.1145/2664243.2664273}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2014, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2664243}, isbn = {978-1-4503-3005-3}, timestamp = {Sat, 06 Dec 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AkpulatBC13, author = {Murat Akpulat and Kemal Bicakci and Ugur Cil}, editor = {Charles N. Payne Jr.}, title = {Revisiting graphical passwords for augmenting, not replacing, text passwords}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {119--128}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523672}, doi = {10.1145/2523649.2523672}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AkpulatBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AmannSVH13, author = {B. Amann and Robin Sommer and Matthias Vallentin and Seth Hall}, editor = {Charles N. Payne Jr.}, title = {No attack necessary: the surprising dynamics of {SSL} trust relationships}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {179--188}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523665}, doi = {10.1145/2523649.2523665}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AmannSVH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BoggsWMCP13, author = {Nathaniel Boggs and Wei Wang and Suhas Mathur and Baris Coskun and Carol Pincock}, editor = {Charles N. Payne Jr.}, title = {Discovery of emergent malicious campaigns in cellular networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {29--38}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523657}, doi = {10.1145/2523649.2523657}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BoggsWMCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BonettiVFMZ13, author = {Gabriele Bonetti and Marco Viglione and Alessandro Frossi and Federico Maggi and Stefano Zanero}, editor = {Charles N. Payne Jr.}, title = {A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {269--278}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523660}, doi = {10.1145/2523649.2523660}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BonettiVFMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DengZX13, author = {Zhui Deng and Xiangyu Zhang and Dongyan Xu}, editor = {Charles N. Payne Jr.}, title = {{SPIDER:} stealthy binary program instrumentation and debugging via hardware virtualization}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {289--298}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523675}, doi = {10.1145/2523649.2523675}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DengZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FuLH13, author = {Yangchun Fu and Zhiqiang Lin and Kevin W. Hamlen}, editor = {Charles N. Payne Jr.}, title = {Subverting system authentication with context-aware, reactive virtual machine introspection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {229--238}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523664}, doi = {10.1145/2523649.2523664}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FuLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GarmanyM13, author = {Behrad Garmany and Tilo M{\"{u}}ller}, editor = {Charles N. Payne Jr.}, title = {{PRIME:} private {RSA} infrastructure for memory-less encryption}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {149--158}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523656}, doi = {10.1145/2523649.2523656}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GarmanyM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GauthierLM13, author = {Fran{\c{c}}ois Gauthier and Thierry Lavoie and Ettore Merlo}, editor = {Charles N. Payne Jr.}, title = {Uncovering access control weaknesses and flaws with security-discordant software clones}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {209--218}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523650}, doi = {10.1145/2523649.2523650}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GauthierLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GerdesWH13, author = {Ryan M. Gerdes and Chris Winstead and Kevin P. Heaslip}, editor = {Charles N. Payne Jr.}, title = {{CPS:} an efficiency-motivated attack against autonomous vehicular transportation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {99--108}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523658}, doi = {10.1145/2523649.2523658}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GerdesWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HerzbergS13, author = {Amir Herzberg and Haya Schulmann}, editor = {Charles N. Payne Jr.}, title = {Socket overloading for fun and cache-poisoning}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {189--198}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523662}, doi = {10.1145/2523649.2523662}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HerzbergS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuS13, author = {Xin Hu and Kang G. Shin}, editor = {Charles N. Payne Jr.}, title = {{DUET:} integration of dynamic and static analyses for malware clustering with cluster ensembles}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {79--88}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523677}, doi = {10.1145/2523649.2523677}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HustedMSG13, author = {Nathaniel Husted and Steven A. Myers and Abhi Shelat and Paul Grubbs}, editor = {Charles N. Payne Jr.}, title = {{GPU} and {CPU} parallelization of honest-but-curious secure two-party computation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {169--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523681}, doi = {10.1145/2523649.2523681}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HustedMSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/InvernizziKV13, author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, editor = {Charles N. Payne Jr.}, title = {Message in a bottle: sailing past censorship}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {39--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523654}, doi = {10.1145/2523649.2523654}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiratNVM13, author = {Dhilung Kirat and Lakshmanan Nataraj and Giovanni Vigna and B. S. Manjunath}, editor = {Charles N. Payne Jr.}, title = {SigMal: a static signal processing based malware triage}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {89--98}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523682}, doi = {10.1145/2523649.2523682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiratNVM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Landwehr13, author = {Carl E. Landwehr}, editor = {Charles N. Payne Jr.}, title = {A building code for building code: putting what we know works to work}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {139--147}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2530278}, doi = {10.1145/2523649.2530278}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Landwehr13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LangeL13, author = {Matthias Lange and Steffen Liebergeld}, editor = {Charles N. Payne Jr.}, title = {Crossover: secure and usable user interface for mobile devices with multiple isolated {OS} personalities}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {249--257}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523667}, doi = {10.1145/2523649.2523667}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LangeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiZBYL13, author = {Min Li and Wanyu Zang and Kun Bai and Meng Yu and Peng Liu}, editor = {Charles N. Payne Jr.}, title = {MyCloud: supporting user-configured privacy protection in cloud computing}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {59--68}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523680}, doi = {10.1145/2523649.2523680}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiZBYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McLaughlin13, author = {Stephen E. McLaughlin}, editor = {Charles N. Payne Jr.}, title = {{CPS:} stateful policy enforcement for control system device usage}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {109--118}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523673}, doi = {10.1145/2523649.2523673}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McLaughlin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MullinerORK13, author = {Collin Mulliner and Jon Oberheide and William K. Robertson and Engin Kirda}, editor = {Charles N. Payne Jr.}, title = {PatchDroid: scalable third-party security patches for Android devices}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {259--268}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523679}, doi = {10.1145/2523649.2523679}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MullinerORK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MundadaRF13, author = {Yogesh Mundada and Anirudh Ramachandran and Nick Feamster}, editor = {Charles N. Payne Jr.}, title = {SilverLine: preventing data leaks from compromised web applications}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {329--338}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523663}, doi = {10.1145/2523649.2523663}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MundadaRF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NagyCDAS13, author = {Marcin Nagy and Emiliano De Cristofaro and Alexandra Dmitrienko and N. Asokan and Ahmad{-}Reza Sadeghi}, editor = {Charles N. Payne Jr.}, title = {Do {I} know you?: efficient and privacy-preserving common friend-finder protocols and applications}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {159--168}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523668}, doi = {10.1145/2523649.2523668}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NagyCDAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PalahanBCK13, author = {Sirinda Palahan and Domagoj Babic and Swarat Chaudhuri and Daniel Kifer}, editor = {Charles N. Payne Jr.}, title = {Extraction of statistically significant malware behaviors}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {69--78}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523659}, doi = {10.1145/2523649.2523659}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PalahanBCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PapadopoulosPPZHM13, author = {Panagiotis Papadopoulos and Antonis Papadogiannakis and Michalis Polychronakis and Apostolis Zarras and Thorsten Holz and Evangelos P. Markatos}, editor = {Charles N. Payne Jr.}, title = {k-subscription: privacy-preserving microblogging browsing through obfuscation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {49--58}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523671}, doi = {10.1145/2523649.2523671}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PapadopoulosPPZHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyH13, author = {Jannik Pewny and Thorsten Holz}, editor = {Charles N. Payne Jr.}, title = {Control-flow restrictor: compiler-based {CFI} for iOS}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {309--318}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523674}, doi = {10.1145/2523649.2523674}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnyH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PolakisVAM13, author = {Iasonas Polakis and Stamatis Volanis and Elias Athanasopoulos and Evangelos P. Markatos}, editor = {Charles N. Payne Jr.}, title = {The man who \emph{was} there: validating check-ins in location-based services}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {19--28}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523653}, doi = {10.1145/2523649.2523653}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PolakisVAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RahmanTC13, author = {Mahmudur Rahman and Umut Topkara and Bogdan Carbunar}, editor = {Charles N. Payne Jr.}, title = {Seeing is not believing: visual verifications through liveness analysis using mobile devices}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {239--248}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523666}, doi = {10.1145/2523649.2523666}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RahmanTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RohrerZCZ13, author = {Felix Rohrer and Yuting Zhang and Lou Chitkushev and Tanya Zlateva}, editor = {Charles N. Payne Jr.}, title = {{DR} {BACA:} dynamic role based access control for Android}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {299--308}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523676}, doi = {10.1145/2523649.2523676}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RohrerZCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RusselloJNM13, author = {Giovanni Russello and Arturo Blas Jimenez and Habib Naderi and Wannes van der Mark}, editor = {Charles N. Payne Jr.}, title = {FireDroid: hardening security in almost-stock Android}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {319--328}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523678}, doi = {10.1145/2523649.2523678}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RusselloJNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchmidtJ13, author = {David Schmidt and Trent Jaeger}, editor = {Charles N. Payne Jr.}, title = {Pitfalls in the automated strengthening of passwords}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {129--138}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523651}, doi = {10.1145/2523649.2523651}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchmidtJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SzeS13, author = {Wai{-}Kit Sze and R. Sekar}, editor = {Charles N. Payne Jr.}, title = {A portable user-level approach for system-wide integrity protection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {219--228}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523655}, doi = {10.1145/2523649.2523655}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SzeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WilberdingYSZ13, author = {Jordan Wilberding and Andrew Yates and Micah Sherr and Wenchao Zhou}, editor = {Charles N. Payne Jr.}, title = {Validating web content with senser}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {339--348}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523669}, doi = {10.1145/2523649.2523669}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WilberdingYSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YenOOLRJK13, author = {Ting{-}Fang Yen and Alina Oprea and Kaan Onarlioglu and Todd Leetham and William K. Robertson and Ari Juels and Engin Kirda}, editor = {Charles N. Payne Jr.}, title = {Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {199--208}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523670}, doi = {10.1145/2523649.2523670}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YenOOLRJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YoungL13, author = {William Young and Nancy G. Leveson}, editor = {Charles N. Payne Jr.}, title = {Systems thinking for safety and security}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {1--8}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2530277}, doi = {10.1145/2523649.2530277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YoungL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZaddachKBBFGGK13, author = {Jonas Zaddach and Anil Kurmus and Davide Balzarotti and Erik{-}Oliver Blass and Aur{\'{e}}lien Francillon and Travis Goodspeed and Moitrayee Gupta and Ioannis Koltsidas}, editor = {Charles N. Payne Jr.}, title = {Implementation and implications of a stealth hard-drive backdoor}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {279--288}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523661}, doi = {10.1145/2523649.2523661}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZaddachKBBFGGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangAD13, author = {Xiao Zhang and Amit Ahlawat and Wenliang Du}, editor = {Charles N. Payne Jr.}, title = {AFrame: isolating advertisements from mobile applications in Android}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {9--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523652}, doi = {10.1145/2523649.2523652}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZohrevandiB13, author = {Mohsen Zohrevandi and Rida A. Bazzi}, editor = {Charles N. Payne Jr.}, title = {Auto-FBI: a user-friendly approach for secure access to sensitive content on the web}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {349--358}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523683}, doi = {10.1145/2523649.2523683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZohrevandiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2013, editor = {Charles N. Payne Jr.}, title = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2523649}, isbn = {978-1-4503-2015-3}, timestamp = {Wed, 08 Jan 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AgtenABPDP12, author = {Pieter Agten and Steven {Van Acker} and Yoran Brondsema and Phu H. Phung and Lieven Desmet and Frank Piessens}, editor = {Robert H'obbes' Zakon}, title = {JSand: complete client-side sandboxing of third-party JavaScript without browser modifications}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {1--10}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420952}, doi = {10.1145/2420950.2420952}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AgtenABPDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Alexander12, author = {Susan D. Alexander}, editor = {Robert H'obbes' Zakon}, title = {Trust engineering: rejecting the tyranny of the weakest link}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {145--148}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420973}, doi = {10.1145/2420950.2420973}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Alexander12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlrwaisGDSGO12, author = {Sumayah A. Alrwais and Alexandre Gerber and Christopher W. Dunn and Oliver Spatscheck and Minaxi Gupta and Eric Osterweil}, editor = {Robert H'obbes' Zakon}, title = {Dissecting ghost clicks: ad fraud via misdirected human clicks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {21--30}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420954}, doi = {10.1145/2420950.2420954}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlrwaisGDSGO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Anderson12, author = {Ross J. Anderson}, editor = {Robert H'obbes' Zakon}, title = {Security economics: a personal perspective}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {139--144}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420971}, doi = {10.1145/2420950.2420971}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Anderson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivSBS12, author = {Adam J. Aviv and Benjamin Sapp and Matt Blaze and Jonathan M. Smith}, editor = {Robert H'obbes' Zakon}, title = {Practicality of accelerometer side channels on smartphones}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {41--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420957}, doi = {10.1145/2420950.2420957}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BilgeBRKK12, author = {Leyla Bilge and Davide Balzarotti and William K. Robertson and Engin Kirda and Christopher Kruegel}, editor = {Robert H'obbes' Zakon}, title = {Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {129--138}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420969}, doi = {10.1145/2420950.2420969}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BilgeBRKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BlassR12, author = {Erik{-}Oliver Blass and William Robertson}, editor = {Robert H'obbes' Zakon}, title = {{TRESOR-HUNT:} attacking CPU-bound encryption}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {71--78}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420961}, doi = {10.1145/2420950.2420961}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BlassR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CollbergMMN12, author = {Christian S. Collberg and Sam Martin and Jonathan Myers and Jasvir Nagra}, editor = {Robert H'obbes' Zakon}, title = {Distributed application tamper detection via continuous software updates}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {319--328}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420997}, doi = {10.1145/2420950.2420997}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CollbergMMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DangZGCQX12, author = {Yingnong Dang and Dongmei Zhang and Song Ge and Chengyun Chu and Yingjun Qiu and Tao Xie}, editor = {Robert H'obbes' Zakon}, title = {{XIAO:} tuning code clones at hands of engineers in practice}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {369--378}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421004}, doi = {10.1145/2420950.2421004}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DangZGCQX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DiesburgMSMMGWK12, author = {Sarah M. Diesburg and Christopher R. Meyers and Mark J. Stanovich and Michael Mitchell and Justin Marshall and Julia Gould and An{-}I Andy Wang and Geoff Kuenning}, editor = {Robert H'obbes' Zakon}, title = {TrueErase: per-file secure deletion for the storage data path}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {439--448}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421013}, doi = {10.1145/2420950.2421013}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DiesburgMSMMGWK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DunphyO12, author = {Paul Dunphy and Patrick Olivier}, editor = {Robert H'obbes' Zakon}, title = {On automated image choice for secure and usable graphical passwords}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {99--108}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420965}, doi = {10.1145/2420950.2420965}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DunphyO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnevJBRK12, author = {Miro Enev and Jaeyeon Jung and Liefeng Bo and Xiaofeng Ren and Tadayoshi Kohno}, editor = {Robert H'obbes' Zakon}, title = {SensorSift: balancing sensor data privacy and utility in automated face understanding}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {149--158}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420975}, doi = {10.1145/2420950.2420975}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GatesLCP12, author = {Christopher S. Gates and Ninghui Li and Jing Chen and Robert W. Proctor}, editor = {Robert H'obbes' Zakon}, title = {CodeShield: towards personalized application whitelisting}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {279--288}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420992}, doi = {10.1145/2420950.2420992}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GatesLCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GrazianoLB12, author = {Mariano Graziano and Corrado Leita and Davide Balzarotti}, editor = {Robert H'obbes' Zakon}, title = {Towards network containment in malware analysis systems}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {339--348}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421000}, doi = {10.1145/2420950.2421000}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GrazianoLB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HeelanG12, author = {Sean Heelan and Agustin Gianni}, editor = {Robert H'obbes' Zakon}, title = {Augmenting vulnerability analysis of binary code}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {199--208}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420981}, doi = {10.1145/2420950.2420981}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HeelanG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HoushmandA12, author = {Shiva Houshmand and Sudhir Aggarwal}, editor = {Robert H'obbes' Zakon}, title = {Building better passwords using probabilistic techniques}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {109--118}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420966}, doi = {10.1145/2420950.2420966}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HoushmandA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JarabekBA12, author = {Chris Jarabek and David Barrera and John Aycock}, editor = {Robert H'obbes' Zakon}, title = {ThinAV: truly lightweight mobile cloud-based anti-malware}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {209--218}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420983}, doi = {10.1145/2420950.2420983}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JarabekBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JohnsLBF12, author = {Martin Johns and Sebastian Lekies and Bastian Braun and Benjamin Flesch}, editor = {Robert H'obbes' Zakon}, title = {BetterAuth: web authentication revisited}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {169--178}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420977}, doi = {10.1145/2420950.2420977}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JohnsLBF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Kumar12, author = {Apurva Kumar}, editor = {Robert H'obbes' Zakon}, title = {Using automated model analysis for reasoning about security of web protocols}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {289--298}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420993}, doi = {10.1145/2420950.2420993}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Kumar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LevillainEMD12, author = {Olivier Levillain and Arnaud {\'{E}}balard and Benjamin Morin and Herv{\'{e}} Debar}, editor = {Robert H'obbes' Zakon}, title = {One year of {SSL} internet measurement}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {11--20}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420953}, doi = {10.1145/2420950.2420953}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LevillainEMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12, author = {Martina Lindorfer and Alessandro Di Federico and Federico Maggi and Paolo Milani Comparetti and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {Lines of malicious code: insights into the malicious software industry}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {349--358}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421001}, doi = {10.1145/2420950.2421001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MarforioRFC12, author = {Claudio Marforio and Hubert Ritzdorf and Aur{\'{e}}lien Francillon and Srdjan Capkun}, editor = {Robert H'obbes' Zakon}, title = {Analysis of the communication between colluding applications on modern smartphones}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {51--60}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420958}, doi = {10.1145/2420950.2420958}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MarforioRFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MastiMRFC12, author = {Ramya Jayaram Masti and Claudio Marforio and Aanjhan Ranganathan and Aur{\'{e}}lien Francillon and Srdjan Capkun}, editor = {Robert H'obbes' Zakon}, title = {Enabling trusted scheduling in embedded systems}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {61--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420960}, doi = {10.1145/2420950.2420960}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MastiMRFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McCarneyBCCO12, author = {Daniel McCarney and David Barrera and Jeremy Clark and Sonia Chiasson and Paul C. van Oorschot}, editor = {Robert H'obbes' Zakon}, title = {Tapas: design, implementation, and usability evaluation of a password manager}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {89--98}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420964}, doi = {10.1145/2420950.2420964}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/McCarneyBCCO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottMLKK12, author = {John P. McDermott and Bruce E. Montrose and Margery Li and James Kirby and Myong H. Kang}, editor = {Robert H'obbes' Zakon}, title = {Separation virtual machine monitors}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {419--428}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421011}, doi = {10.1145/2420950.2421011}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermottMLKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuthukumaranRTVTJ12, author = {Divya Muthukumaran and Sandra Julieta Rueda and Nirupama Talele and Hayawardh Vijayakumar and Jason Teutsch and Trent Jaeger}, editor = {Robert H'obbes' Zakon}, title = {Transforming commodity security policies to enforce Clark-Wilson integrity}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {269--278}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420991}, doi = {10.1145/2420950.2420991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuthukumaranRTVTJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PerdisciU12, author = {Roberto Perdisci and Man Chon U}, editor = {Robert H'obbes' Zakon}, title = {{VAMO:} towards a fully automated malware clustering validity analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {329--338}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420999}, doi = {10.1145/2420950.2420999}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PerdisciU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PohlyMMB12, author = {Devin J. Pohly and Stephen E. McLaughlin and Patrick D. McDaniel and Kevin R. B. Butler}, editor = {Robert H'obbes' Zakon}, title = {Hi-Fi: collecting high-fidelity whole-system provenance}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {259--268}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420989}, doi = {10.1145/2420950.2420989}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PohlyMMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12, author = {Iasonas Polakis and Marco Lancini and Georgios Kontaxis and Federico Maggi and Sotiris Ioannidis and Angelos D. Keromytis and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {All your face are belong to us: breaking Facebook's social authentication}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {399--408}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421008}, doi = {10.1145/2420950.2421008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ReinaFPCB12, author = {Alessandro Reina and Aristide Fattori and Fabio Pagani and Lorenzo Cavallaro and Danilo Bruschi}, editor = {Robert H'obbes' Zakon}, title = {When hardware meets software: a bulletproof solution to forensic memory acquisition}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {79--88}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420962}, doi = {10.1145/2420950.2420962}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ReinaFPCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12, author = {Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon}, title = {Jarhead analysis and detection of malicious Java applets}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {249--257}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420988}, doi = {10.1145/2420950.2420988}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShiojiKIH12, author = {Eitaro Shioji and Yuhei Kawakoya and Makoto Iwamura and Takeo Hariu}, editor = {Robert H'obbes' Zakon}, title = {Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {309--318}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420996}, doi = {10.1145/2420950.2420996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShiojiKIH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SinghBMKA12, author = {Indrajeet Singh and Michael Butkiewicz and Harsha V. Madhyastha and Srikanth V. Krishnamurthy and Sateesh Addepalli}, editor = {Robert H'obbes' Zakon}, title = {Enabling private conversations on Twitter}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {409--418}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421009}, doi = {10.1145/2420950.2421009}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SinghBMKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SmutzS12, author = {Charles Smutz and Angelos Stavrou}, editor = {Robert H'obbes' Zakon}, title = {Malicious {PDF} detection using metadata and structural features}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {239--248}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420987}, doi = {10.1145/2420950.2420987}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SmutzS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SridharanSG12, author = {Vasumathi Sridharan and Vaibhav Shankar and Minaxi Gupta}, editor = {Robert H'obbes' Zakon}, title = {Twitter games: how successful spammers pick targets}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {389--398}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421007}, doi = {10.1145/2420950.2421007}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SridharanSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SrivastavaG12, author = {Abhinav Srivastava and Jonathon T. Giffin}, editor = {Robert H'obbes' Zakon}, title = {Efficient protection of kernel data structures via object partitioning}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {429--438}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421012}, doi = {10.1145/2420950.2421012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SrivastavaG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StefanovDJO12, author = {Emil Stefanov and Marten van Dijk and Ari Juels and Alina Oprea}, editor = {Robert H'obbes' Zakon}, title = {Iris: a scalable cloud file system with efficient integrity checks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {229--238}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420985}, doi = {10.1145/2420950.2420985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TendulkarSPBSE12, author = {Vasant Tendulkar and Ryan Snyder and Joe Pletcher and Kevin R. B. Butler and Ashwin Shashidharan and William Enck}, editor = {Robert H'obbes' Zakon}, title = {Abusing cloud-based browsers for fun and profit}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {219--228}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420984}, doi = {10.1145/2420950.2420984}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TendulkarSPBSE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TrewinSKMSB12, author = {Shari Trewin and Calvin Swart and Larry Koved and Jacquelyn Martino and Kapil Singh and Shay Ben{-}David}, editor = {Robert H'obbes' Zakon}, title = {Biometric authentication on a mobile device: a study of user effort, error and task disruption}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {159--168}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420976}, doi = {10.1145/2420950.2420976}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TrewinSKMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WartellMHL12, author = {Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin}, editor = {Robert H'obbes' Zakon}, title = {Securing untrusted code via compiler-agnostic binary rewriting}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {299--308}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420995}, doi = {10.1145/2420950.2420995}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WartellMHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiGNF12, author = {Xuetao Wei and Lorenzo Gomez and Iulian Neamtiu and Michalis Faloutsos}, editor = {Robert H'obbes' Zakon}, title = {Permission evolution in the Android ecosystem}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {31--40}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420956}, doi = {10.1145/2420950.2420956}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeiGNF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsFH12, author = {Carsten Willems and Felix C. Freiling and Thorsten Holz}, editor = {Robert H'obbes' Zakon}, title = {Using memory management to detect and extract illegitimate code for malware analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {179--188}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420979}, doi = {10.1145/2420950.2420979}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12, author = {Carsten Willems and Ralf Hund and Andreas Fobian and Dennis Felsch and Thorsten Holz and Amit Vasudevan}, editor = {Robert H'obbes' Zakon}, title = {Down to the bare metal: using processor features for binary analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {189--198}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420980}, doi = {10.1145/2420950.2420980}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YamaguchiLR12, author = {Fabian Yamaguchi and Markus Lottmann and Konrad Rieck}, editor = {Robert H'obbes' Zakon}, title = {Generalized vulnerability extrapolation using abstract syntax trees}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {359--368}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421003}, doi = {10.1145/2420950.2421003}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YamaguchiLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZavouPK12, author = {Angeliki Zavou and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Robert H'obbes' Zakon}, title = {Self-healing multitier architectures using cascading rescue points}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {379--388}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421005}, doi = {10.1145/2420950.2421005}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZavouPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhaoLLGMT12, author = {Shuang Zhao and Patrick P. C. Lee and John C. S. Lui and Xiaohong Guan and Xiaobo Ma and Jing Tao}, editor = {Robert H'obbes' Zakon}, title = {Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {119--128}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420968}, doi = {10.1145/2420950.2420968}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhaoLLGMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2012, editor = {Robert H'obbes' Zakon}, title = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2420950}, isbn = {978-1-4503-1312-4}, timestamp = {Thu, 20 Dec 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AckerRDPJ11, author = {Steven {Van Acker} and Philippe De Ryck and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {WebJail: least-privilege integration of third-party components in web mashups}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {307--316}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076775}, doi = {10.1145/2076732.2076775}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AckerRDPJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AhmedT11, author = {Ahmed Awad E. Ahmed and Issa Traor{\'{e}}}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Dynamic sample size detection in continuous authentication using sequential sampling}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {169--176}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076756}, doi = {10.1145/2076732.2076756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AhmedT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Benzel11, author = {Terry Benzel}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {The science of cyber security experimentation: the {DETER} project}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {137--148}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076752}, doi = {10.1145/2076732.2076752}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Benzel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Blaze11, author = {Matt Blaze}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Key escrow from a safe distance: looking back at the Clipper Chip}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {317--321}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076777}, doi = {10.1145/2076732.2076777}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Blaze11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BletschJF11, author = {Tyler K. Bletsch and Xuxian Jiang and Vincent W. Freeh}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Mitigating code-reuse attacks with control-flow locking}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {353--362}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076783}, doi = {10.1145/2076732.2076783}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BletschJF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BoshmafMBR11, author = {Yazan Boshmaf and Ildar Muslukhov and Konstantin Beznosov and Matei Ripeanu}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {The socialbot network: when bots socialize for fame and money}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {93--102}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076746}, doi = {10.1145/2076732.2076746}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BoshmafMBR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CiprianoZHKV11, author = {Casey Cipriano and Ali Zand and Amir Houmansadr and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Nexat: a history-based approach to predict attacker actions}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {383--392}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076787}, doi = {10.1145/2076732.2076787}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CiprianoZHKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CuiKS11, author = {Ang Cui and Jatin Kataria and Salvatore J. Stolfo}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {From prey to hunter: transforming legacy embedded devices into exploitation sensor grids}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {393--402}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076788}, doi = {10.1145/2076732.2076788}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CuiKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DanevMKC11, author = {Boris Danev and Ramya Jayaram Masti and Ghassan Karame and Srdjan Capkun}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Enabling secure VM-vTPM migration in private clouds}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {187--196}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076759}, doi = {10.1145/2076732.2076759}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DanevMKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DongTLJ11, author = {Xinshu Dong and Minh Tran and Zhenkai Liang and Xuxian Jiang}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {297--306}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076774}, doi = {10.1145/2076732.2076774}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DongTLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DoupeECSYZCV11, author = {Adam Doup{\'{e}} and Manuel Egele and Benjamin Caillat and Gianluca Stringhini and Gorkem Yakin and Ali Zand and Ludovico Cavedon and Giovanni Vigna}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Hit 'em where it hurts: a live security exercise on cyber situational awareness}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {51--61}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076740}, doi = {10.1145/2076732.2076740}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DoupeECSYZCV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FatemiehLG11, author = {Omid Fatemieh and Michael LeMay and Carl A. Gunter}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Reliable telemetry in white spaces using remote attestation}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {323--332}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076779}, doi = {10.1145/2076732.2076779}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FatemiehLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HartCHTJ11, author = {Michael Hart and Claude Castille and Manoj Harpalani and Jonathan Toohill and Rob Johnson}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {PhorceField: a phish-proof password ceremony}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {159--168}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076755}, doi = {10.1145/2076732.2076755}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HartCHTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HizverC11, author = {Jennia Hizver and Tzi{-}cker Chiueh}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Tracking payment card data flow using virtual machine state introspection}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {277--285}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076771}, doi = {10.1145/2076732.2076771}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HizverC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HlywaBP11, author = {Max Hlywa and Robert Biddle and Andrew S. Patrick}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Facing the facts about image type in recognition-based graphical passwords}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {149--158}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076754}, doi = {10.1145/2076732.2076754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HlywaBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuAJ11, author = {Hongxin Hu and Gail{-}Joon Ahn and Jan Jorgensen}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Detecting and resolving privacy conflicts for collaborative data sharing in online social networks}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {103--112}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076747}, doi = {10.1145/2076732.2076747}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HuAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuangZOPS11, author = {Heqing Huang and Su Zhang and Xinming Ou and Atul Prakash and Karem A. Sakallah}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Distilling critical attack graph surface iteratively through minimum-cost {SAT} solving}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {31--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076738}, doi = {10.1145/2076732.2076738}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HuangZOPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuberMLSWW11, author = {Markus Huber and Martin Mulazzani and Manuel Leithner and Sebastian Schrittwieser and Gilbert Wondracek and Edgar R. Weippl}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Social snapshots: digital forensics for online social networks}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {113--122}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076748}, doi = {10.1145/2076732.2076748}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HuberMLSWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JawurekJR11, author = {Marek Jawurek and Martin Johns and Konrad Rieck}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Smart metering de-pseudonymization}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {227--236}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076764}, doi = {10.1145/2076732.2076764}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JawurekJR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KhurshidKC11, author = {Ahmed Khurshid and Firat Kiyak and Matthew Caesar}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Improving robustness of {DNS} to software vulnerabilities}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {177--186}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076758}, doi = {10.1145/2076732.2076758}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KhurshidKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiratVK11, author = {Dhilung Kirat and Giovanni Vigna and Christopher Kruegel}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {BareBox: efficient malware analysis on bare-metal}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {403--412}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076790}, doi = {10.1145/2076732.2076790}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiratVK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LaskovS11, author = {Pavel Laskov and Nedim Srndic}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Static detection of malicious JavaScript-bearing {PDF} documents}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {373--382}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076785}, doi = {10.1145/2076732.2076785}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LaskovS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiX11, author = {Xiaowei Li and Yuan Xue}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{BLOCK:} a black-box approach for detection of state violation attacks towards web applications}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {247--256}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076767}, doi = {10.1145/2076732.2076767}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiXDW11, author = {Chenglong Li and Yibo Xue and Yingfei Dong and Dongsheng Wang}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {"Super nodes" in Tor: existence and security implication}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {217--226}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076763}, doi = {10.1145/2076732.2076763}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiXDW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuZWG11, author = {Kangjie Lu and Dabi Zou and Weiping Wen and Debin Gao}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {deRop: removing return-oriented programming from malware}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {363--372}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076784}, doi = {10.1145/2076732.2076784}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuZWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuoHDWY11, author = {Tongbo Luo and Hao Hao and Wenliang Du and Yifei Wang and Heng Yin}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Attacks on WebView in the Android system}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {343--352}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076781}, doi = {10.1145/2076732.2076781}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuoHDWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuoZZPLC11, author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Exposing invisible timing-based traffic watermarks with {BACKLIT}}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {197--206}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076760}, doi = {10.1145/2076732.2076760}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LuoZZPLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MooreWS11, author = {W. Brad Moore and Chris Wacek and Micah Sherr}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {207--216}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076762}, doi = {10.1145/2076732.2076762}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MooreWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NadjiAPL11, author = {Yacin Nadji and Manos Antonakakis and Roberto Perdisci and Wenke Lee}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Understanding the prevalence and use of alternative plans in malware with network games}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {1--10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076734}, doi = {10.1145/2076732.2076734}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NadjiAPL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NadjiGT11, author = {Yacin Nadji and Jonathon T. Giffin and Patrick Traynor}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Automated remote repair for mobile malware}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {413--422}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076791}, doi = {10.1145/2076732.2076791}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NadjiGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NeugschwandtnerCJK11, author = {Matthias Neugschwandtner and Paolo Milani Comparetti and Gr{\'{e}}goire Jacob and Christopher Kruegel}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{FORECAST:} skimming off the malware cream}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {11--20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076735}, doi = {10.1145/2076732.2076735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NeugschwandtnerCJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NeugschwandtnerCP11, author = {Matthias Neugschwandtner and Paolo Milani Comparetti and Christian Platzer}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Detecting malware's failover C{\&}C strategies with squeeze}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {21--30}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076736}, doi = {10.1145/2076732.2076736}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NeugschwandtnerCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NipaneDT11, author = {Nilesh Nipane and Italo Dacosta and Patrick Traynor}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {"Mix-in-Place" anonymous networking using secure function evaluation}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {63--72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076742}, doi = {10.1145/2076732.2076742}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NipaneDT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PappasRVBM11, author = {Vasilis Pappas and Mariana Raykova and Binh Vo and Steven M. Bellovin and Tal Malkin}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Private search in the real world}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {83--92}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076744}, doi = {10.1145/2076732.2076744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PappasRVBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PelizziS11, author = {Riccardo Pelizzi and R. Sekar}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {A server- and browser-transparent {CSRF} defense for web 2.0 applications}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {257--266}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076768}, doi = {10.1145/2076732.2076768}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PelizziS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShinL11, author = {Dongwan Shin and Rodrigo Lopes}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {An empirical study of visual security cues to prevent the SSLstripping attack}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {287--296}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076773}, doi = {10.1145/2076732.2076773}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ShinL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Simmons11, author = {Patrick Simmons}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Security through amnesia: a software-based solution to the cold boot attack on disk encryption}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {73--82}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076743}, doi = {10.1145/2076732.2076743}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Simmons11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StuderPB11, author = {Ahren Studer and Timothy Passaro and Lujo Bauer}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {333--342}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076780}, doi = {10.1145/2076732.2076780}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StuderPB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Syverson11, author = {Paul F. Syverson}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {A peel of onion}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {123--137}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076750}, doi = {10.1145/2076732.2076750}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Syverson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VikramFG11, author = {Shardul Vikram and Yinan Fan and Guofei Gu}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{SEMAGE:} a new image-based two-factor {CAPTCHA}}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {237--246}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076766}, doi = {10.1145/2076732.2076766}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VikramFG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WilanderNYKJ11, author = {John Wilander and Nick Nikiforakis and Yves Younan and Mariam Kamkar and Wouter Joosen}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{RIPE:} runtime intrusion prevention evaluator}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {41--50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076739}, doi = {10.1145/2076732.2076739}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WilanderNYKJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieCLM11, author = {Jing Xie and Bill Chu and Heather Richter Lipford and John T. Melton}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {{ASIDE:} {IDE} support for web application security}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {267--276}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076770}, doi = {10.1145/2076732.2076770}, timestamp = {Sat, 08 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieCLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2011, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732}, doi = {10.1145/2076732}, isbn = {978-1-4503-0672-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ButlerMM10, author = {Kevin R. B. Butler and Stephen E. McLaughlin and Patrick D. McDaniel}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Kells: a protection framework for portable data}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {231--240}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920296}, doi = {10.1145/1920261.1920296}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ButlerMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CalvetDFMSGBS10, author = {Joan Calvet and Carlton R. Davis and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Pier{-}Luc St{-}Onge and Wadie Guizani and Pierre{-}Marc Bureau and Anil Somayaji}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {141--150}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920284}, doi = {10.1145/1920261.1920284}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CalvetDFMSGBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChanVDCC10, author = {Ellick Chan and Shivaram Venkataraman and Francis M. David and Amey Chaugule and Roy H. Campbell}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Forenscope: a framework for live forensics}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {307--316}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920307}, doi = {10.1145/1920261.1920307}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChanVDCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Cheswick10, author = {William R. Cheswick}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Back to Berferd}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {281--286}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920303}, doi = {10.1145/1920261.1920303}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Cheswick10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChuGWJ10, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Who is tweeting on Twitter: human, bot, or cyborg?}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {21--30}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920265}, doi = {10.1145/1920261.1920265}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChuGWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ClarkFBS10, author = {Sandy Clark and Stefan Frei and Matt Blaze and Jonathan M. Smith}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {251--260}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920299}, doi = {10.1145/1920261.1920299}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ClarkFBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CoskunDM10, author = {Baris Coskun and Sven Dietrich and Nasir D. Memon}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {131--140}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920283}, doi = {10.1145/1920261.1920283}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CoskunDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CuiS10, author = {Ang Cui and Salvatore J. Stolfo}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {97--106}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920276}, doi = {10.1145/1920261.1920276}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CuiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Two methodologies for physical penetration testing using social engineering}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {399--408}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920319}, doi = {10.1145/1920261.1920319}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DingWWLZ10, author = {Yu Ding and Tao Wei and Tielei Wang and Zhenkai Liang and Wei Zou}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {327--336}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920310}, doi = {10.1145/1920261.1920310}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DingWWLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DwoskinGCL10, author = {Jeffrey S. Dwoskin and Mahadevan Gomathisankaran and Yu{-}Yuan Chen and Ruby B. Lee}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {A framework for testing hardware-software security architectures}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {387--397}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920318}, doi = {10.1145/1920261.1920318}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DwoskinGCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FangC10, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Securing interactive sessions using mobile device through visual channel and visual inspection}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {69--78}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920272}, doi = {10.1145/1920261.1920272}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GalloKDALA10, author = {Roberto Gallo and Henrique Kawakami and Ricardo Dahab and Rafael Azevedo and Saulo Lima and Guido Araujo}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {{T-DRE:} a hardware trusted computing base for direct recording electronic vote machines}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {191--198}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920291}, doi = {10.1145/1920261.1920291}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GalloKDALA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuGRSM10, author = {Liang Gu and Yao Guo and Anbang Ruan and Qingni Shen and Hong Mei}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {{SCOBA:} source code based attestation on custom software}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {337--346}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920311}, doi = {10.1145/1920261.1920311}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuGRSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HanPGP10, author = {Jin Han and Meng Pan and Debin Gao and HweeHwa Pang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {A multi-user steganographic file system on untrusted shared storage}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {317--326}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920309}, doi = {10.1145/1920261.1920309}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HanPGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HeusserM10, author = {Jonathan Heusser and Pasquale Malacaria}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Quantifying information leaks in software}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {261--269}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920300}, doi = {10.1145/1920261.1920300}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HeusserM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiSKKSS10, author = {Shujun Li and S. Amier Haider Shah and M. Asad Usman Khan and Syed Ali Khayam and Ahmad{-}Reza Sadeghi and Roland Schmitz}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Breaking e-banking CAPTCHAs}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {171--180}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920288}, doi = {10.1145/1920261.1920288}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiSKKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiW10, author = {Zhou Li and XiaoFeng Wang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {{FIRM:} capability-based inline mediation of Flash behaviors}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {181--190}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920289}, doi = {10.1145/1920261.1920289}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiakhGJ10, author = {Siarhei Liakh and Michael C. Grace and Xuxian Jiang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Analyzing and improving Linux kernel memory protection: a model checking approach}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {271--280}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920301}, doi = {10.1145/1920261.1920301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiakhGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuNDLW10, author = {An Liu and Peng Ning and Huaiyu Dai and Yao Liu and Cliff Wang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {367--376}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920315}, doi = {10.1145/1920261.1920315}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiuNDLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LongstaffBM10, author = {Tom Longstaff and David M. Balenson and Mark Matties}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Barriers to science in security}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {127--129}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920281}, doi = {10.1145/1920261.1920281}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LongstaffBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McLaughlinPMDM10, author = {Stephen E. McLaughlin and Dmitry Podkuiko and Sergei Miadzvezhanka and Adam Delozier and Patrick D. McDaniel}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Multi-vendor penetration testing in the advanced metering infrastructure}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {107--116}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920277}, doi = {10.1145/1920261.1920277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McLaughlinPMDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OnarliogluBLBK10, author = {Kaan Onarlioglu and Leyla Bilge and Andrea Lanzi and Davide Balzarotti and Engin Kirda}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {G-Free: defeating return-oriented programming through gadget-less binaries}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {49--58}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920269}, doi = {10.1145/1920261.1920269}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OnarliogluBLBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OngtangBM10, author = {Machigar Ongtang and Kevin R. B. Butler and Patrick D. McDaniel}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Porscha: policy oriented secure content handling in Android}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {221--230}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920295}, doi = {10.1145/1920261.1920295}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/OngtangBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PolychronakisAM10, author = {Michalis Polychronakis and Kostas G. Anagnostakis and Evangelos P. Markatos}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Comprehensive shellcode detection using runtime heuristics}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {287--296}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920305}, doi = {10.1145/1920261.1920305}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PolychronakisAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PopperBCC10, author = {Christina P{\"{o}}pper and David A. Basin and Srdjan Capkun and Cas Cremers}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Keeping data secret under full compromise using porter devices}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {241--250}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920297}, doi = {10.1145/1920261.1920297}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PopperBCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PortokalidisHAB10, author = {Georgios Portokalidis and Philip Homburg and Kostas Anagnostakis and Herbert Bos}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Paranoid Android: versatile protection for smartphones}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {347--356}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920313}, doi = {10.1145/1920261.1920313}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PortokalidisHAB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PortokalidisK10, author = {Georgios Portokalidis and Angelos D. Keromytis}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Fast and practical instruction-set randomization for commodity systems}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {41--48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920268}, doi = {10.1145/1920261.1920268}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PortokalidisK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RieckKD10, author = {Konrad Rieck and Tammo Krueger and Andreas Dewald}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Cujo: efficient detection and prevention of drive-by-download attacks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {31--39}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920267}, doi = {10.1145/1920261.1920267}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RieckKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RodesW10, author = {Benjamin Rodes and Xunhua Wang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Security analysis of a fingerprint-protected {USB} drive}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {89--96}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920275}, doi = {10.1145/1920261.1920275}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RodesW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShinG10, author = {Seungwon Shin and Guofei Gu}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Conficker and beyond: a large-scale empirical study}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {151--160}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920285}, doi = {10.1145/1920261.1920285}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShinG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StobertFCOB10, author = {Elizabeth Stobert and Alain Forget and Sonia Chiasson and Paul C. van Oorschot and Robert Biddle}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Exploring usability effects of increasing security in click-based graphical passwords}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {79--88}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920273}, doi = {10.1145/1920261.1920273}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StobertFCOB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StringhiniKV10, author = {Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Detecting spammers on social networks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {1--9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920263}, doi = {10.1145/1920261.1920263}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StringhiniKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TillichKS10, author = {Stefan Tillich and Mario Kirschbaum and Alexander Szekely}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {SCA-resistant embedded processors: the next generation}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {211--220}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920293}, doi = {10.1145/1920261.1920293}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TillichKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ValamehrTSKHIL10, author = {Jonathan Valamehr and Mohit Tiwari and Timothy Sherwood and Ryan Kastner and Ted Huffmire and Cynthia E. Irvine and Timothy E. Levin}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Hardware assistance for trustworthy systems through 3-D integration}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {199--210}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920292}, doi = {10.1145/1920261.1920292}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ValamehrTSKHIL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Vigna10, author = {Giovanni Vigna}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Network intrusion detection: dead or alive?}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {117--126}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920279}, doi = {10.1145/1920261.1920279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Vigna10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangS10, author = {Zhaohui Wang and Angelos Stavrou}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Exploiting smart-phone {USB} connectivity for fun and profit}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {357--366}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920314}, doi = {10.1145/1920261.1920314}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WestACL10, author = {Andrew G. West and Adam J. Aviv and Jian Chang and Insup Lee}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Spam mitigation using spatio-temporal reputations from blacklist history}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {161--170}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920287}, doi = {10.1145/1920261.1920287}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WestACL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuZZ10, author = {Wei Xu and Fangfang Zhang and Sencun Zhu}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Toward worm detection in online social networks}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {11--20}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920264}, doi = {10.1145/1920261.1920264}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZWB10, author = {Yanjiang Yang and Jianying Zhou and Jun Wen Wong and Feng Bao}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Towards practical anonymous password authentication}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {59--68}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920271}, doi = {10.1145/1920261.1920271}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YangZWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangJLJ10, author = {Shengzhi Zhang and Xiaoqi Jia and Peng Liu and Jiwu Jing}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Cross-layer comprehensive intrusion harm analysis for production workload server systems}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {297--306}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920306}, doi = {10.1145/1920261.1920306}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangJLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhouNZAWB10, author = {Wu Zhou and Peng Ning and Xiaolan Zhang and Glenn Ammons and Ruowen Wang and Vasanth Bala}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Always up-to-date: scalable offline patching of {VM} images in a compute cloud}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {377--386}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920317}, doi = {10.1145/1920261.1920317}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhouNZAWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2010, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261}, doi = {10.1145/1920261}, isbn = {978-1-4503-0133-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AblizZ09, author = {Mehmud Abliz and Taieb Znati}, title = {A Guided Tour Puzzle for Denial of Service Prevention}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {279--288}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.33}, doi = {10.1109/ACSAC.2009.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AblizZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AzabNSZ09, author = {Ahmed M. Azab and Peng Ning and Emre Can Sezer and Xiaolan Zhang}, title = {{HIMA:} {A} Hypervisor-Based Integrity Measurement Agent}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {461--470}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.50}, doi = {10.1109/ACSAC.2009.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AzabNSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Bishop09, author = {Matt Bishop}, title = {Reflections on {UNIX} Vulnerabilities}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {161--184}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.25}, doi = {10.1109/ACSAC.2009.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Bishop09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ButtGSC09, author = {Shakeel Butt and Vinod Ganapathy and Michael M. Swift and Chih{-}Cheng Chang}, title = {Protecting Commodity Operating System Kernels from Vulnerable Device Drivers}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {301--310}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.35}, doi = {10.1109/ACSAC.2009.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ButtGSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CoskunM09, author = {Baris Coskun and Nasir D. Memon}, title = {Online Sketching of Network Flows for Real-Time Stepping-Stone Detection}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {473--483}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.51}, doi = {10.1109/ACSAC.2009.51}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CoskunM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Davidson09, author = {Mary Ann Davidson}, title = {The Good, the Bad, And the Ugly: Stepping on the Security Scale}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {187--195}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.59}, doi = {10.1109/ACSAC.2009.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Davidson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DhawanG09, author = {Mohan Dhawan and Vinod Ganapathy}, title = {Analyzing Information Flow in JavaScript-Based Browser Extensions}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {382--391}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.43}, doi = {10.1109/ACSAC.2009.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DhawanG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Epstein09, author = {Jeremy Epstein}, title = {A Survey of Vendor Software Assurance Practices}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {528--537}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.56}, doi = {10.1109/ACSAC.2009.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Epstein09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FerreiraCFCZCA09, author = {Ana Ferreira and David W. Chadwick and Pedro Farinha and Ricardo Jo{\~{a}}o Cruz Correia and Gansen Zhao and Rui Chilro and Luis Filipe Coelho Antunes}, title = {How to Securely Break into {RBAC:} The {BTG-RBAC} Model}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {23--31}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.12}, doi = {10.1109/ACSAC.2009.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FerreiraCFCZCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FordCKV09, author = {Sean Ford and Marco Cova and Christopher Kruegel and Giovanni Vigna}, title = {Analyzing and Detecting Malicious Flash Advertisements}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {363--372}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.41}, doi = {10.1109/ACSAC.2009.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FordCKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Frias-MartinezSSK09, author = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and Joseph Sherrick and Salvatore J. Stolfo and Angelos D. Keromytis}, title = {A Network Access Control Mechanism Based on Behavior Profiles}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {3--12}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.10}, doi = {10.1109/ACSAC.2009.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Frias-MartinezSSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Gong09, author = {Li Gong}, title = {Java Security: {A} Ten Year Retrospective}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {395--405}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.44}, doi = {10.1109/ACSAC.2009.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Gong09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuYPSL09, author = {Guofei Gu and Vinod Yegneswaran and Phillip A. Porras and Jennifer Stoll and Wenke Lee}, title = {Active Botnet Probing to Identify Obscure Command and Control Channels}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {241--253}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.30}, doi = {10.1109/ACSAC.2009.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuYPSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HsiaoLSSWKPSY09, author = {Hsu{-}Chun Hsiao and Yue{-}Hsun Lin and Ahren Studer and Cassandra Studer and King{-}Hang Wang and Hiroaki Kikuchi and Adrian Perrig and Hung{-}Min Sun and Bo{-}Yin Yang}, title = {A Study of User-Friendly Hash Comparison Schemes}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {105--114}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.20}, doi = {10.1109/ACSAC.2009.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HsiaoLSSWKPSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/IngolsCLWB09, author = {Kyle Ingols and Matthew Chu and Richard Lippmann and Seth E. Webster and Stephen W. Boyer}, title = {Modeling Modern Network Attacks and Countermeasures Using Attack Graphs}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {117--126}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.21}, doi = {10.1109/ACSAC.2009.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/IngolsCLWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JinL09, author = {Hongxia Jin and Jeffrey B. Lotspiech}, title = {Unifying Broadcast Encryption and Traitor Tracing for Content Protection}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {139--148}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.23}, doi = {10.1109/ACSAC.2009.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JinL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KirschbaumP09, author = {Mario Kirschbaum and Thomas Popp}, title = {Evaluation of a DPA-Resistant Prototype Chip}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {43--50}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.14}, doi = {10.1109/ACSAC.2009.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KirschbaumP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KlineBMR09, author = {Erik Kline and Matt Beaumont{-}Gay and Jelena Mirkovic and Peter L. Reiher}, title = {{RAD:} Reflector Attack Defense Using Message Authentication Codes}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {269--278}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.32}, doi = {10.1109/ACSAC.2009.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KlineBMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiAPSSW09, author = {Shujun Li and Hassan Jameel Asghar and Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Roland Schmitz and Huaxiong Wang}, title = {On the Security of {PAS} (Predicate-Based Authentication Service)}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {209--218}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.27}, doi = {10.1109/ACSAC.2009.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiAPSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiJS09, author = {Lixin Li and James E. Just and R. Sekar}, title = {Online Signature Generation for Windows Systems}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.34}, doi = {10.1109/ACSAC.2009.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MoyerBSMJ09, author = {Thomas Moyer and Kevin R. B. Butler and Joshua Schiffman and Patrick D. McDaniel and Trent Jaeger}, title = {Scalable Web Content Attestation}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.19}, doi = {10.1109/ACSAC.2009.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MoyerBSMJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Neumann09, author = {Peter G. Neumann}, title = {Computer-Related Risk Futures}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {35--40}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.13}, doi = {10.1109/ACSAC.2009.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Neumann09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NguyenSJGKN09, author = {Anh M. Nguyen and Nabil Schear and HeeDong Jung and Apeksha Godiyal and Samuel T. King and Hai D. Nguyen}, title = {{MAVMM:} Lightweight and Purpose Built {VMM} for Malware Analysis}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {441--450}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.48}, doi = {10.1109/ACSAC.2009.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NguyenSJGKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NohlE09, author = {Karsten Nohl and David Evans}, title = {Privacy through Noise: {A} Design Space for Private Identification}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {518--527}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.55}, doi = {10.1109/ACSAC.2009.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NohlE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OkhraviN09, author = {Hamed Okhravi and David M. Nicol}, title = {TrustGraph: Trusted Graphics Subsystem for High Assurance Systems}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {254--265}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.31}, doi = {10.1109/ACSAC.2009.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OkhraviN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OliveiraW09, author = {Daniela Alvim Seabra de Oliveira and Shyhtsun Felix Wu}, title = {Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {451--460}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.49}, doi = {10.1109/ACSAC.2009.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OliveiraW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OngtangMEM09, author = {Machigar Ongtang and Stephen E. McLaughlin and William Enck and Patrick D. McDaniel}, title = {Semantically Rich Application-Centric Security in Android}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {340--349}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.39}, doi = {10.1109/ACSAC.2009.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OngtangMEM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OsterweilMZ09, author = {Eric Osterweil and Daniel Massey and Lixia Zhang}, title = {Deploying and Monitoring {DNS} Security {(DNSSEC)}}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {429--438}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.47}, doi = {10.1109/ACSAC.2009.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OsterweilMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OuRS09, author = {Xinming Ou and Siva Raj Rajagopalan and Sakthiyuvaraja Sakthivelmurugan}, title = {An Empirical Approach to Modeling Uncertainty in Intrusion Analysis}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {494--503}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.53}, doi = {10.1109/ACSAC.2009.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OuRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkGT09, author = {Frank S. Park and Chinmay Gangakhedkar and Patrick Traynor}, title = {Leveraging Cellular Infrastructure to Improve Fraud Prevention}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {350--359}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.40}, doi = {10.1109/ACSAC.2009.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkGT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ParkR09, author = {Young Hee Park and Douglas S. Reeves}, title = {Identification of Bot Commands by Run-Time Execution Monitoring}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {321--330}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.37}, doi = {10.1109/ACSAC.2009.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ParkR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PaulT09, author = {Nathanael Paul and Andrew S. Tanenbaum}, title = {The Design of a Trustworthy Voting System}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {507--517}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.54}, doi = {10.1109/ACSAC.2009.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PaulT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PerdisciCDL09, author = {Roberto Perdisci and Igino Corona and David Dagon and Wenke Lee}, title = {Detecting Malicious Flux Service Networks through Passive Analysis of Recursive {DNS} Traces}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {311--320}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.36}, doi = {10.1109/ACSAC.2009.36}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PerdisciCDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RogliaMPB09, author = {Giampaolo Fresi Roglia and Lorenzo Martignoni and Roberto Paleari and Danilo Bruschi}, title = {Surgically Returning to Randomized lib(c)}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {60--69}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.16}, doi = {10.1109/ACSAC.2009.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RogliaMPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchiffmanMSJM09, author = {Joshua Schiffman and Thomas Moyer and Christopher Shal and Trent Jaeger and Patrick D. McDaniel}, title = {Justifying Integrity Using a Virtual Machine Verifier}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {83--92}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.18}, doi = {10.1109/ACSAC.2009.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchiffmanMSJM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StarkHB09, author = {Emily Stark and Michael Hamburg and Dan Boneh}, title = {Symmetric Cryptography in Javascript}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {373--381}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.42}, doi = {10.1109/ACSAC.2009.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StarkHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Stone-GrossKAMK09, author = {Brett Stone{-}Gross and Christopher Kruegel and Kevin C. Almeroth and Andreas Moser and Engin Kirda}, title = {{FIRE:} FInding Rogue nEtworks}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {231--240}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.29}, doi = {10.1109/ACSAC.2009.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Stone-GrossKAMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunHB09, author = {San{-}Tsai Sun and Kirstie Hawkey and Konstantin Beznosov}, title = {Secure Web 2.0 Content Sharing Beyond Walled Gardens}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {409--418}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.45}, doi = {10.1109/ACSAC.2009.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VuABD09, author = {Le{-}Hung Vu and Karl Aberer and Sonja Buchegger and Anwitaman Datta}, title = {Enabling Secure Secret Sharing in Distributed Online Social Networks}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {419--428}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.46}, doi = {10.1109/ACSAC.2009.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VuABD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangGC09, author = {Hua Wang and Yao Guo and Xiangqun Chen}, title = {FPValidator: Validating Type Equivalence of Function Pointers on the Fly}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {51--59}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.15}, doi = {10.1109/ACSAC.2009.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJZL09, author = {Xinran Wang and Yoon{-}chan Jhi and Sencun Zhu and Peng Liu}, title = {Detecting Software Theft via System Call Based Birthmarks}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {149--158}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.24}, doi = {10.1109/ACSAC.2009.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiDYG09, author = {Wei Wei and Juan Du and Ting Yu and Xiaohui Gu}, title = {SecureMR: {A} Service Integrity Assurance Framework for MapReduce}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {73--82}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.17}, doi = {10.1109/ACSAC.2009.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeiDYG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieCTHC09, author = {Anmin Xie and Zhuhua Cai and Cong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Evaluating Network Security With Two-Layer Attack Graphs}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.22}, doi = {10.1109/ACSAC.2009.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieCTHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XiongJL09, author = {Xi Xiong and Xiaoqi Jia and Peng Liu}, title = {{SHELF:} Preserving Business Continuity and Availability in an Intrusion Recovery System}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {484--493}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.52}, doi = {10.1109/ACSAC.2009.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XiongJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZWB09, author = {Yanjiang Yang and Jianying Zhou and Jian Weng and Feng Bao}, title = {A New Approach for Anonymous Password Authentication}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {199--208}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.26}, doi = {10.1109/ACSAC.2009.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangZWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YavuzN09, author = {Attila Altay Yavuz and Peng Ning}, title = {{BAF:} An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {219--228}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.28}, doi = {10.1109/ACSAC.2009.28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YavuzN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangRVZ09, author = {Dana Zhang and Kotagiri Ramamohanarao and Steven Versteeg and Rui Zhang}, title = {RoleVAT: Visual Assessment of Practical Need for Role Based Access Control}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.11}, doi = {10.1109/ACSAC.2009.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangRVZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZugenmaierLJ09, author = {Alf Zugenmaier and Sven Lachmund and Dileesh Jostin}, title = {Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {333--339}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.38}, doi = {10.1109/ACSAC.2009.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZugenmaierLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2009, title = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5379501/proceeding}, isbn = {978-0-7695-3919-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AktasG08, author = {Erdem Aktas and Kanad Ghose}, title = {{DARE:} {A} Framework for Dynamic Authentication of Remote Executions}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {453--462}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.49}, doi = {10.1109/ACSAC.2008.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AktasG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlsalehBO08, author = {Mansour Alsaleh and David Barrera and Paul C. van Oorschot}, title = {Improving Security Visualization with Exposure Map Filtering}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {205--214}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.16}, doi = {10.1109/ACSAC.2008.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlsalehBO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaiGCWXM08, author = {Xiaole Bai and Wenjun Gu and Sriram Chellappan and Xun Wang and Dong Xuan and Bin Ma}, title = {{PAS:} Predicate-Based Authentication Services Against Powerful Passive Adversaries}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {433--442}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.23}, doi = {10.1109/ACSAC.2008.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaiGCWXM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaligaGI08, author = {Arati Baliga and Vinod Ganapathy and Liviu Iftode}, title = {Automatic Inference and Enforcement of Kernel Data Structure Invariants}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {77--86}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.29}, doi = {10.1109/ACSAC.2008.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaligaGI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BeresGSHMV08, author = {Yolanta Beres and Jonathan Griffin and Simon Shiu and Max Heitman and David Markle and Peter Ventura}, title = {Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {33--42}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.42}, doi = {10.1109/ACSAC.2008.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BeresGSHMV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CapizziLVS08, author = {Roberto Capizzi and Antonio Longo and V. N. Venkatakrishnan and A. Prasad Sistla}, title = {Preventing Information Leaks through Shadow Executions}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {322--331}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.50}, doi = {10.1109/ACSAC.2008.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CapizziLVS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CimatoGPSS08, author = {Stelvio Cimato and Marco Gamassi and Vincenzo Piuri and Roberto Sassi and Fabio Scotti}, title = {Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {130--139}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.13}, doi = {10.1109/ACSAC.2008.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CimatoGPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ColeL08, author = {Robert J. Cole and Peng Liu}, title = {Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {269--278}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.14}, doi = {10.1109/ACSAC.2008.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ColeL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnckBRMS08, author = {William Enck and Kevin R. B. Butler and Thomas Richardson and Patrick D. McDaniel and Adam D. Smith}, title = {Defending Against Attacks on Main Memory Persistence}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {65--74}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.45}, doi = {10.1109/ACSAC.2008.45}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/EnckBRMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnckMJ08, author = {William Enck and Patrick D. McDaniel and Trent Jaeger}, title = {PinUP: Pinning User Files to Known Applications}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {55--64}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.41}, doi = {10.1109/ACSAC.2008.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EnckMJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FarrellGW08, author = {Paul F. Farrell Jr. and Simson L. Garfinkel and Douglas White}, title = {Practical Applications of Bloom Filters to the {NIST} {RDS} and Hard Drive Triage}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.12}, doi = {10.1109/ACSAC.2008.12}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FarrellGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ForrestAHS08, author = {Stephanie Forrest and Steven A. Hofmeyr and Anil Somayaji}, title = {The Evolution of System-Call Monitoring}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {418--430}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.54}, doi = {10.1109/ACSAC.2008.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ForrestAHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FraserC08, author = {Barbara Fraser and Stephen D. Crocker}, title = {Epilogue for {RFC} 1281, Guidelines for the Secure Operation of the Internet}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {405--417}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.57}, doi = {10.1109/ACSAC.2008.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FraserC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FraserEA08, author = {Timothy Fraser and Matthew R. Evenson and William A. Arbaugh}, title = {{VICI} Virtual Machine Introspection for Cognitive Immunity}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {87--96}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.33}, doi = {10.1109/ACSAC.2008.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FraserEA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Frias-MartinezSK08, author = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and Salvatore J. Stolfo and Angelos D. Keromytis}, title = {Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {367--376}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.30}, doi = {10.1109/ACSAC.2008.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Frias-MartinezSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoGCWL08, author = {Haichang Gao and Xuewu Guo and Xiaoping Chen and Liming Wang and Xiyang Liu}, title = {{YAGP:} Yet Another Graphical Password Strategy}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {121--129}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.19}, doi = {10.1109/ACSAC.2008.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoGCWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GrilloLMI08, author = {Antonio Grillo and Alessandro Lentini and Gianluigi Me and Giuseppe F. Italiano}, title = {Transaction Oriented Text Messaging with Trusted-SMS}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {485--494}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.43}, doi = {10.1109/ACSAC.2008.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GrilloLMI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuoVA08, author = {Qi Guo and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {237--246}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.38}, doi = {10.1109/ACSAC.2008.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuoVA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HasanWCSR08, author = {Ragib Hasan and Marianne Winslett and Richard M. Conlan and Brian Slesinsky and Nandakumar Ramani}, title = {Please Permit Me: Stateless Delegated Authorization in Mashups}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {173--182}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.24}, doi = {10.1109/ACSAC.2008.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HasanWCSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HewettK08, author = {Rattikorn Hewett and Phongphun Kijsanayothin}, title = {Host-Centric Model Checking for Network Vulnerability Analysis}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {225--234}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.15}, doi = {10.1109/ACSAC.2008.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HewettK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HorstS08, author = {Timothy W. van der Horst and Kent E. Seamons}, title = {pwdArmor: Protecting Conventional Password-Based Authentications}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {443--452}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.46}, doi = {10.1109/ACSAC.2008.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HorstS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JohnsEP08, author = {Martin Johns and Bj{\"{o}}rn Engelmann and Joachim Posegga}, title = {{XSSDS:} Server-Side Detection of Cross-Site Scripting Attacks}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {335--344}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.36}, doi = {10.1109/ACSAC.2008.36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JohnsEP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KarjothSH08, author = {G{\"{u}}nter Karjoth and Andreas Schade and Els Van Herreweghen}, title = {Implementing ACL-Based Policies in {XACML}}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {183--192}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.31}, doi = {10.1109/ACSAC.2008.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KarjothSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KohlerS08, author = {Mathias Kohler and Andreas Schaad}, title = {ProActive Access Control for Business Process-Driven Environments}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {153--162}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.26}, doi = {10.1109/ACSAC.2008.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KohlerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiPGF08, author = {Peng Li and Hyundo Park and Debin Gao and Jianming Fu}, title = {Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {392--401}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.17}, doi = {10.1109/ACSAC.2008.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiPGF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MartinHXH08, author = {Evan Martin and JeeHyun Hwang and Tao Xie and Vincent C. Hu}, title = {Assessing Quality of Policy Properties in Verification of Access Control Policies}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {163--172}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.48}, doi = {10.1109/ACSAC.2008.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MartinHXH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MassicotteLB08, author = {Fr{\'{e}}d{\'{e}}ric Massicotte and Yvan Labiche and Lionel C. Briand}, title = {Toward Automatic Generation of Intrusion Detection Verification Rules}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {279--288}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.27}, doi = {10.1109/ACSAC.2008.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MassicotteLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NandaC08, author = {Susanta Nanda and Tzi{-}cker Chiueh}, title = {Execution Trace-Driven Automated Attack Signature Generation}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {195--204}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.58}, doi = {10.1109/ACSAC.2008.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NandaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OConnorR08, author = {Terrence O'Connor and Douglas S. Reeves}, title = {Bluetooth Network-Based Misuse Detection}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {377--391}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.39}, doi = {10.1109/ACSAC.2008.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OConnorR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OMeliaE08, author = {Sean O'Melia and Adam J. Elbirt}, title = {Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {465--474}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.10}, doi = {10.1109/ACSAC.2008.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OMeliaE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PerdisciLL08, author = {Roberto Perdisci and Andrea Lanzi and Wenke Lee}, title = {McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {301--310}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.22}, doi = {10.1109/ACSAC.2008.22}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PerdisciLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Salehi-AbariTO08, author = {Amirali Salehi{-}Abari and Julie Thorpe and Paul C. van Oorschot}, title = {On Purely Automated Attacks and Click-Based Graphical Passwords}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {111--120}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.18}, doi = {10.1109/ACSAC.2008.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Salehi-AbariTO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Saydjari08, author = {O. Sami Saydjari}, title = {Structuring for Strategic Cyber Defense: {A} Cyber Manhattan Project Blueprint}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.53}, doi = {10.1109/ACSAC.2008.53}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Saydjari08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchmerlKFMR08, author = {Sebastian Schmerl and Hartmut K{\"{o}}nig and Ulrich Flegel and Michael Meier and Ren{\'{e}} Rietz}, title = {Systematic Signature Engineering by Re-use of Snort Signatures}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {23--32}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.20}, doi = {10.1109/ACSAC.2008.20}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SchmerlKFMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SohrMBA08, author = {Karsten Sohr and Tanveer Mustafa and Xinyu Bao and Gail{-}Joon Ahn}, title = {Enforcing Role-Based Access Control Policies in Web Services with {UML} and {OCL}}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {257--266}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.35}, doi = {10.1109/ACSAC.2008.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SohrMBA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StuderJKOC08, author = {Ahren Studer and Christina Johns and Jaanus Kase and Kyle O'Meara and Lorrie Faith Cranor}, title = {A Survey to Guide Group Key Protocol Development}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {475--484}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.28}, doi = {10.1109/ACSAC.2008.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StuderJKOC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TannousTHMJ08, author = {Albert Tannous and Jonathan T. Trostle and Mohamed Hassan and Stephen E. McLaughlin and Trent Jaeger}, title = {New Side Channels Targeted at Passwords}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {45--54}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.47}, doi = {10.1109/ACSAC.2008.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TannousTHMJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Vasudevan08, author = {Amit Vasudevan}, title = {MalTRAK: Tracking and Eliminating Unknown Malware}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {311--321}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.44}, doi = {10.1109/ACSAC.2008.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Vasudevan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangHT08, author = {Xunhua Wang and Philip D. Huff and Brett C. Tjaden}, title = {Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {140--149}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.11}, doi = {10.1109/ACSAC.2008.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJZL08, author = {Xinran Wang and Yoon{-}chan Jhi and Sencun Zhu and Peng Liu}, title = {{STILL:} Exploit Code Detection via Static Taint and Initialization Analyses}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.37}, doi = {10.1109/ACSAC.2008.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiPGP08, author = {Jinpeng Wei and Bryan D. Payne and Jonathon Giffin and Calton Pu}, title = {Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {97--107}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.40}, doi = {10.1109/ACSAC.2008.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeiPGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YueW08, author = {Chuan Yue and Haining Wang}, title = {Anti-Phishing in Offense and Defense}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {345--354}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.32}, doi = {10.1109/ACSAC.2008.32}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YueW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZarandioonYG08, author = {Saman Zarandioon and Danfeng Yao and Vinod Ganapathy}, title = {{OMOS:} {A} Framework for Secure Communication in Mashup Applications}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {355--364}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.25}, doi = {10.1109/ACSAC.2008.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZarandioonYG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangFWX08, author = {Yinqian Zhang and Xun Fan and Yijun Wang and Zhi Xue}, title = {Attack Grammar: {A} New Approach to Modeling and Analyzing Network Attack Sequences}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.34}, doi = {10.1109/ACSAC.2008.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangFWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangREY08, author = {Dana Zhang and Kotagiri Ramamohanarao and Tim Ebringer and Trevor Yann}, title = {Permission Set Mining: Discovering Practical and Useful Roles}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {247--256}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.21}, doi = {10.1109/ACSAC.2008.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangREY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2008, title = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4721525/proceeding}, isbn = {978-0-7695-3447-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AggarwalBDKLSZ07, author = {Sudhir Aggarwal and Jasbinder Bali and Zhenhai Duan and Leo Kermes and Wayne Liu and Shahank Sahai and Zhenghui Zhu}, title = {The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {141--150}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.12}, doi = {10.1109/ACSAC.2007.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AggarwalBDKLSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivLPK07, author = {Adam J. Aviv and Michael E. Locasto and Shaya Potter and Angelos D. Keromytis}, title = {{SSARES:} Secure Searchable Automated Remote Email Storage}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {129--139}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.30}, doi = {10.1109/ACSAC.2007.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AvivLPK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BordersPZ07, author = {Kevin Borders and Atul Prakash and Mark Zielinski}, title = {Spector: Automatically Analyzing Shell Code}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {501--514}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.11}, doi = {10.1109/ACSAC.2007.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BordersPZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CentonzeFP07, author = {Paolina Centonze and Robert J. Flynn and Marco Pistoia}, title = {Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {292--303}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.39}, doi = {10.1109/ACSAC.2007.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CentonzeFP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChandraF07, author = {Deepak Chandra and Michael Franz}, title = {Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {463--475}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.37}, doi = {10.1109/ACSAC.2007.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChandraF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ClairSJM07, author = {Luke St. Clair and Joshua Schiffman and Trent Jaeger and Patrick D. McDaniel}, title = {Establishing and Sustaining System Integrity via Root of Trust Installation}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {19--29}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.25}, doi = {10.1109/ACSAC.2007.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ClairSJM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CoskunM07, author = {Baris Coskun and Nasir D. Memon}, title = {Efficient Detection of Delay-Constrained Relay Nodes}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {353--362}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.29}, doi = {10.1109/ACSAC.2007.29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CoskunM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DagonGLL07, author = {David Dagon and Guofei Gu and Christopher P. Lee and Wenke Lee}, title = {A Taxonomy of Botnet Structures}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {325--339}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.44}, doi = {10.1109/ACSAC.2007.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DagonGLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DeLongNIL07, author = {Rance J. DeLong and Thuy D. Nguyen and Cynthia E. Irvine and Timothy E. Levin}, title = {Toward a Medium-Robustness Separation Kernel Protection Profile}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {40--51}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.17}, doi = {10.1109/ACSAC.2007.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DeLongNIL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EvansGG07, author = {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff}, title = {Routing in the Dark: Pitch Black}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {305--314}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.7}, doi = {10.1109/ACSAC.2007.7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/EvansGG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GehaniL07, author = {Ashish Gehani and Ulf Lindqvist}, title = {Bonsai: Balanced Lineage Authentication}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {363--373}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.45}, doi = {10.1109/ACSAC.2007.45}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GehaniL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GroveMONJBH07, author = {Duncan A. Grove and Toby C. Murray and Chris A. Owen and Chris J. North and J. A. Jones and Mark R. Beaumont and Bradley D. Hopkins}, title = {An Overview of the Annex System}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {341--352}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.8}, doi = {10.1109/ACSAC.2007.8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GroveMONJBH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {74--85}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.42}, doi = {10.1109/ACSAC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HellewellS07, author = {Phillip L. Hellewell and Kent E. Seamons}, title = {Extensible Pre-authentication Kerberos}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {201--210}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.33}, doi = {10.1109/ACSAC.2007.33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HellewellS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HicksMM07, author = {Boniface Hicks and Tim Misiak and Patrick D. McDaniel}, title = {Channels: Runtime System Infrastructure for Security-Typed Languages}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {443--452}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.35}, doi = {10.1109/ACSAC.2007.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HicksMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/IonDC07, author = {Iulia Ion and Boris Dragovic and Bruno Crispo}, title = {Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {233--242}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.36}, doi = {10.1109/ACSAC.2007.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/IonDC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JosangAGAM07, author = {Audun J{\o}sang and Bander AlFayyadh and Tyrone Grandison and Mohammed Al Zomai and Judith McNamara}, title = {Security Usability Principles for Vulnerability Analysis and Risk Assessment}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {269--278}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.14}, doi = {10.1109/ACSAC.2007.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JosangAGAM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Kemmerer07, author = {Richard A. Kemmerer}, title = {So You Think You Can Dance?}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.49}, doi = {10.1109/ACSAC.2007.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Kemmerer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiayiasMRSSSD07, author = {Aggelos Kiayias and Laurent Michel and Alexander Russell and Narasimha K. Shashidhar and Andrew See and Alexander A. Shvartsman and Seda Davtyan}, title = {Tampering with Special Purpose Trusted Computing Devices: {A} Case Study in Optical Scan E-Voting}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {30--39}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.16}, doi = {10.1109/ACSAC.2007.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiayiasMRSSSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KilSNZ07, author = {Chongkyung Kil and Emre Can Sezer and Peng Ning and Xiaolan Zhang}, title = {Automated Security Debugging Using Program Structural Constraints}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {453--462}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.19}, doi = {10.1109/ACSAC.2007.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KilSNZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KillourhyM07, author = {Kevin S. Killourhy and Roy A. Maxion}, title = {Toward Realistic and Artifact-Free Insider-Threat Data}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {87--96}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.31}, doi = {10.1109/ACSAC.2007.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KillourhyM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KosugaKHHT07, author = {Yuji Kosuga and Kenji Kono and Miyuki Hanaoka and Miho Hishiyama and Yu Takahama}, title = {Sania: Syntactic and Semantic Analysis for Automated Testing against {SQL} Injection}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {107--117}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.20}, doi = {10.1109/ACSAC.2007.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KosugaKHHT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KruegelBRV07, author = {Christopher Kruegel and Davide Balzarotti and William K. Robertson and Giovanni Vigna}, title = {Improving Signature Testing through Dynamic Data Flow Analysis}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {53--63}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.40}, doi = {10.1109/ACSAC.2007.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KruegelBRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiC07, author = {Wei Li and Tzi{-}cker Chiueh}, title = {Automated Format String Attack Prevention for Win32/X86 Binaries}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {398--409}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.23}, doi = {10.1109/ACSAC.2007.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MartignoniCJ07, author = {Lorenzo Martignoni and Mihai Christodorescu and Somesh Jha}, title = {OmniUnpack: Fast, Generic, and Safe Unpacking of Malware}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {431--441}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.15}, doi = {10.1109/ACSAC.2007.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MartignoniCJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MeierFS07, author = {Michael Meier and Ulrich Flegel and Sebastian Schmerl}, title = {Efficiency Issues of Rete-Based Expert Systems for Misuse Detection}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {151--160}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.22}, doi = {10.1109/ACSAC.2007.22}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MeierFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MelchorDI07, author = {Carlos Aguilar Melchor and Yves Deswarte and Julien Iguchi{-}Cartigny}, title = {Closed-Circuit Unobservable Voice over {IP}}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {119--128}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.34}, doi = {10.1109/ACSAC.2007.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MelchorDI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MoserKK07, author = {Andreas Moser and Christopher Kruegel and Engin Kirda}, title = {Limits of Static Analysis for Malware Detection}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {421--430}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.21}, doi = {10.1109/ACSAC.2007.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MoserKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PayneL07, author = {Bryan D. Payne and Wenke Lee}, title = {Secure and Flexible Monitoring of Virtual Machines}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {385--397}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.10}, doi = {10.1109/ACSAC.2007.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PayneL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RadhakrishnanS07, author = {Manigandan Radhakrishnan and Jon A. Solworth}, title = {Quarantining Untrusted Entities: Dynamic Sandboxing Using {LEAP}}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {211--220}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.46}, doi = {10.1109/ACSAC.2007.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RadhakrishnanS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RandellR07, author = {Brian Randell and John M. Rushby}, title = {Distributed Secure Systems: Then and Now}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {177--199}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.48}, doi = {10.1109/ACSAC.2007.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RandellR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SlowinskaB07, author = {Asia Slowinska and Herbert Bos}, title = {The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {487--500}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.32}, doi = {10.1109/ACSAC.2007.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SlowinskaB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SparksECZ07, author = {Sherri Sparks and Shawn Embleton and Ryan Cunningham and Cliff Changchun Zou}, title = {Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {477--486}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.27}, doi = {10.1109/ACSAC.2007.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SparksECZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SterneLGRMK07, author = {Daniel Sterne and Geoffrey Lawler and Richard Gopaul and Brian Rivera and Kelvin Marcus and Peter Kruus}, title = {Countering False Accusations and Collusion in the Detection of In-Band Wormholes}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {243--256}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.41}, doi = {10.1109/ACSAC.2007.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SterneLGRMK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SzydlowskiKK07, author = {Martin Szydlowski and Christopher Kruegel and Engin Kirda}, title = {Secure Input for Web Applications}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {375--384}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.28}, doi = {10.1109/ACSAC.2007.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SzydlowskiKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TsybulnikHT07, author = {Nathalie Tsybulnik and Kevin W. Hamlen and Bhavani Thuraisingham}, title = {Centralized Security Labels in Decentralized {P2P} Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {315--324}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.13}, doi = {10.1109/ACSAC.2007.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TsybulnikHT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ValdezSP07, author = {Enriquillo Valdez and Reiner Sailer and Ronald Perez}, title = {Retrofitting the {IBM} {POWER} Hypervisor to Support Mandatory Access Control}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {221--231}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.43}, doi = {10.1109/ACSAC.2007.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ValdezSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Weitzner07, author = {Daniel J. Weitzner}, title = {Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {173--175}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.50}, doi = {10.1109/ACSAC.2007.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Weitzner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WhyteOK07, author = {David Whyte and Paul C. van Oorschot and Evangelos Kranakis}, title = {Tracking Darkports for Network Defense}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {161--171}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.38}, doi = {10.1109/ACSAC.2007.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WhyteOK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieWW07, author = {Mengjun Xie and Zhenyu Wu and Haining Wang}, title = {HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {64--73}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.24}, doi = {10.1109/ACSAC.2007.24}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XieWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanA07, author = {Jeff Yan and Ahmad Salah El Ahmad}, title = {Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {279--291}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.47}, doi = {10.1109/ACSAC.2007.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YanA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YuZL07, author = {Meng Yu and Wanyu Zang and Peng Liu}, title = {Database Isolation and Filtering against Data Corruption Attacks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {97--106}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.18}, doi = {10.1109/ACSAC.2007.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YuZL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangR07, author = {Qinghua Zhang and Douglas S. Reeves}, title = {MetaAware: Identifying Metamorphic Malware}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {411--420}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.9}, doi = {10.1109/ACSAC.2007.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhuASJR07, author = {Bo Zhu and Venkata Gopala Krishna Addada and Sanjeev Setia and Sushil Jajodia and Sankardas Roy}, title = {Efficient Distributed Detection of Node Replication Attacks in Sensor Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {257--267}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.26}, doi = {10.1109/ACSAC.2007.26}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhuASJR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2007, title = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4412959/proceeding}, isbn = {0-7695-3060-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BaiL06, author = {Kun Bai and Peng Liu}, title = {Towards Database Firewall: Mining the Damage Spreading Patterns}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {449--462}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.52}, doi = {10.1109/ACSAC.2006.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BaiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Baker06, author = {Dixie B. Baker}, title = {Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {3--22}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.41}, doi = {10.1109/ACSAC.2006.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Baker06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BobbaFKGK06, author = {Rakeshbabu Bobba and Omid Fatemieh and Fariba Khan and Carl A. Gunter and Himanshu Khurana}, title = {Using Attribute-Based Access Control to Enable Attribute-Based Messaging}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {403--413}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.53}, doi = {10.1109/ACSAC.2006.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BobbaFKGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenLCJ06, author = {Shiping Chen and Dongyu Liu and Songqing Chen and Sushil Jajodia}, title = {{V-COPS:} {A} Vulnerability-Based Cooperative Alert Distribution System}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {43--56}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.54}, doi = {10.1109/ACSAC.2006.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenLCJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CovaFBV06, author = {Marco Cova and Viktoria Felmetsger and Greg Banks and Giovanni Vigna}, title = {Static Detection of Vulnerabilities in x86 Executables}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {269--278}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.50}, doi = {10.1109/ACSAC.2006.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CovaFBV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DucK06, author = {Guillaume Duc and Ronan Keryell}, title = {CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {483--492}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.21}, doi = {10.1109/ACSAC.2006.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DucK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Epstein06, author = {Jeremy Epstein}, title = {Fifteen Years after {TX:} {A} Look Back at High Assurance Multi-Level Secure Windowing}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {301--320}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.28}, doi = {10.1109/ACSAC.2006.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Epstein06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FlorencioH06, author = {Dinei A. F. Flor{\^{e}}ncio and Cormac Herley}, title = {{KLASSP:} Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {67--76}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.32}, doi = {10.1109/ACSAC.2006.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FlorencioH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FongO06, author = {Philip W. L. Fong and Simon A. Orr}, title = {A Module System for Isolating Untrusted Software Extensions}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {203--212}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.7}, doi = {10.1109/ACSAC.2006.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FongO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GehaniC06, author = {Ashish Gehani and Surendar Chandra}, title = {{PAST:} Probabilistic Authentication of Sensor Timestamps}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {439--448}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.37}, doi = {10.1109/ACSAC.2006.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GehaniC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GillSC06, author = {Rupinder Gill and Jason Smith and Andrew J. Clark}, title = {Specification-Based Intrusion Detection in WLANs}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {141--152}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.48}, doi = {10.1109/ACSAC.2006.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GillSC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HicksAM06, author = {Boniface Hicks and Kiyan Ahmadizadeh and Patrick D. McDaniel}, title = {From Languages to Systems: Understanding Practical Application Development in Security-typed Languages}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {153--164}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.30}, doi = {10.1109/ACSAC.2006.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HicksAM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HortonS06, author = {Jeffrey Horton and Reihaneh Safavi{-}Naini}, title = {Detecting Policy Violations through Traffic Analysis}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {109--120}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.24}, doi = {10.1109/ACSAC.2006.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HortonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HsuCRLS06, author = {Francis Hsu and Hao Chen and Thomas Ristenpart and Jason Li and Zhendong Su}, title = {Back to the Future: {A} Framework for Automatic Malware Removal and System Repair}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {257--268}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.16}, doi = {10.1109/ACSAC.2006.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HsuCRLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/IngolsLP06, author = {Kyle Ingols and Richard Lippmann and Keith Piwowarski}, title = {Practical Attack Graph Generation for Network Defense}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {121--130}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.39}, doi = {10.1109/ACSAC.2006.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/IngolsLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JacobB06, author = {Nigel Jacob and Carla E. Brodley}, title = {Offloading {IDS} Computation to the {GPU}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {371--380}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.35}, doi = {10.1109/ACSAC.2006.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JacobB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JammalamadakaHMSV06, author = {Ravi Chandra Jammalamadaka and Timothy W. van der Horst and Sharad Mehrotra and Kent E. Seamons and Nalini Venkatasubramanian}, title = {Delegate: {A} Proxy Based Architecture for Secure Website Access from an Untrusted Machine}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {57--66}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.23}, doi = {10.1109/ACSAC.2006.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JammalamadakaHMSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KhatiwalaSV06, author = {Tejas Khatiwala and Raj Swaminathan and V. N. Venkatakrishnan}, title = {Data Sandboxing: {A} Technique for Enforcing Confidentiality Policies}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {223--234}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.22}, doi = {10.1109/ACSAC.2006.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KhatiwalaSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KiayiasKW06, author = {Aggelos Kiayias and Michael Korman and David Walluck}, title = {An Internet Voting System Supporting User Privacy}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {165--174}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.12}, doi = {10.1109/ACSAC.2006.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KiayiasKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KilJBXN06, author = {Chongkyung Kil and Jinsuk Jun and Christopher Bookholt and Jun Xu and Peng Ning}, title = {Address Space Layout Permutation {(ASLP):} Towards Fine-Grained Randomization of Commodity Software}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.9}, doi = {10.1109/ACSAC.2006.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KilJBXN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LamC06, author = {Lap{-}Chung Lam and Tzi{-}cker Chiueh}, title = {A General Dynamic Information Flow Tracking Framework for Security Applications}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {463--472}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.6}, doi = {10.1109/ACSAC.2006.6}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LamC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiJS06, author = {Lixin Li and James E. Just and R. Sekar}, title = {Address-Space Randomization for Windows Systems}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {329--338}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.10}, doi = {10.1109/ACSAC.2006.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiLC06, author = {Wei Li and Lap{-}Chung Lam and Tzi{-}cker Chiueh}, title = {How to Automatically and Accurately Sandbox Microsoft {IIS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {213--222}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.31}, doi = {10.1109/ACSAC.2006.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MassicotteGLBC06, author = {Fr{\'{e}}d{\'{e}}ric Massicotte and Fran{\c{c}}ois Gagnon and Yvan Labiche and Lionel C. Briand and Mathieu Couture}, title = {Automatic Evaluation of Intrusion Detection Systems}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {361--370}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.15}, doi = {10.1109/ACSAC.2006.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MassicotteGLBC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McCuneJBCS06, author = {Jonathan M. McCune and Trent Jaeger and Stefan Berger and Ram{\'{o}}n C{\'{a}}ceres and Reiner Sailer}, title = {Shamon: {A} System for Distributed Mandatory Access Control}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {23--32}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.47}, doi = {10.1109/ACSAC.2006.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McCuneJBCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MullinerV06, author = {Collin Mulliner and Giovanni Vigna}, title = {Vulnerability Analysis of {MMS} User Agents}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {77--88}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.55}, doi = {10.1109/ACSAC.2006.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MullinerV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NandaLLC06, author = {Susanta Nanda and Wei Li and Lap{-}Chung Lam and Tzi{-}cker Chiueh}, title = {Foreign Code Detection on the Windows/X86 Platform}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {279--288}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.29}, doi = {10.1109/ACSAC.2006.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NandaLLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Neumann06, author = {Peter G. Neumann}, title = {Risks of Untrustworthiness}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {321--328}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.45}, doi = {10.1109/ACSAC.2006.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Neumann06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OikonomouMRR06, author = {George C. Oikonomou and Jelena Mirkovic and Peter L. Reiher and Max Robinson}, title = {A Framework for a Collaborative DDoS Defense}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {33--42}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.5}, doi = {10.1109/ACSAC.2006.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OikonomouMRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PanD06, author = {Ying Pan and Xuhua Ding}, title = {Anomaly Based Web Phishing Page Detection}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {381--392}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.13}, doi = {10.1109/ACSAC.2006.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PanD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RostadE06, author = {Lillian R{\o}stad and Ole Edsberg}, title = {A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {175--186}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.8}, doi = {10.1109/ACSAC.2006.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RostadE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RoyalHDEL06, author = {Paul Royal and Mitch Halpin and David Dagon and Robert Edmonds and Wenke Lee}, title = {PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {289--300}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.38}, doi = {10.1109/ACSAC.2006.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RoyalHDEL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SmithEJ06, author = {Randy Smith and Cristian Estan and Somesh Jha}, title = {Backtracking Algorithmic Complexity Attacks against a {NIDS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {89--98}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.17}, doi = {10.1109/ACSAC.2006.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SmithEJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunPNW06, author = {Kun Sun and Pai Peng and Peng Ning and Cliff Wang}, title = {Secure Distributed Cluster Formation in Wireless Sensor Networks}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {131--140}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.46}, doi = {10.1109/ACSAC.2006.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunPNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJG06, author = {Hao Wang and Somesh Jha and Vinod Ganapathy}, title = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.34}, doi = {10.1109/ACSAC.2006.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangL06, author = {Zhenghong Wang and Ruby B. Lee}, title = {Covert and Side Channels Due to Processor Architecture}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {473--482}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.20}, doi = {10.1109/ACSAC.2006.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeissB06, author = {Yoav Weiss and Elena Gabriela Barrantes}, title = {Known/Chosen Key Attacks against Software Instruction Set Randomization}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {349--360}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.33}, doi = {10.1109/ACSAC.2006.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeissB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WhyteOK06, author = {David Whyte and Paul C. van Oorschot and Evangelos Kranakis}, title = {Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {393--402}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.11}, doi = {10.1109/ACSAC.2006.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WhyteOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Witten06, author = {Brian Witten}, title = {Engineering Sufficiently Secure Computing}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {187--202}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.25}, doi = {10.1109/ACSAC.2006.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Witten06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XieRO06, author = {Yinglian Xie and Michael K. Reiter and David R. O'Hallaron}, title = {Protecting Privacy in Key-Value Search Systems}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {493--504}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.43}, doi = {10.1109/ACSAC.2006.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XieRO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanC06, author = {Jeff Yan and Pook Leong Cho}, title = {Enhancing Collaborative Spam Detection with Bloom Filters}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {414--428}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.26}, doi = {10.1109/ACSAC.2006.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YanC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanE06, author = {Guanhua Yan and Stephan J. Eidenbenz}, title = {Bluetooth Worms: Models, Dynamics, and Defense Implications}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {245--256}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.18}, doi = {10.1109/ACSAC.2006.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YanE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YounanPPJ06, author = {Yves Younan and Davide Pozza and Frank Piessens and Wouter Joosen}, title = {Extended Protection against Stack Smashing Attacks without Performance Loss}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {429--438}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.27}, doi = {10.1109/ACSAC.2006.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YounanPPJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YuWCXZ06, author = {Wei Yu and Xun Wang and Prasad Calyam and Dong Xuan and Wei Zhao}, title = {On Detecting Camouflaging Worm}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {235--244}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.36}, doi = {10.1109/ACSAC.2006.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YuWCXZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2006, title = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/4041138/proceeding}, isbn = {0-7695-2716-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AmmannPSR05, author = {Paul Ammann and Joseph Pamula and Julie A. Street and Ronald W. Ritchey}, title = {A Host-Based Approach to Network Attack Chaining Analysis}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {72--84}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.6}, doi = {10.1109/CSAC.2005.6}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AmmannPSR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AnderssonCMSZ05, author = {Stig Andersson and Andrew J. Clark and George M. Mohay and Bradley L. Schatz and Jacob Zimmermann}, title = {A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and {UNIX}}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {49--58}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.5}, doi = {10.1109/CSAC.2005.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AnderssonCMSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Bell05, author = {David Elliott Bell}, title = {Looking Back at the Bell-La Padula Model}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {337--351}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.37}, doi = {10.1109/CSAC.2005.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Bell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BertinoKTV05, author = {Elisa Bertino and Ashish Kamra and Evimaria Terzi and Athena Vakali}, title = {Intrusion Detection in RBAC-administered Databases}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {170--182}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.33}, doi = {10.1109/CSAC.2005.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BertinoKTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BlackCG05, author = {John Black and Martin Cochran and Ryan W. Gardner}, title = {Lessons Learned: {A} Security Analysis of the Internet Chess Club}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {245--253}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.36}, doi = {10.1109/CSAC.2005.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BlackCG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BruschiCLM05, author = {Danilo Bruschi and Lorenzo Cavallaro and Andrea Lanzi and Mattia Monga}, title = {Replay Attack in {TCG} Specification and Solution}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {127--137}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.47}, doi = {10.1109/CSAC.2005.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BruschiCLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChandramouliR05, author = {Ramaswamy Chandramouli and Scott Rose}, title = {An Integrity Verification Scheme for {DNS} Zone file based on Security Impact Analysis}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {312--321}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.9}, doi = {10.1109/CSAC.2005.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChandramouliR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChongPARW05, author = {Jennifer Chong and Partha P. Pal and Michael Atighetchi and Paul Rubel and Franklin Webber}, title = {Survivability Architecture of a Mission Critical System: The {DPASA} Example}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {495--504}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.54}, doi = {10.1109/CSAC.2005.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChongPARW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Collier05, author = {Marla Collier}, title = {How to Develop a Career in Information Assurance and How to Advance in this Field}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {333}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.31}, doi = {10.1109/CSAC.2005.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Collier05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CuiKT05, author = {Weidong Cui and Randy H. Katz and Wai{-}tian Tan}, title = {Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {361--370}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.19}, doi = {10.1109/CSAC.2005.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CuiKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DebbabiSTZ05, author = {Mourad Debbabi and Mohamed Mostafa Saleh and Chamseddine Talhi and Sami Zhioua}, title = {Java for Mobile Devices: {A} Security Study}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {235--244}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.34}, doi = {10.1109/CSAC.2005.34}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DebbabiSTZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FeskeH05, author = {Norman Feske and Christian Helmuth}, title = {A Nitpicker's guide to a minimal-complexity secure {GUI}}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.7}, doi = {10.1109/CSAC.2005.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FeskeH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FoleySLSKMTOSFBB05, author = {Simon N. Foley and Abe Singer and Michael E. Locasto and Stelios Sidiroglou and Angelos D. Keromytis and John P. McDermott and Julie Thorpe and Paul C. van Oorschot and Anil Somayaji and Richard Ford and Mark Bush and Alex Boulatov}, title = {Highlights from the 2005 New Security Paradigms Workshop}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {393--396}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.29}, doi = {10.1109/CSAC.2005.29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FoleySLSKMTOSFBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GiffinCK05, author = {Jonathon T. Giffin and Mihai Christodorescu and Louis Kruger}, title = {Strengthening Software Self-Checksumming via Self-Modifying Code}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {23--32}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.53}, doi = {10.1109/CSAC.2005.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GiffinCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuoYC05, author = {Fanglu Guo and Yang Yu and Tzi{-}cker Chiueh}, title = {Automated and Safe Vulnerability Assessment}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {150--159}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.11}, doi = {10.1109/CSAC.2005.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuoYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HaldarCF05, author = {Vivek Haldar and Deepak Chandra and Michael Franz}, title = {Dynamic Taint Propagation for Java}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {303--311}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.21}, doi = {10.1109/CSAC.2005.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HaldarCF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JeyaramanT05, author = {Sundararaman Jeyaraman and Umut Topkara}, title = {Have the cake and eat it too - Infusing usability into text-password based authentication systems}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {473--482}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.28}, doi = {10.1109/CSAC.2005.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JeyaramanT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JonesBR05, author = {John P. Jones and Daniel F. Berger and Chinya V. Ravishankar}, title = {Layering Public Key Distribution Over Secure {DNS} using Authenticated Delegation}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {409--418}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.35}, doi = {10.1109/CSAC.2005.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JonesBR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jurjens05, author = {Jan J{\"{u}}rjens}, title = {Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {138--149}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.15}, doi = {10.1109/CSAC.2005.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jurjens05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KalamD05, author = {Anas Abou El Kalam and Yves Deswarte}, title = {Privacy Requirements Implemented with a JavaCard}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {527--536}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.44}, doi = {10.1109/CSAC.2005.44}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KalamD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KangMC05, author = {Myong H. Kang and Ira S. Moskowitz and Stanley Chincheck}, title = {The Pump: {A} Decade of Covert Fun}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {352--360}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.56}, doi = {10.1109/CSAC.2005.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KangMC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Karger05, author = {Paul A. Karger}, title = {Multi-Level Security Requirements for Hypervisors}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {267--275}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.41}, doi = {10.1109/CSAC.2005.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Karger05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KayacykZH05, author = {Hilmi G{\"{u}}nes Kayacik and Nur Zincir{-}Heywood and Malcolm I. Heywood}, title = {Evolving Successful Stack Overflow Attacks for Vulnerability Testing}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {225--234}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.23}, doi = {10.1109/CSAC.2005.23}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KayacykZH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KcK05, author = {Gaurav S. Kc and Angelos D. Keromytis}, title = {e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {286--302}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.22}, doi = {10.1109/CSAC.2005.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KcK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KumarSJZ05, author = {Sandeep Kumar and Terence Sim and Rajkumar Janakiraman and Sheng Zhang}, title = {Using Continuous Biometric Verification to Protect Interactive Login Sessions}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {441--450}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.61}, doi = {10.1109/CSAC.2005.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KumarSJZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeitaMD05, author = {Corrado Leita and Ken Mermoud and Marc Dacier}, title = {ScriptGen: an automated script generation tool for honeyd}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {203--214}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.49}, doi = {10.1109/CSAC.2005.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeitaMD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiK05, author = {Jun Li and Xun Kang}, title = {mSSL: Extending {SSL} to Support Data Sharing Among Collaborative Clients}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {397--408}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.40}, doi = {10.1109/CSAC.2005.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiS05, author = {Yiru Li and Anil Somayaji}, title = {Securing Email Archives through User Modeling}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {547--556}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.50}, doi = {10.1109/CSAC.2005.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiangS05, author = {Zhenkai Liang and R. Sekar}, title = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.12}, doi = {10.1109/CSAC.2005.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LootahEM05, author = {Wesam Lootah and William Enck and Patrick D. McDaniel}, title = {{TARP:} Ticket-based Address Resolution Protocol}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {106--116}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.55}, doi = {10.1109/CSAC.2005.55}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LootahEM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NoelJ05, author = {Steven Noel and Sushil Jajodia}, title = {Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {160--169}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.58}, doi = {10.1109/CSAC.2005.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NoelJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RubelIHP05, author = {Paul Rubel and Michael Ihde and Steven A. Harp and Charles N. Payne}, title = {Generating Policies for Defense in Depth}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {505--514}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.26}, doi = {10.1109/CSAC.2005.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RubelIHP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SailerJVCPBGD05, author = {Reiner Sailer and Trent Jaeger and Enriquillo Valdez and Ram{\'{o}}n C{\'{a}}ceres and Ronald Perez and Stefan Berger and John Linwood Griffin and Leendert van Doorn}, title = {Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {276--285}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.13}, doi = {10.1109/CSAC.2005.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SailerJVCPBGD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchwarzCWLTMW05, author = {Benjamin Schwarz and Hao Chen and David A. Wagner and Jeremy Lin and Wei Tu and Geoff Morrison and Jacob West}, title = {Model Checking An Entire Linux Distribution for Security Violations}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.39}, doi = {10.1109/CSAC.2005.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchwarzCWLTMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SinclairS05, author = {Sara Sinclair and Sean W. Smith}, title = {PorKI: Making User {PKI} Safe on Machines of Heterogeneous Trustworthiness}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {419--430}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.43}, doi = {10.1109/CSAC.2005.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SinclairS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Snow05, author = {Brian D. Snow}, title = {We Need Assurance!}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.63}, doi = {10.1109/CSAC.2005.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Snow05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SommerP05, author = {Robin Sommer and Vern Paxson}, title = {Exploiting Independent State For Network Intrusion Detection}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {59--71}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.24}, doi = {10.1109/CSAC.2005.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SommerP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SuoZO05, author = {Xiaoyuan Suo and Ying Zhu and G. Scott Owen}, title = {Graphical Passwords: {A} Survey}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {463--472}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.27}, doi = {10.1109/CSAC.2005.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SuoZO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VasudevanY05, author = {Amit Vasudevan and Ramesh Yerraballi}, title = {Stealth Breakpoints}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {381--392}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.52}, doi = {10.1109/CSAC.2005.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VasudevanY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VerhannemanPWJ05, author = {Tine Verhanneman and Frank Piessens and Bart De Win and Wouter Joosen}, title = {Uniform Application-level Access Control Enforcement of Organizationwide Policies}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {431--440}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.59}, doi = {10.1109/CSAC.2005.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VerhannemanPWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WaddleW05, author = {Jason Waddle and David A. Wagner}, title = {Fault Attacks on Dual-Rail Encoded Systems}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {483--494}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.25}, doi = {10.1109/CSAC.2005.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WaddleW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangD05, author = {Wei Wang and Thomas E. Daniels}, title = {Building Evidence Graphs for Network Forensics Analysis}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {254--266}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.14}, doi = {10.1109/CSAC.2005.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.