Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2013.bht:"
@inproceedings{DBLP:conf/ccs/0010XWC13, author = {Rui Wang and Luyi Xing and XiaoFeng Wang and Shuo Chen}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Unauthorized origin crossing on mobile platforms: threats and mitigation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {635--646}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516727}, doi = {10.1145/2508859.2516727}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0010XWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13, author = {Gunes Acar and Marc Juarez and Nick Nikiforakis and Claudia D{\'{\i}}az and Seda F. G{\"{u}}rses and Frank Piessens and Bart Preneel}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {FPDetective: dusting the web for fingerprinters}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1129--1140}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516674}, doi = {10.1145/2508859.2516674}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Akinyele0H13, author = {Joseph A. Akinyele and Matthew Green and Susan Hohenberger}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Using {SMT} solvers to automate design tasks for encryption and signature schemes}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {399--410}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516718}, doi = {10.1145/2508859.2516718}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Akinyele0H13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlSabahG13, author = {Mashael AlSabah and Ian Goldberg}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{PCTCP:} per-circuit TCP-over-IPsec transport for anonymous communication overlay networks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {349--360}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516715}, doi = {10.1145/2508859.2516715}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlSabahG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AliA13, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Configuration-based {IDS} for advanced metering infrastructure}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {451--462}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516745}, doi = {10.1145/2508859.2516745}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AliA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlmeidaBBD13, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Fran{\c{c}}ois Dupressoir}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1217--1230}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516652}, doi = {10.1145/2508859.2516652}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlmeidaBBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AndresBCP13, author = {Miguel E. Andr{\'{e}}s and Nicol{\'{a}}s Emilio Bordenabe and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Geo-indistinguishability: differential privacy for location-based systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {901--914}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516735}, doi = {10.1145/2508859.2516735}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AndresBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Argones-RuaSP13, author = {Enrique Argones{-}R{\'{u}}a and Francisco Javier Garc{\'{\i}}a Salom{\'{o}}n and Luis P{\'{e}}rez{-}Freire}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Gradiant asymmetric encryption and verification systems based on handwritten signature}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1349--1350}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512497}, doi = {10.1145/2508859.2512497}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Argones-RuaSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtS13, author = {Frederik Armknecht and Jean{-}Pierre Seifert}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Third international workshop on trustworthy embedded devices (TrustED 2013)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1479--1480}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509029}, doi = {10.1145/2508859.2509029}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtSSW13, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A security framework for the analysis and design of software attestation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516650}, doi = {10.1145/2508859.2516650}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsharovL0Z13, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {More efficient oblivious transfer and extensions for faster secure computation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {535--548}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516738}, doi = {10.1145/2508859.2516738}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsharovL0Z13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AshfaqAAK13, author = {Ayesha Binte Ashfaq and Muhammad Qasim Ali and Ehab Al{-}Shaer and Syed Ali Khayam}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Revisiting anomaly detection system design philosophy}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1473--1476}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512529}, doi = {10.1145/2508859.2512529}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AshfaqAAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AshurD13, author = {Tomer Ashur and Orr Dunkelman}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {On the anonymity of Israel's general elections}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1399--1402}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512510}, doi = {10.1145/2508859.2512510}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AshurD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BacajR13, author = {Jeton Bacaj and Leon Reznik}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Signal anomaly based attack detection in wireless sensor networks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1391--1394}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512508}, doi = {10.1145/2508859.2512508}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BacajR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesFR13, author = {Michael Backes and Dario Fiore and Raphael M. Reischuk}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Verifiable delegation of computation on outsourced data}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {863--874}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516681}, doi = {10.1145/2508859.2516681}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BajajS13, author = {Sumeet Bajaj and Radu Sion}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{HIFS:} history independence for file systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1285--1296}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516724}, doi = {10.1145/2508859.2516724}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BajajS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaldimtsiL13, author = {Foteini Baldimtsi and Anna Lysyanskaya}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Anonymous credentials light}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1087--1098}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516687}, doi = {10.1145/2508859.2516687}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaldimtsiL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BanaHO13, author = {Gergei Bana and Koji Hasebe and Mitsuhiro Okada}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Computationally complete symbolic attacker and key exchange}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1231--1246}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516710}, doi = {10.1145/2508859.2516710}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BanaHO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BartheCGKLSB13, author = {Gilles Barthe and Juan Manuel Crespo and Benjamin Gr{\'{e}}goire and C{\'{e}}sar Kunz and Yassine Lakhnech and Benedikt Schmidt and Santiago Zanella B{\'{e}}guelin}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Fully automated analysis of padding-based encryption in the computational model}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1247--1260}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516663}, doi = {10.1145/2508859.2516663}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BartheCGKLSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BernsteinHKL13, author = {Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Elligator: elliptic-curve points indistinguishable from uniform random strings}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {967--980}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516734}, doi = {10.1145/2508859.2516734}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BernsteinHKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhatQ13, author = {Wasim Ahmad Bhat and S. M. K. Quadri}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Dr. Watson provides data for post-breach analysis}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1445--1448}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512522}, doi = {10.1145/2508859.2512522}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BhatQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiedermannK13, author = {Sebastian Biedermann and Stefan Katzenbeisser}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Event-based isolation of critical data in the cloud}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1383--1386}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512506}, doi = {10.1145/2508859.2512506}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BiedermannK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlanchetP13, author = {Bruno Blanchet and Miriam Paiola}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Automatic verification of protocols with lists of unbounded length}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {573--584}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516679}, doi = {10.1145/2508859.2516679}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BlanchetP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bodden13, author = {Eric Bodden}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Easily instrumenting android applications for security purposes}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1499--1502}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516759}, doi = {10.1145/2508859.2516759}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Bodden13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BohlCW13, author = {Florian B{\"{o}}hl and V{\'{e}}ronique Cortier and Bogdan Warinschi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Deduction soundness: prove one, get five for free}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1261--1272}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516711}, doi = {10.1145/2508859.2516711}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BohlCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BorgolteKV13, author = {Kevin Borgolte and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Delta: automatic identification of unknown web-based infection campaigns}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {109--120}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516725}, doi = {10.1145/2508859.2516725}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BorgolteKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrennerS13, author = {Michael Brenner and Matthew Smith}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Caching oblivious memory access: an extension to the {HCRYPT} virtual machine}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1363--1366}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512501}, doi = {10.1145/2508859.2512501}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrennerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrzuskaSWW13, author = {Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An analysis of the {EMV} channel establishment protocol}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {373--386}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516748}, doi = {10.1145/2508859.2516748}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrzuskaSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ButterworthKKH13, author = {John Butterworth and Corey Kallenberg and Xeno Kovah and Amy Herzog}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{BIOS} chronomancy: fixing the core root of trust for measurement}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {25--36}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516714}, doi = {10.1145/2508859.2516714}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ButterworthKKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CachinHHS13, author = {Christian Cachin and Kristiyan Haralambiev and Hsu{-}Chun Hsiao and Alessandro Sorniotti}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Policy-based secure deletion}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {259--270}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516690}, doi = {10.1145/2508859.2516690}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CachinHHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CairnsGH13, author = {Kelsey Cairns and Thoshitha T. Gamage and Carl Hauser}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Efficient targeted key subset retrieval in fractal hash sequences}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1273--1284}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516739}, doi = {10.1145/2508859.2516739}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CairnsGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chen013, author = {Liqun Chen and Jiangtao Li}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Flexible and scalable digital signatures in {TPM} 2.0}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {37--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516729}, doi = {10.1145/2508859.2516729}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chen013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenDSL13, author = {Zhaofeng Chen and Xinshu Dong and Prateek Saxena and Zhenkai Liang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{CRYPTSERVER:} strong data protection in commodity {LAMP} servers}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1457--1460}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512525}, doi = {10.1145/2508859.2512525}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenDSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenHLMMP13, author = {Xihui Chen and Carlo Harpes and Gabriele Lenzini and Miguel Martins and Sjouke Mauw and Jun Pang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Demonstrating a trust framework for evaluating {GNSS} signal integrity}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1329--1332}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512492}, doi = {10.1145/2508859.2512492}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenHLMMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Corrigan-GibbsMBF13, author = {Henry Corrigan{-}Gibbs and Wendy Mu and Dan Boneh and Bryan Ford}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Ensuring high-quality randomness in cryptographic key generation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {685--696}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516680}, doi = {10.1145/2508859.2516680}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Corrigan-GibbsMBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DamGKNS13, author = {Mads Dam and Roberto Guanciale and Narges Khakpour and Hamed Nemati and Oliver Schwarz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Formal verification of information flow security for a simple arm-based separation kernel}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {223--234}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516702}, doi = {10.1145/2508859.2516702}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DamGKNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaveGZ13, author = {Vacha Dave and Saikat Guha and Yin Zhang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {ViceROI: catching click-spam in search ad networks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {765--776}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516688}, doi = {10.1145/2508859.2516688}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaveGZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DenningLSK13, author = {Tamara Denning and Adam Lerner and Adam Shostack and Tadayoshi Kohno}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {915--928}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516753}, doi = {10.1145/2508859.2516753}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DenningLSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DobreKLMSV13, author = {Dan Dobre and Ghassan Karame and Wenting Li and Matthias Majuntke and Neeraj Suri and Marko Vukolic}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {PoWerStore: proofs of writing for efficient and robust storage}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {285--298}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516750}, doi = {10.1145/2508859.2516750}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DobreKLMSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisPRVW13, author = {Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Security analysis of pseudo-random number generators with input: /dev/random is not robust}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {647--658}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516653}, doi = {10.1145/2508859.2516653}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisPRVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dolan-GavittLHL13, author = {Brendan Dolan{-}Gavitt and Tim Leek and Josh Hodosh and Wenke Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Tappan Zee (north) bridge: mining memory accesses for introspection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {839--850}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516697}, doi = {10.1145/2508859.2516697}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dolan-GavittLHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DongCSTSL13, author = {Xinshu Dong and Zhaofeng Chen and Hossein Siadati and Shruti Tople and Prateek Saxena and Zhenkai Liang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Protecting sensitive web content from client-side vulnerabilities with {CRYPTONS}}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1311--1324}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516743}, doi = {10.1145/2508859.2516743}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DongCSTSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DongCW13, author = {Changyu Dong and Liqun Chen and Zikai Wen}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {When private set intersection meets big data: an efficient and scalable protocol}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {789--800}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516701}, doi = {10.1145/2508859.2516701}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DongCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoupeCJPKV13, author = {Adam Doup{\'{e}} and Weidong Cui and Mariusz H. Jakubowski and Marcus Peinado and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {deDacota: toward preventing server-side {XSS} via automatic code and data separation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1205--1216}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516708}, doi = {10.1145/2508859.2516708}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoupeCJPKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DunkelmanOS13, author = {Orr Dunkelman and Margarita Osadchy and Mahmood Sharif}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Secure authentication from facial attributeswith no privacy loss}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1403--1406}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512511}, doi = {10.1145/2508859.2512511}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DunkelmanOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DyerCRS13, author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Protocol misidentification made easy with format-transforming encryption}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {61--72}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516657}, doi = {10.1145/2508859.2516657}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DyerCRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EgeleBFK13, author = {Manuel Egele and David Brumley and Yanick Fratantonio and Christopher Kruegel}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An empirical study of cryptographic misuse in android applications}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {73--84}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516693}, doi = {10.1145/2508859.2516693}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EgeleBFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EkbergKA13, author = {Jan{-}Erik Ekberg and Kari Kostiainen and N. Asokan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Trusted execution environments on mobile devices}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1497--1498}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516758}, doi = {10.1145/2508859.2516758}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EkbergKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FahlHPKS13, author = {Sascha Fahl and Marian Harbach and Henning Perl and Markus Koetter and Matthew Smith}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Rethinking {SSL} development in an appified world}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {49--60}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516655}, doi = {10.1145/2508859.2516655}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FahlHPKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeltA13, author = {Adrienne Porter Felt and N. Asokan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {CCS'13 co-located workshop summary for {SPSM} 2013}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1489--1490}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509034}, doi = {10.1145/2508859.2509034}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeltA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FongMK13, author = {Philip W. L. Fong and Pooya Mehregan and Ram Krishnan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Relational abstraction in community-based secure collaboration}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {585--598}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516720}, doi = {10.1145/2508859.2516720}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FongMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Foresti13, author = {Sara Foresti}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {12th workshop on privacy in the electronic society {(WPES} 2013)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1477--1478}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509028}, doi = {10.1145/2508859.2509028}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Foresti13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FranzHMPV13, author = {Martin Franz and Andreas Holzer and Rupak Majumdar and Bryan Parno and Helmut Veith}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The first workshop on language support for privacy-enhancing technologies (PETShop'13)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1485--1486}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509032}, doi = {10.1145/2508859.2509032}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FranzHMPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoWQWLY13, author = {Haichang Gao and Wei Wang and Jiao Qi and Xuqin Wang and Xiyang Liu and Jeff Yan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The robustness of hollow CAPTCHAs}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1075--1086}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516732}, doi = {10.1145/2508859.2516732}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoWQWLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GeddesSH13, author = {John Geddes and Max Schuchard and Nicholas Hopper}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Cover your ACKs: pitfalls of covert channel censorship circumvention}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {361--372}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516742}, doi = {10.1145/2508859.2516742}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GeddesSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GheorgheN13, author = {Gabriela Gheorghe and Stephan Neuhaus}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Preserving privacy and accountability for personal devices}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1359--1362}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512500}, doi = {10.1145/2508859.2512500}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GheorgheN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GiesenKS13, author = {Florian Giesen and Florian Kohlar and Douglas Stebila}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {On the security of {TLS} renegotiation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {387--398}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516694}, doi = {10.1145/2508859.2516694}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GiesenKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrossH13, author = {Thomas Gro{\ss} and Marit Hansen}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Eighth {ACM} workshop on digital identity management {(DIM} 2013): identity at the crossroads}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1493--1494}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509036}, doi = {10.1145/2508859.2509036}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrossH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuldenringR13, author = {Benjamin G{\"{u}}ldenring and Volker Roth}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {TouchCtrl: fine-grained access control for collaborative environments}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1453--1456}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512524}, doi = {10.1145/2508859.2512524}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuldenringR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaghaniZ13, author = {Parisa Haghani and Saman A. Zonouz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Sechduler: a security-aware kernel scheduler}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1465--1468}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512527}, doi = {10.1145/2508859.2512527}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaghaniZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeiderichSFMY13, author = {Mario Heiderich and J{\"{o}}rg Schwenk and Tilman Frosch and Jonas Magazinius and Edward Z. Yang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {mXSS attacks: attacking well-secured web-applications by using innerHTML mutations}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {777--788}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516723}, doi = {10.1145/2508859.2516723}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeiderichSFMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HelfmeierNTKBS13, author = {Clemens Helfmeier and Dmitry Nedospasov and Christopher Tarnovsky and Jan Starbug Krissler and Christian Boit and Jean{-}Pierre Seifert}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Breaking and entering through the silicon}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {733--744}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516717}, doi = {10.1145/2508859.2516717}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HelfmeierNTKBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HerrewegeSKV13, author = {Anthony Van Herrewege and Andr{\'{e}} Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1333--1336}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512493}, doi = {10.1145/2508859.2512493}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HerrewegeSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HirschC13, author = {Andrew K. Hirsch and Michael R. Clarkson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Belief semantics of authorization logic}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {561--572}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516667}, doi = {10.1145/2508859.2516667}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HirschC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HomescuBLF13, author = {Andrei Homescu and Stefan Brunthaler and Per Larsen and Michael Franz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Librando: transparent code randomization for just-in-time compilers}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {993--1004}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516675}, doi = {10.1145/2508859.2516675}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HomescuBLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HumbertAHT13, author = {Mathias Humbert and Erman Ayday and Jean{-}Pierre Hubaux and Amalio Telenti}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Addressing the concerns of the lacks family: quantification of kin genomic privacy}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1141--1152}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516707}, doi = {10.1145/2508859.2516707}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HumbertAHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HusakV13, author = {Martin Hus{\'{a}}k and Martin Vizv{\'{a}}ry}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Reflected attacks abusing honeypots}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1449--1452}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512523}, doi = {10.1145/2508859.2512523}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HusakV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hypponen13, author = {Mikko Hypponen}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The cyber arms race}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {941--942}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516756}, doi = {10.1145/2508859.2516756}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hypponen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JareckiJKRS13, author = {Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Outsourced symmetric private information retrieval}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {875--888}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516730}, doi = {10.1145/2508859.2516730}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JareckiJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Javed13, author = {Ashar Javed}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A footprint of third-party tracking on mobile web}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1441--1444}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512521}, doi = {10.1145/2508859.2512521}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Javed13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JavedP13, author = {Mobin Javed and Vern Paxson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Detecting stealthy, distributed {SSH} brute-forcing}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {85--96}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516719}, doi = {10.1145/2508859.2516719}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JavedP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JawurekKO13, author = {Marek Jawurek and Florian Kerschbaum and Claudio Orlandi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {955--966}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516662}, doi = {10.1145/2508859.2516662}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JawurekKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JeeKKP13, author = {Kangkook Jee and Vasileios P. Kemerlis and Angelos D. Keromytis and Georgios Portokalidis}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {ShadowReplica: efficient parallelization of dynamic data flow tracking}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {235--246}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516704}, doi = {10.1145/2508859.2516704}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JeeKKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JohnsonWJSS13, author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul F. Syverson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Users get routed: traffic correlation on tor by realistic adversaries}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {337--348}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516651}, doi = {10.1145/2508859.2516651}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JohnsonWJSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsP13, author = {Ari Juels and Bryan Parno}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Fifth {ACM} cloud computing security workshop {(CCSW} 2013)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1487--1488}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509033}, doi = {10.1145/2508859.2509033}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsR13, author = {Ari Juels and Ronald L. Rivest}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Honeywords: making password-cracking detectable}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {145--160}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516671}, doi = {10.1145/2508859.2516671}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KasinathanCKPS13, author = {Prabhakaran Kasinathan and Gianfranco Costamagna and Hussein Khaleel and Claudio Pastrone and Maurizio A. Spirito}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An {IDS} framework for internet of things empowered by 6LoWPAN}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1337--1340}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512494}, doi = {10.1145/2508859.2512494}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KasinathanCKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KellerSS13, author = {Marcel Keller and Peter Scholl and Nigel P. Smart}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An architecture for practical actively secure {MPC} with dishonest majority}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {549--560}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516744}, doi = {10.1145/2508859.2516744}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KellerSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumGHHKSST13, author = {Florian Kerschbaum and Patrick Grofig and Isabelle Hang and Martin H{\"{a}}rterich and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Adjustably encrypted in-memory column-store}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1325--1328}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512491}, doi = {10.1145/2508859.2512491}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumGHHKSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhattakASK13, author = {Sheharbano Khattak and Zaafar Ahmed and Affan A. Syed and Syed Ali Khayam}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {BotFlex: a community-driven tool for botnetdetection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1387--1390}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512507}, doi = {10.1145/2508859.2512507}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhattakASK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasPTZ13, author = {Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Delegatable pseudorandom functions and applications}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {669--684}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516668}, doi = {10.1145/2508859.2516668}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasPTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasT13, author = {Aggelos Kiayias and Qiang Tang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {How to keep a secret: leakage deterring public-key cryptosystems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {943--954}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516691}, doi = {10.1145/2508859.2516691}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimH013, author = {Soo Hyeon Kim and Daewan Han and Dong Hoon Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Predictability of Android OpenSSL's pseudo random number generator}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {659--668}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516706}, doi = {10.1145/2508859.2516706}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimH013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KontaxisAPK13, author = {Georgios Kontaxis and Elias Athanasopoulos and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {SAuth: protecting user accounts from password database leaks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {187--198}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516746}, doi = {10.1145/2508859.2516746}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KontaxisAPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KotcherPJJ13, author = {Robert Kotcher and Yutong Pei and Pranjal Jumde and Collin Jackson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Cross-origin pixel stealing: timing attacks using {CSS} filters}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1055--1062}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516712}, doi = {10.1145/2508859.2516712}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KotcherPJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KovacsSF13, author = {M{\'{a}}t{\'{e}} Kov{\'{a}}cs and Helmut Seidl and Bernd Finkbeiner}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Relational abstract interpretation for the verification of 2-hypersafety properties}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {211--222}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516721}, doi = {10.1145/2508859.2516721}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KovacsSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KursaweD13, author = {Klaus Kursawe and Benessa Defend}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Smart energy grid security workshop (SEGS'13)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1491--1492}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509035}, doi = {10.1145/2508859.2509035}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KursaweD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KwonDSKD13, author = {Albert Kwon and Udit Dhawan and Jonathan M. Smith and Thomas F. Knight Jr. and Andr{\'{e}} DeHon}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {721--732}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516713}, doi = {10.1145/2508859.2516713}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KwonDSKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeZX13, author = {Kyu Hyung Lee and Xiangyu Zhang and Dongyan Xu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {LogGC: garbage collecting audit log}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1005--1016}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516731}, doi = {10.1145/2508859.2516731}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LekiesSJ13, author = {Sebastian Lekies and Ben Stock and Martin Johns}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {25 million flows later: large-scale detection of DOM-based {XSS}}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1193--1204}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516703}, doi = {10.1145/2508859.2516703}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LekiesSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LevesqueNFCS13, author = {Fanny Lalonde L{\'{e}}vesque and Jude Nsiempba and Jos{\'{e}} M. Fernandez and Sonia Chiasson and Anil Somayaji}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A clinical study of risk factors related to malware infections}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {97--108}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516747}, doi = {10.1145/2508859.2516747}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LevesqueNFCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLCC13, author = {Dan Li and Chaoge Liu and Xu Cui and Xiang Cui}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Sniffing and propagating malwares through {WPAD} deception in LANs}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1437--1440}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512520}, doi = {10.1145/2508859.2512520}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiQSWY13, author = {Ninghui Li and Wahbeh H. Qardaji and Dong Su and Yi Wu and Weining Yang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Membership privacy: a unifying framework for privacy definitions}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {889--900}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516686}, doi = {10.1145/2508859.2516686}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiQSWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LindorferNCP13, author = {Martina Lindorfer and Matthias Neumayr and Juan Caballero and Christian Platzer}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Cross-platform malware: write once, infect everywhere}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1425--1428}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512517}, doi = {10.1145/2508859.2512517}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LindorferNCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuCW13, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Blackbox traceable {CP-ABE:} how to catch people leaking their keys by selling decryption devices on ebay}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {475--486}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516683}, doi = {10.1145/2508859.2516683}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZY13, author = {Qixu Liu and Yuqing Zhang and Huan Yang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {trend of online flash {XSS} vulnerabilities}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1421--1424}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512516}, doi = {10.1145/2508859.2512516}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaasLSTSAKS13, author = {Martin Maas and Eric Love and Emil Stefanov and Mohit Tiwari and Elaine Shi and Krste Asanovic and John Kubiatowicz and Dawn Song}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{PHANTOM:} practical oblivious computation in a secure processor}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {311--324}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516692}, doi = {10.1145/2508859.2516692}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaasLSTSAKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MagaziniusRS13, author = {Jonas Magazinius and Billy K. Rios and Andrei Sabelfeld}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Polyglots: crossing origins by crossing formats}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {753--764}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516685}, doi = {10.1145/2508859.2516685}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MagaziniusRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaqsoodCG13, author = {Sana Maqsood and Sonia Chiasson and Audrey Girouard}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Passwords on flexible display devices}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1469--1472}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512528}, doi = {10.1145/2508859.2512528}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaqsoodCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MazurekKVBCCKSU13, author = {Michelle L. Mazurek and Saranga Komanduri and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Patrick Gage Kelley and Richard Shay and Blase Ur}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Measuring password guessability for an entire university}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {173--186}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516726}, doi = {10.1145/2508859.2516726}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MazurekKVBCCKSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenahemSL13, author = {Eitan Menahem and Asaf Shabtai and Adi Levhar}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Detecting malware through temporal function-based features}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1379--1382}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512505}, doi = {10.1145/2508859.2512505}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MenahemSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoshchukWL13, author = {Alexander Moshchuk and Helen J. Wang and Yunxin Liu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Content-based isolation: rethinking isolation policy design on client systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1167--1180}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516722}, doi = {10.1145/2508859.2516722}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoshchukWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MunirKSS13, author = {Arslan Munir and Farinaz Koushanfar and Herv{\'{e}} Seudie and Ahmad{-}Reza Sadeghi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1481--1482}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509030}, doi = {10.1145/2508859.2509030}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MunirKSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NadjiAPDL13, author = {Yacin Nadji and Manos Antonakakis and Roberto Perdisci and David Dagon and Wenke Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Beheading hydras: performing effective botnet takedowns}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {121--132}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516749}, doi = {10.1145/2508859.2516749}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NadjiAPDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NadkarniE13, author = {Adwait Nadkarni and William Enck}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Preventing accidental data disclosure in modern operating systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1029--1042}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516677}, doi = {10.1145/2508859.2516677}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NadkarniE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NelsonDS13, author = {Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Summary/overview for artificial intelligence and security (AISec'13)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1483--1484}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509031}, doi = {10.1145/2508859.2509031}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NelsonDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeuhausG13, author = {Stephan Neuhaus and Gabriela Gheorghe}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Critique of the {CISSP} common body of knowledge of cryptography}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1355--1358}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512499}, doi = {10.1145/2508859.2512499}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NeuhausG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenGDB13, author = {Giang T. K. Nguyen and Xun Gong and Anupam Das and Nikita Borisov}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {PnP: improving web browsing performance over tor using web resource prefetch-and-push}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1433--1436}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512519}, doi = {10.1145/2508859.2512519}, timestamp = {Fri, 23 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NguyenGDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenHK13, author = {Cuong Xuan Nguyen and Hung{-}Hsuan Huang and Kyoji Kawagoe}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Graphical password using object-based image ranking}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1371--1374}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512503}, doi = {10.1145/2508859.2512503}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NguyenHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NikolaenkoIWJTB13, author = {Valeria Nikolaenko and Stratis Ioannidis and Udi Weinsberg and Marc Joye and Nina Taft and Dan Boneh}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Privacy-preserving matrix factorization}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {801--812}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516751}, doi = {10.1145/2508859.2516751}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NikolaenkoIWJTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NiuT13a, author = {Ben Niu and Gang Tan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Monitor integrity protection with space efficiency and separate compilation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {199--210}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516649}, doi = {10.1145/2508859.2516649}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NiuT13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OwusuGMNPV13, author = {Emmanuel Owusu and Jorge Guajardo and Jonathan M. McCune and James Newsome and Adrian Perrig and Amit Vasudevan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{OASIS:} on achieving a sanctuary for integrity and secrecy on untrusted platforms}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516678}, doi = {10.1145/2508859.2516678}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OwusuGMNPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Paar13, author = {Christof Paar}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Constructive and destructive aspects of embedded security in the internet of things}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1495--1496}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516757}, doi = {10.1145/2508859.2516757}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Paar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PapadogiannakisLPI13, author = {Antonis Papadogiannakis and Laertis Loutsis and Vassilis Papaefstathiou and Sotiris Ioannidis}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{ASIST:} architectural support for instruction set randomization}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {981--992}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516670}, doi = {10.1145/2508859.2516670}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PapadogiannakisLPI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetulloZSBL13, author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {MinimaLT: minimal-latency networking through better security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {425--438}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516737}, doi = {10.1145/2508859.2516737}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetulloZSBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RajendranSSK13, author = {Jeyavijayan Rajendran and Michael Sam and Ozgur Sinanoglu and Ramesh Karri}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Security analysis of integrated circuit camouflaging}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {709--720}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516656}, doi = {10.1145/2508859.2516656}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RajendranSSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReardonRBC13, author = {Joel Reardon and Hubert Ritzdorf and David A. Basin and Srdjan Capkun}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Secure data deletion from persistent media}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {271--284}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516699}, doi = {10.1145/2508859.2516699}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReardonRBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReischukSG13, author = {Raphael M. Reischuk and Florian Schr{\"{o}}der and Johannes Gehrke}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Secure and customizable web development in the safe activation framework}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1341--1344}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512495}, doi = {10.1145/2508859.2512495}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReischukSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReznikB13, author = {Leon Reznik and Elisa Bertino}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Data quality evaluation: integrating security and accuracy}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1367--1370}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512502}, doi = {10.1145/2508859.2512502}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ReznikB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RobertsMLEW13, author = {Anthony Roberts and Richard McClatchey and Saad Liaquat and Nigel Edwards and Mike Wray}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Introducing pathogen: a real-time virtualmachine introspection framework}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1429--1432}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512518}, doi = {10.1145/2508859.2512518}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RobertsMLEW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RostamiJK13, author = {Masoud Rostami and Ari Juels and Farinaz Koushanfar}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Heart-to-heart {(H2H):} authentication for implanted medical devices}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1099--1112}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516658}, doi = {10.1145/2508859.2516658}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RostamiJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RouselakisW13, author = {Yannis Rouselakis and Brent Waters}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Practical constructions and new proof methods for large universe attribute-based encryption}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {463--474}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516672}, doi = {10.1145/2508859.2516672}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RouselakisW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RuffingSK13, author = {Tim Ruffing and Jonas Schneider and Aniket Kate}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Identity-based steganography and its applications to censorship resistance}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1461--1464}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512526}, doi = {10.1145/2508859.2512526}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RuffingSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sandhu13, author = {Ravi S. Sandhu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The science, engineering and business of cyber security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {411--412}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516755}, doi = {10.1145/2508859.2516755}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Sandhu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchrammLGK13, author = {Martin Schramm and Karl Leidl and Andreas Grzemba and Nicolai Kuntze}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Enhanced embedded device security by combining hardware-based trust mechanisms}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1395--1398}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512509}, doi = {10.1145/2508859.2512509}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchrammLGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchusterH13, author = {Felix Schuster and Thorsten Holz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Towards reducing the attack surface of software backdoors}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {851--862}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516716}, doi = {10.1145/2508859.2516716}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchusterH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SerwaddaP13, author = {Abdul Serwadda and Vir V. Phoha}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {When kids' toys breach mobile phone security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {599--610}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516659}, doi = {10.1145/2508859.2516659}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SerwaddaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShebaroJB13, author = {Bilal Shebaro and Di Jin and Elisa Bertino}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Performance signatures of mobile phone browsers}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1407--1410}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512512}, doi = {10.1145/2508859.2512512}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShebaroJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShelatS13, author = {Abhi Shelat and Chih{-}Hao Shen}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Fast two-party secure computation with minimal assumptions}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {523--534}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516698}, doi = {10.1145/2508859.2516698}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShelatS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShiSP13, author = {Elaine Shi and Emil Stefanov and Charalampos Papamanthou}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Practical dynamic proofs of retrievability}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {325--336}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516669}, doi = {10.1145/2508859.2516669}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShiSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShinYPG13, author = {Seungwon Shin and Vinod Yegneswaran and Phillip A. Porras and Guofei Gu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{AVANT-GUARD:} scalable and vigilant switch flow management in software-defined networks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {413--424}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516684}, doi = {10.1145/2508859.2516684}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShinYPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuklaRKL13, author = {Manish Shukla and Purushotam G. Radadia and Shirish Karande and Sachin Lodha}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {On the real-time masking of the sound of credit cards using hot patching}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1351--1354}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512498}, doi = {10.1145/2508859.2512498}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShuklaRKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SonMS13, author = {Sooel Son and Kathryn S. McKinley and Vitaly Shmatikov}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Diglossia: detecting code injection attacks with precision and efficiency}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1181--1192}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516696}, doi = {10.1145/2508859.2516696}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SonMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StefanovDSFRYD13, author = {Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher W. Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Path {ORAM:} an extremely simple oblivious {RAM} protocol}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {299--310}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516660}, doi = {10.1145/2508859.2516660}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StefanovDSFRYD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StefanovS13, author = {Emil Stefanov and Elaine Shi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Multi-cloud oblivious storage}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {247--258}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516673}, doi = {10.1145/2508859.2516673}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StefanovS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StringhiniKV13, author = {Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Shady paths: leveraging surfing crowds to detect malicious web pages}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {133--144}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516682}, doi = {10.1145/2508859.2516682}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StringhiniKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TanKYK13, author = {Rui Tan and Varun Badrinath Krishna and David K. Y. Yau and Zbigniew Kalbarczyk}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Impact of integrity attacks on real-time pricing in smart grids}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {439--450}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516705}, doi = {10.1145/2508859.2516705}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TanKYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TopleSCS13, author = {Shruti Tople and Shweta Shinde and Zhaofeng Chen and Prateek Saxena}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{AUTOCRYPT:} enabling homomorphic computation on servers to protect sensitive web content}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1297--1310}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516666}, doi = {10.1145/2508859.2516666}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TopleSCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UellenbeckDWH13, author = {Sebastian Uellenbeck and Markus D{\"{u}}rmuth and Christopher Wolf and Thorsten Holz}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Quantifying the security of graphical passwords: the case of android unlock patterns}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {161--172}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516700}, doi = {10.1145/2508859.2516700}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/UellenbeckDWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UtinKKVW13, author = {Daniil M. Utin and Roger Khazan and Joshua Kramer and Michael Vai and David Whelihan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{SHAMROCK:} self contained cryptography and key management processor}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1419--1420}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512515}, doi = {10.1145/2508859.2512515}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UtinKKVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeeningenBHZ13, author = {Meilof Veeningen and Mayla Brus{\`{o}} and Jerry den Hartog and Nicola Zannone}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{TRIPLEX:} verifying data minimisation in communication systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1415--1418}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512514}, doi = {10.1145/2508859.2512514}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeeningenBHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WaksmanSS13, author = {Adam Waksman and Matthew Suozzo and Simha Sethumadhavan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{FANCI:} identification of stealthy malicious logic using boolean functional analysis}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {697--708}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516654}, doi = {10.1145/2508859.2516654}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WaksmanSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeinerMTGW13, author = {Michael Weiner and Maurice Massar and Erik Tews and Dennis Giese and Wolfgang Wieser}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Security analysis of a widely deployed locking system}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {929--940}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516733}, doi = {10.1145/2508859.2516733}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeinerMTGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WolinskySF13, author = {David Isaac Wolinsky and Ewa Syta and Bryan Ford}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Hang with your buddies to resist intersection attacks}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1153--1166}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516740}, doi = {10.1145/2508859.2516740}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WolinskySF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WooCGB13, author = {Maverick Woo and Sang Kil Cha and Samantha Gottlieb and David Brumley}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Scheduling black-box mutational fuzzing}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {511--522}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516736}, doi = {10.1145/2508859.2516736}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WooCGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGZWJ13, author = {Lei Wu and Michael C. Grace and Yajin Zhou and Chiachih Wu and Xuxian Jiang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The impact of vendor customizations on android security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {623--634}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516728}, doi = {10.1145/2508859.2516728}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuH0MF13, author = {Yi Xu and Jared Heinly and Andrew M. White and Fabian Monrose and Jan{-}Michael Frahm}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Seeing double: reconstructing obscured typed input from repeated compromising reflections}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1063--1074}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516709}, doi = {10.1145/2508859.2516709}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuH0MF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YamaguchiWGR13, author = {Fabian Yamaguchi and Christian Wressnegger and Hugo Gascon and Konrad Rieck}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Chucky: exposing missing checks in source code for vulnerability discovery}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {499--510}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516665}, doi = {10.1145/2508859.2516665}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YamaguchiWGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYZGNW13, author = {Zhemin Yang and Min Yang and Yuan Zhang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {AppIntent: analyzing sensitive data transmission in android for privacy leakage detection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1043--1054}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516676}, doi = {10.1145/2508859.2516676}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangYZGNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoZ13, author = {Andrew Chi{-}Chih Yao and Yunlei Zhao}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{OAKE:} a new family of implicitly authenticated diffie-hellman protocols}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1113--1128}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516695}, doi = {10.1145/2508859.2516695}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YaoZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZengFMLZX13, author = {Junyuan Zeng and Yangchun Fu and Kenneth A. Miller and Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Obfuscation resilient binary code reuse through trace-oriented programming}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {487--498}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516664}, doi = {10.1145/2508859.2516664}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZengFMLZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangR13, author = {Yinqian Zhang and Michael K. Reiter}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {D{\"{u}}ppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {827--838}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516741}, doi = {10.1145/2508859.2516741}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangSB13, author = {Yihua Zhang and Aaron Steele and Marina Blanton}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{PICCO:} a general-purpose compiler for private distributed computation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {813--826}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516752}, doi = {10.1145/2508859.2516752}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYR13, author = {Hao Zhang and Danfeng (Daphne) Yao and Naren Ramakrishnan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A semantic-aware approach to reasoning about network traffic relations}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1375--1378}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512504}, doi = {10.1145/2508859.2512504}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYXYGNWZ13, author = {Yuan Zhang and Min Yang and Bingquan Xu and Zhemin Yang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang and Binyu Zang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Vetting undesirable behaviors in android apps with permission use analysis}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {611--622}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516689}, doi = {10.1145/2508859.2516689}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYXYGNWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhauniarovichGC13, author = {Yury Zhauniarovich and Olga Gadyatskaya and Bruno Crispo}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Enabling trusted stores for android}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1345--1348}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512496}, doi = {10.1145/2508859.2512496}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhauniarovichGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouDHNPWGN13, author = {Xiao{-}yong Zhou and Soteris Demetriou and Dongjing He and Muhammad Naveed and Xiaorui Pan and XiaoFeng Wang and Carl A. Gunter and Klara Nahrstedt}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Identity, location, disease and more: inferring your secrets from android public resources}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1017--1028}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516661}, doi = {10.1145/2508859.2516661}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouDHNPWGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouZL13, author = {Wenming Zhou and Yuqing Zhang and Xuefeng Liu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A new framework against privilege escalation attacks on android}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1411--1414}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512513}, doi = {10.1145/2508859.2512513}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2508859}, isbn = {978-1-4503-2477-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.