Search dblp for Publications

export results for "toc:db/conf/acsac/acsac2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/AktasG08,
  author       = {Erdem Aktas and
                  Kanad Ghose},
  title        = {{DARE:} {A} Framework for Dynamic Authentication of Remote Executions},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {453--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.49},
  doi          = {10.1109/ACSAC.2008.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AktasG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlsalehBO08,
  author       = {Mansour Alsaleh and
                  David Barrera and
                  Paul C. van Oorschot},
  title        = {Improving Security Visualization with Exposure Map Filtering},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {205--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.16},
  doi          = {10.1109/ACSAC.2008.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlsalehBO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaiGCWXM08,
  author       = {Xiaole Bai and
                  Wenjun Gu and
                  Sriram Chellappan and
                  Xun Wang and
                  Dong Xuan and
                  Bin Ma},
  title        = {{PAS:} Predicate-Based Authentication Services Against Powerful Passive
                  Adversaries},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {433--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.23},
  doi          = {10.1109/ACSAC.2008.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaiGCWXM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaligaGI08,
  author       = {Arati Baliga and
                  Vinod Ganapathy and
                  Liviu Iftode},
  title        = {Automatic Inference and Enforcement of Kernel Data Structure Invariants},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {77--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.29},
  doi          = {10.1109/ACSAC.2008.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaligaGI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BeresGSHMV08,
  author       = {Yolanta Beres and
                  Jonathan Griffin and
                  Simon Shiu and
                  Max Heitman and
                  David Markle and
                  Peter Ventura},
  title        = {Analysing the Performance of Security Solutions to Reduce Vulnerability
                  Exposure Window},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.42},
  doi          = {10.1109/ACSAC.2008.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BeresGSHMV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CapizziLVS08,
  author       = {Roberto Capizzi and
                  Antonio Longo and
                  V. N. Venkatakrishnan and
                  A. Prasad Sistla},
  title        = {Preventing Information Leaks through Shadow Executions},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {322--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.50},
  doi          = {10.1109/ACSAC.2008.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CapizziLVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CimatoGPSS08,
  author       = {Stelvio Cimato and
                  Marco Gamassi and
                  Vincenzo Piuri and
                  Roberto Sassi and
                  Fabio Scotti},
  title        = {Privacy-Aware Biometrics: Design and Implementation of a Multimodal
                  Verification System},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {130--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.13},
  doi          = {10.1109/ACSAC.2008.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CimatoGPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ColeL08,
  author       = {Robert J. Cole and
                  Peng Liu},
  title        = {Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding
                  Multi-Step Analysis},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.14},
  doi          = {10.1109/ACSAC.2008.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ColeL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckBRMS08,
  author       = {William Enck and
                  Kevin R. B. Butler and
                  Thomas Richardson and
                  Patrick D. McDaniel and
                  Adam D. Smith},
  title        = {Defending Against Attacks on Main Memory Persistence},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.45},
  doi          = {10.1109/ACSAC.2008.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckBRMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckMJ08,
  author       = {William Enck and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {PinUP: Pinning User Files to Known Applications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.41},
  doi          = {10.1109/ACSAC.2008.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckMJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FarrellGW08,
  author       = {Paul F. Farrell Jr. and
                  Simson L. Garfinkel and
                  Douglas White},
  title        = {Practical Applications of Bloom Filters to the {NIST} {RDS} and Hard
                  Drive Triage},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.12},
  doi          = {10.1109/ACSAC.2008.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FarrellGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ForrestAHS08,
  author       = {Stephanie Forrest and
                  Steven A. Hofmeyr and
                  Anil Somayaji},
  title        = {The Evolution of System-Call Monitoring},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {418--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.54},
  doi          = {10.1109/ACSAC.2008.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ForrestAHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FraserC08,
  author       = {Barbara Fraser and
                  Stephen D. Crocker},
  title        = {Epilogue for {RFC} 1281, Guidelines for the Secure Operation of the
                  Internet},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {405--417},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.57},
  doi          = {10.1109/ACSAC.2008.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FraserC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FraserEA08,
  author       = {Timothy Fraser and
                  Matthew R. Evenson and
                  William A. Arbaugh},
  title        = {{VICI} Virtual Machine Introspection for Cognitive Immunity},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {87--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.33},
  doi          = {10.1109/ACSAC.2008.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FraserEA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Frias-MartinezSK08,
  author       = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and
                  Salvatore J. Stolfo and
                  Angelos D. Keromytis},
  title        = {Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection
                  Sensors},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {367--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.30},
  doi          = {10.1109/ACSAC.2008.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Frias-MartinezSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoGCWL08,
  author       = {Haichang Gao and
                  Xuewu Guo and
                  Xiaoping Chen and
                  Liming Wang and
                  Xiyang Liu},
  title        = {{YAGP:} Yet Another Graphical Password Strategy},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {121--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.19},
  doi          = {10.1109/ACSAC.2008.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoGCWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GrilloLMI08,
  author       = {Antonio Grillo and
                  Alessandro Lentini and
                  Gianluigi Me and
                  Giuseppe F. Italiano},
  title        = {Transaction Oriented Text Messaging with Trusted-SMS},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {485--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.43},
  doi          = {10.1109/ACSAC.2008.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GrilloLMI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuoVA08,
  author       = {Qi Guo and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {237--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.38},
  doi          = {10.1109/ACSAC.2008.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuoVA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HasanWCSR08,
  author       = {Ragib Hasan and
                  Marianne Winslett and
                  Richard M. Conlan and
                  Brian Slesinsky and
                  Nandakumar Ramani},
  title        = {Please Permit Me: Stateless Delegated Authorization in Mashups},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {173--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.24},
  doi          = {10.1109/ACSAC.2008.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HasanWCSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HewettK08,
  author       = {Rattikorn Hewett and
                  Phongphun Kijsanayothin},
  title        = {Host-Centric Model Checking for Network Vulnerability Analysis},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {225--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.15},
  doi          = {10.1109/ACSAC.2008.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HewettK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HorstS08,
  author       = {Timothy W. van der Horst and
                  Kent E. Seamons},
  title        = {pwdArmor: Protecting Conventional Password-Based Authentications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {443--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.46},
  doi          = {10.1109/ACSAC.2008.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HorstS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsEP08,
  author       = {Martin Johns and
                  Bj{\"{o}}rn Engelmann and
                  Joachim Posegga},
  title        = {{XSSDS:} Server-Side Detection of Cross-Site Scripting Attacks},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {335--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.36},
  doi          = {10.1109/ACSAC.2008.36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsEP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarjothSH08,
  author       = {G{\"{u}}nter Karjoth and
                  Andreas Schade and
                  Els Van Herreweghen},
  title        = {Implementing ACL-Based Policies in {XACML}},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {183--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.31},
  doi          = {10.1109/ACSAC.2008.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarjothSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KohlerS08,
  author       = {Mathias Kohler and
                  Andreas Schaad},
  title        = {ProActive Access Control for Business Process-Driven Environments},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {153--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.26},
  doi          = {10.1109/ACSAC.2008.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KohlerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiPGF08,
  author       = {Peng Li and
                  Hyundo Park and
                  Debin Gao and
                  Jianming Fu},
  title        = {Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly
                  Detection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {392--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.17},
  doi          = {10.1109/ACSAC.2008.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiPGF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MartinHXH08,
  author       = {Evan Martin and
                  JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu},
  title        = {Assessing Quality of Policy Properties in Verification of Access Control
                  Policies},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {163--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.48},
  doi          = {10.1109/ACSAC.2008.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MartinHXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MassicotteLB08,
  author       = {Fr{\'{e}}d{\'{e}}ric Massicotte and
                  Yvan Labiche and
                  Lionel C. Briand},
  title        = {Toward Automatic Generation of Intrusion Detection Verification Rules},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {279--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.27},
  doi          = {10.1109/ACSAC.2008.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MassicotteLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NandaC08,
  author       = {Susanta Nanda and
                  Tzi{-}cker Chiueh},
  title        = {Execution Trace-Driven Automated Attack Signature Generation},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {195--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.58},
  doi          = {10.1109/ACSAC.2008.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NandaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OConnorR08,
  author       = {Terrence O'Connor and
                  Douglas S. Reeves},
  title        = {Bluetooth Network-Based Misuse Detection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {377--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.39},
  doi          = {10.1109/ACSAC.2008.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OConnorR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OMeliaE08,
  author       = {Sean O'Melia and
                  Adam J. Elbirt},
  title        = {Instruction Set Extensions for Enhancing the Performance of Symmetric-Key
                  Cryptography},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {465--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.10},
  doi          = {10.1109/ACSAC.2008.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OMeliaE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PerdisciLL08,
  author       = {Roberto Perdisci and
                  Andrea Lanzi and
                  Wenke Lee},
  title        = {McBoost: Boosting Scalability in Malware Collection and Analysis Using
                  Statistical Classification of Executables},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {301--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.22},
  doi          = {10.1109/ACSAC.2008.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PerdisciLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Salehi-AbariTO08,
  author       = {Amirali Salehi{-}Abari and
                  Julie Thorpe and
                  Paul C. van Oorschot},
  title        = {On Purely Automated Attacks and Click-Based Graphical Passwords},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.18},
  doi          = {10.1109/ACSAC.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Salehi-AbariTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Saydjari08,
  author       = {O. Sami Saydjari},
  title        = {Structuring for Strategic Cyber Defense: {A} Cyber Manhattan Project
                  Blueprint},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.53},
  doi          = {10.1109/ACSAC.2008.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Saydjari08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchmerlKFMR08,
  author       = {Sebastian Schmerl and
                  Hartmut K{\"{o}}nig and
                  Ulrich Flegel and
                  Michael Meier and
                  Ren{\'{e}} Rietz},
  title        = {Systematic Signature Engineering by Re-use of Snort Signatures},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {23--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.20},
  doi          = {10.1109/ACSAC.2008.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchmerlKFMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SohrMBA08,
  author       = {Karsten Sohr and
                  Tanveer Mustafa and
                  Xinyu Bao and
                  Gail{-}Joon Ahn},
  title        = {Enforcing Role-Based Access Control Policies in Web Services with
                  {UML} and {OCL}},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {257--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.35},
  doi          = {10.1109/ACSAC.2008.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SohrMBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StuderJKOC08,
  author       = {Ahren Studer and
                  Christina Johns and
                  Jaanus Kase and
                  Kyle O'Meara and
                  Lorrie Faith Cranor},
  title        = {A Survey to Guide Group Key Protocol Development},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {475--484},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.28},
  doi          = {10.1109/ACSAC.2008.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StuderJKOC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TannousTHMJ08,
  author       = {Albert Tannous and
                  Jonathan T. Trostle and
                  Mohamed Hassan and
                  Stephen E. McLaughlin and
                  Trent Jaeger},
  title        = {New Side Channels Targeted at Passwords},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {45--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.47},
  doi          = {10.1109/ACSAC.2008.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TannousTHMJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Vasudevan08,
  author       = {Amit Vasudevan},
  title        = {MalTRAK: Tracking and Eliminating Unknown Malware},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {311--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.44},
  doi          = {10.1109/ACSAC.2008.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Vasudevan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangHT08,
  author       = {Xunhua Wang and
                  Philip D. Huff and
                  Brett C. Tjaden},
  title        = {Improving the Efficiency of Capture-Resistant Biometric Authentication
                  Based on Set Intersection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {140--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.11},
  doi          = {10.1109/ACSAC.2008.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJZL08,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  title        = {{STILL:} Exploit Code Detection via Static Taint and Initialization
                  Analyses},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.37},
  doi          = {10.1109/ACSAC.2008.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiPGP08,
  author       = {Jinpeng Wei and
                  Bryan D. Payne and
                  Jonathon Giffin and
                  Calton Pu},
  title        = {Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {97--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.40},
  doi          = {10.1109/ACSAC.2008.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiPGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YueW08,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {Anti-Phishing in Offense and Defense},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {345--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.32},
  doi          = {10.1109/ACSAC.2008.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YueW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZarandioonYG08,
  author       = {Saman Zarandioon and
                  Danfeng Yao and
                  Vinod Ganapathy},
  title        = {{OMOS:} {A} Framework for Secure Communication in Mashup Applications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {355--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.25},
  doi          = {10.1109/ACSAC.2008.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZarandioonYG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangFWX08,
  author       = {Yinqian Zhang and
                  Xun Fan and
                  Yijun Wang and
                  Zhi Xue},
  title        = {Attack Grammar: {A} New Approach to Modeling and Analyzing Network
                  Attack Sequences},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.34},
  doi          = {10.1109/ACSAC.2008.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangFWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangREY08,
  author       = {Dana Zhang and
                  Kotagiri Ramamohanarao and
                  Tim Ebringer and
                  Trevor Yann},
  title        = {Permission Set Mining: Discovering Practical and Useful Roles},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {247--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.21},
  doi          = {10.1109/ACSAC.2008.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangREY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2008,
  title        = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4721525/proceeding},
  isbn         = {978-0-7695-3447-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics