


default search action
28. ACSAC 2012: Orlando, FL, USA
- Robert H'obbes' Zakon:

28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012. ACM 2012, ISBN 978-1-4503-1312-4
Web security
- Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung

, Lieven Desmet
, Frank Piessens:
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. 1-10 - Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar

:
One year of SSL internet measurement. 11-20 - Sumayah A. Alrwais, Alexandre Gerber, Christopher W. Dunn, Oliver Spatscheck, Minaxi Gupta, Eric Osterweil

:
Dissecting ghost clicks: ad fraud via misdirected human clicks. 21-30
Mobile security
- Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos

:
Permission evolution in the Android ecosystem. 31-40 - Adam J. Aviv

, Benjamin Sapp, Matt Blaze, Jonathan M. Smith:
Practicality of accelerometer side channels on smartphones. 41-50 - Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon

, Srdjan Capkun:
Analysis of the communication between colluding applications on modern smartphones. 51-60
Hardware security
- Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan

, Aurélien Francillon
, Srdjan Capkun:
Enabling trusted scheduling in embedded systems. 61-70 - Erik-Oliver Blass, William Robertson:

TRESOR-HUNT: attacking CPU-bound encryption. 71-78 - Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro

, Danilo Bruschi:
When hardware meets software: a bulletproof solution to forensic memory acquisition. 79-88
Passwords
- Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot

:
Tapas: design, implementation, and usability evaluation of a password manager. 89-98 - Paul Dunphy, Patrick Olivier

:
On automated image choice for secure and usable graphical passwords. 99-108 - Shiva Houshmand

, Sudhir Aggarwal:
Building better passwords using probabilistic techniques. 109-118
Botnets
- Shuang Zhao, Patrick P. C. Lee

, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao:
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. 119-128 - Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:

Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. 129-138
Classic book
- Ross J. Anderson:

Security economics: a personal perspective. 139-144
Invited essayist
- Susan D. Alexander:

Trust engineering: rejecting the tyranny of the weakest link. 145-148
Authentication
- Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno:

SensorSift: balancing sensor data privacy and utility in automated face understanding. 149-158 - Shari Trewin

, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David:
Biometric authentication on a mobile device: a study of user effort, error and task disruption. 159-168 - Martin Johns

, Sebastian Lekies, Bastian Braun, Benjamin Flesch:
BetterAuth: web authentication revisited. 169-178
Code analysis techniques
- Carsten Willems, Felix C. Freiling, Thorsten Holz

:
Using memory management to detect and extract illegitimate code for malware analysis. 179-188 - Carsten Willems, Ralf Hund, Andreas Fobian, Dennis Felsch, Thorsten Holz

, Amit Vasudevan:
Down to the bare metal: using processor features for binary analysis. 189-198 - Sean Heelan, Agustin Gianni:

Augmenting vulnerability analysis of binary code. 199-208
Cloud security
- Chris Jarabek, David Barrera, John Aycock:

ThinAV: truly lightweight mobile cloud-based anti-malware. 209-218 - Vasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler

, Ashwin Shashidharan, William Enck:
Abusing cloud-based browsers for fun and profit. 219-228 - Emil Stefanov, Marten van Dijk

, Ari Juels, Alina Oprea:
Iris: a scalable cloud file system with efficient integrity checks. 229-238
Intrusion detection
- Charles Smutz, Angelos Stavrou

:
Malicious PDF detection using metadata and structural features. 239-248 - Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:

Jarhead analysis and detection of malicious Java applets. 249-257 - Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler

:
Hi-Fi: collecting high-fidelity whole-system provenance. 259-268
Policy
- Divya Muthukumaran, Sandra Julieta Rueda

, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger:
Transforming commodity security policies to enforce Clark-Wilson integrity. 269-278 - Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:

CodeShield: towards personalized application whitelisting. 279-288 - Apurva Kumar:

Using automated model analysis for reasoning about security of web protocols. 289-298
Protection mechanisms
- Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:

Securing untrusted code via compiler-agnostic binary rewriting. 299-308 - Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu:

Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks. 309-318 - Christian S. Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra:

Distributed application tamper detection via continuous software updates. 319-328
Malware analysis and classification
- Roberto Perdisci

, Man Chon U:
VAMO: towards a fully automated malware clustering validity analysis. 329-338 - Mariano Graziano, Corrado Leita, Davide Balzarotti:

Towards network containment in malware analysis systems. 339-348 - Martina Lindorfer, Alessandro Di Federico, Federico Maggi

, Paolo Milani Comparetti, Stefano Zanero
:
Lines of malicious code: insights into the malicious software industry. 349-358
Software security
- Fabian Yamaguchi, Markus Lottmann, Konrad Rieck:

Generalized vulnerability extrapolation using abstract syntax trees. 359-368 - Yingnong Dang, Dongmei Zhang, Song Ge, Chengyun Chu, Yingjun Qiu, Tao Xie:

XIAO: tuning code clones at hands of engineers in practice. 369-378 - Angeliki Zavou, Georgios Portokalidis

, Angelos D. Keromytis:
Self-healing multitier architectures using cascading rescue points. 379-388
Social networking security
- Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta:

Twitter games: how successful spammers pick targets. 389-398 - Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi

, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero
:
All your face are belong to us: breaking Facebook's social authentication. 399-408 - Indrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth V. Krishnamurthy

, Sateesh Addepalli:
Enabling private conversations on Twitter. 409-418
Systems security
- John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:

Separation virtual machine monitors. 419-428 - Abhinav Srivastava, Jonathon T. Giffin:

Efficient protection of kernel data structures via object partitioning. 429-438 - Sarah M. Diesburg

, Christopher R. Meyers, Mark J. Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang
, Geoff Kuenning:
TrueErase: per-file secure deletion for the storage data path. 439-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














