


default search action
14th CCS 2007: Alexandria, VA, USA
- Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson:

Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM 2007, ISBN 978-1-59593-703-2 - Steven B. Lipner:

Assurance and evaluation: what next? 1
Web applications security
- Shuo Chen, David Ross, Yi-Min Wang:

An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. 2-11 - Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan:

CANDID: preventing sql injection attacks using dynamic candidate evaluations. 12-24 - Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna:

Multi-module vulnerability analysis of web-based applications. 25-35
Authentication and passwords
- Paul Dunphy, Jeff Yan:

Do background images improve "draw a secret" graphical passwords? 36-47 - Ben Adida:

Beamauth: two-factor web authentication with a bookmark. 48-57 - Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner:

Dynamic pharming attacks and locked same-origin policies for web browsers. 58-71
Anonymity
- Patrick P. Tsang, Man Ho Au

, Apu Kapadia, Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps. 72-81 - Nicholas Hopper, Eugene Y. Vasserman

, Eric Chan-Tin:
How much anonymity does network latency leak? 82-91 - Nikita Borisov

, George Danezis, Prateek Mittal, Parisa Tabriz:
Denial of service or denial of security? 92-102
Operating systems and malware
- Nick L. Petroni Jr., Michael W. Hicks

:
Automated detection of persistent kernel control-flow attacks. 103-115 - Heng Yin

, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. 116-127 - Xuxian Jiang, Xinyuan Wang, Dongyan Xu:

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. 128-138
Traffic analysis and location privacy
- José M. González, Vern Paxson, Nicholas Weaver:

Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. 139-149 - Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein:

Highly efficient techniques for network forensics. 150-160 - Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady:

Preserving privacy in gps traces via uncertainty-aware path cloaking. 161-171
Cryptography
- Phillip Rogaway, Mihir Bellare:

Robust computational secret sharing and a unified account of classical secret-sharing goals. 172-184 - Ran Canetti, Susan Hohenberger:

Chosen-ciphertext secure proxy re-encryption. 185-194 - Rafail Ostrovsky

, Amit Sahai, Brent Waters:
Attribute-based encryption with non-monotonic access structures. 195-203
Network security
- Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley:

Optimal security hardening using multi-objective optimization on attack tree models of networks. 204-213 - David John Zage, Cristina Nita-Rotaru:

On the accuracy of decentralized virtual coordinate systems in adversarial networks. 214-224 - Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:

Analyzing the vulnerability of superpeer networks against attack. 225-234 - Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter:

Towards automated provisioning of secure virtualized networks. 235-245
Election systems and applied cryptography
- Tal Moran, Moni Naor:

Split-ballot voting: everlasting privacy with distributed trust. 246-255 - Sujata Garera, Aviel D. Rubin:

An independent audit framework for software dependent voting systems. 256-265 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:

Forward-secure signatures in untrusted update environments: efficient and generic constructions. 266-275 - Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. 276-285
Side and covert channels detection
- Boris Köpf, David A. Basin:

An information-theoretic model for adaptive side-channel attacks. 286-296 - Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels:

Covert channels in privacy-preserving identification systems. 297-306 - Steven Gianvecchio, Haining Wang:

Detecting covert timing channels: an entropy-based approach. 307-316
Protocols and spam filters
- Juan Caballero, Heng Yin

, Zhenkai Liang
, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. 317-329 - J. Alex Halderman, Brent Waters:

Harvesting verifiable challenges from oblivious online sources. 330-341 - Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala:

Filtering spam with behavioral blacklisting. 342-351
Internet security
- Jedidiah R. Crandall

, Daniel Zinn, Michael Byrd, Earl T. Barr
, Rich East:
ConceptDoppler: a weather tracker for internet censorship. 352-365 - Jeremy Elson, John R. Douceur, Jon Howell, Jared Saul:

Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. 366-374 - Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage:

An inquiry into the nature and causes of the wealth of internet miscreants. 375-388
Key management
- Jeffrey S. Dwoskin, Ruby B. Lee:

Hardware-rooted trust for secure key management and transient trust. 389-400 - Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener:

Robust key generation from signal envelopes in wireless networks. 401-410 - Stanislaw Jarecki, Jihye Kim

, Gene Tsudik:
Robust group key agreement using short broadcasts. 411-420
Policies
- Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:

Protecting browsers from dns rebinding attacks. 421-431 - Chris Lesniewski-Laas, Bryan Ford

, Jacob Strauss, Robert Morris, M. Frans Kaashoek:
Alpaca: extensible authorization for distributed services. 432-444 - Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman:

Efficient policy analysis for administrative role based access control. 445-455
Cryptography and cryptoanalysis
- Ling Cheung, Calvin C. Newport:

Provably secure ciphertext policy ABE. 456-465 - Shai Halevi, Hugo Krawczyk:

Security under key-dependent inputs. 466-475 - Leo Dorrendorf, Zvi Gutterman, Benny Pinkas:

Cryptanalysis of the windows random number generator. 476-485
Data privacy
- Paul Bunn

, Rafail Ostrovsky
:
Secure two-party k-means clustering. 486-497 - Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel

:
Privacy-preserving remote diagnostics. 498-507 - Fengjun Li

, Bo Luo
, Peng Liu, Dongwon Lee
, Chao-Hsien Chu
:
Automaton segmentation: a new approach to preserve privacy in xml information brokering. 508-518 - Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik

:
Privacy preserving error resilient dna searching through oblivious automata. 519-528
Software security
- Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller

:
Predicting vulnerable software components. 529-540 - Yingbo Song, Michael E. Locasto, Angelos Stavrou

, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. 541-551 - Hovav Shacham:

The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). 552-561 - Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:

Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. 562-572
Data disclosure
- Lei Zhang, Sushil Jajodia, Alexander Brodsky:

Information disclosure under realistic assumptions: privacy versus optimality. 573-583 - Ari Juels, Burton S. Kaliski Jr.:

Pors: proofs of retrievability for large files. 584-597 - Giuseppe Ateniese

, Randal C. Burns
, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
Provable data possession at untrusted stores. 598-609

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














