


default search action
30. ACSAC 2014: New Orleans, LA, USA
- Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr:

Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014. ACM 2014, ISBN 978-1-4503-3005-3
Invited essayist
- Aviel D. Rubin:

Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications. 1-5
Secure builds and configuration
- Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:

Hot-hardening: getting more out of your security settings. 6-15 - Sören Bleikertz, Carsten Vogel, Thomas Groß:

Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. 26-35
Mobile systems security I
- Michael Backes, Sven Bugiel, Sebastian Gerling

:
Scippa: system-centric IPC provenance on Android. 36-45 - Michael Backes, Sven Bugiel, Sebastian Gerling

, Philipp von Styp-Rekowsky:
Android security framework: extensible multi-layered access control on Android. 46-55 - Yuru Shao, Xiapu Luo

, Chenxiong Qian, Pengfei Zhu, Lei Zhang:
Towards a scalable resource-driven approach for detecting repackaged Android applications. 56-65
Social computing and networks
- Rui Han, Alejandro Mesa, Mihai Christodorescu, Saman A. Zonouz:

TroGuard: context-aware protection against web-based socially engineered trojans. 66-75 - Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:

Spam ain't as diverse as it seems: throttling OSN spam with templates underneath. 76-85 - Chao Yang, Jialong Zhang, Guofei Gu:

A taste of tweets: reverse engineering Twitter spammers. 86-95
Systems security
- Tianwei Zhang, Ruby B. Lee:

New models of cache architectures characterizing information leakage from cache side channels. 96-105 - Raoul Strackx, Bart Jacobs

, Frank Piessens:
ICE: a passive, high-speed, state-continuity scheme. 106-115 - Samuel Junjie Tan, Sergey Bratus, Travis Goodspeed:

Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware. 116-125
Cyber physical systems I
- Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel

:
Through the eye of the PLC: semantic security monitoring for industrial processes. 126-135 - Carlos A. Barreto

, Alvaro A. Cárdenas, Nicanor Quijano
, Eduardo Mojica-Nava
:
CPS: market analysis of attacks against demand response in the smart grid. 136-145 - Marina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen:

CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. 146-155
Secure distributed systems
- Lance Alt, Robert Beverly

, Alberto Dainotti
:
Uncovering network tarpits with degreaser. 156-165 - M. Zubair Rafique, Juan Caballero, Christophe Huygens

, Wouter Joosen:
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. 166-175 - Yuzhe Richard Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang:

Lightweight authentication of freshness in outsourced key-value stores. 176-185
Securing memory and storage
- Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:

SEER: practical memory virus scanning as a service. 186-195 - Qian Feng, Aravind Prakash, Heng Yin

, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. 196-205 - Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun:

Assisted deletion of related content. 206-215
Mobile systems security II
- Yiming Jing, Ziming Zhao, Gail-Joon Ahn

, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. 216-225 - Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang:

Design and implementation of an Android host-based intrusion prevention system. 226-235 - Drew Davidson, Matt Fredrikson

, Benjamin Livshits:
MoRePriv: mobile OS support for application personalization and privacy. 236-245
Secure communications
- Adrian Dabrowski

, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl:
IMSI-catch me if you can: IMSI-catcher-catchers. 246-255 - Mathy Vanhoef

, Frank Piessens:
Advanced Wi-Fi attacks using commodity hardware. 256-265 - Henry Carter

, Charles Lever, Patrick Traynor:
Whitewash: outsourcing garbled circuit generation for mobile devices. 266-275
Usable security
- Hendrik Meutzner, Viet-Hung Nguyen, Thorsten Holz

, Dorothea Kolossa
:
Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security. 276-285 - Adam J. Aviv

, Dane Fichter:
Understanding visual perceptions of usability and security of Android's graphical password pattern. 286-295 - Daniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan (Martin) Yeh, Justin Cappos, Yanyan Zhuang:

It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. 296-305
Privacy
- Hyungsub Kim, Sangho Lee, Jong Kim:

Exploring and mitigating privacy threats of HTML5 geolocation API. 306-315 - Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:

Differentially private data aggregation with optimal utility. 316-325 - Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber:

On the privacy provisions of Bloom filters in lightweight bitcoin clients. 326-335
Network infrastructure security
- Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici:

OSPF vulnerability to persistent poisoning attacks: a systematic analysis. 336-345 - Amir Herzberg, Haya Schulmann, Bruno Crispo:

Less is more: cipher-suite negotiation for DNSSEC. 346-355 - Amir Herzberg, Haya Schulmann:

DNS authentication as a service: preventing amplification attacks. 356-365
Access control and malware
- John Slankas, Xusheng Xiao

, Laurie A. Williams, Tao Xie:
Relation extraction for inferring access control rules from natural language artifacts. 366-375 - Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley

:
Centrality metrics of importance in access behaviors and malware detections. 376-385 - Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias:

Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. 386-395
Software security
- Robert Gawlik, Thorsten Holz

:
Towards automated integrity protection of C++ virtual function tables in binary programs. 396-405 - Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz

, Christian Rossow:
Leveraging semantic signatures for bug search in binary programs. 406-415 - Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis:

IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. 416-425
Cyber physical systems II
- Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno:

CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. 426-435 - Marco Balduzzi, Alessandro Pasta, Kyle Wilhoit:

A security evaluation of AIS automated identification system. 436-445
Web security
- Willem De Groef, Fabio Massacci

, Frank Piessens:
NodeSentry: least-privilege library integration for server-side JavaScript. 446-455 - Sevtap Duman

, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson
, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. 456-465 - Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge:

JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. 466-475

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














