Search dblp for Publications

export results for "stream:conf/acsac:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@inproceedings{DBLP:conf/acsac/0021ZCPTLY23,
  author       = {Yu Zheng and
                  Qizhi Zhang and
                  Sherman S. M. Chow and
                  Yuxiang Peng and
                  Sijun Tan and
                  Lichun Li and
                  Shan Yin},
  title        = {Secure Softmax/Sigmoid for Machine-learning Computation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {463--476},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627175},
  doi          = {10.1145/3627106.3627175},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/0021ZCPTLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaiSZWCCR23,
  author       = {Jianli Bai and
                  Xiangfu Song and
                  Xiaowu Zhang and
                  Qifan Wang and
                  Shujie Cui and
                  Ee{-}Chien Chang and
                  Giovanni Russello},
  title        = {Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear
                  Communication},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {799--813},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627131},
  doi          = {10.1145/3627106.3627131},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaiSZWCCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BriongosKSW23,
  author       = {Samira Briongos and
                  Ghassan Karame and
                  Claudio Soriente and
                  Annika Wilde},
  title        = {No Forking Way: Detecting Cloning Attacks on Intel {SGX} Applications},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {744--758},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627187},
  doi          = {10.1145/3627106.3627187},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BriongosKSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CarboneriGKP23,
  author       = {Alberto Carboneri and
                  Mohammad Ghasemisharif and
                  Soroush Karami and
                  Jason Polakis},
  title        = {When Push Comes to Shove: Empirical Analysis of Web Push Implementations
                  in the Wild},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {44--55},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627186},
  doi          = {10.1145/3627106.3627186},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CarboneriGKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CastilloRF0S23,
  author       = {Jorge Castillo and
                  Phillip Rieger and
                  Hossein Fereidooni and
                  Qian Chen and
                  Ahmad{-}Reza Sadeghi},
  title        = {{FLEDGE:} Ledger-based Federated Learning Resilient to Inference and
                  Backdoor Attacks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {647--661},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627194},
  doi          = {10.1145/3627106.3627194},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CastilloRF0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chen00ZJL23,
  author       = {Joann Qiongna Chen and
                  Tianhao Wang and
                  Zhikun Zhang and
                  Yang Zhang and
                  Somesh Jha and
                  Zhou Li},
  title        = {Differentially Private Resource Allocation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {772--786},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627181},
  doi          = {10.1145/3627106.3627181},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Chen00ZJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenAC23,
  author       = {Yufan Chen and
                  Arjun Arunasalam and
                  Z. Berkay Celik},
  title        = {Can Large Language Models Provide Security {\&} Privacy Advice?
                  Measuring the Ability of LLMs to Refute Misconceptions},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {366--378},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627196},
  doi          = {10.1145/3627106.3627196},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChiAR23,
  author       = {Andrew Chi and
                  Blake Anderson and
                  Michael K. Reiter},
  title        = {Prioritizing Remediation of Enterprise Hosts by Malware Execution
                  Risk},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {550--564},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627180},
  doi          = {10.1145/3627106.3627180},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChiAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChiEM23,
  author       = {Andrew Chi and
                  Brandon Enright and
                  David A. McGrew},
  title        = {Detecting Weak Keys in Manufacturing Certificates: {A} Case Study},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {759--771},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627120},
  doi          = {10.1145/3627106.3627120},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChiEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CuiM23,
  author       = {Bo Cui and
                  Tianyu Mei},
  title        = {{ABFL:} {A} Blockchain-enabled Robust Framework for Secure and Trustworthy
                  Federated Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {636--646},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627121},
  doi          = {10.1145/3627106.3627121},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CuiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DengHW23,
  author       = {Zeyu Deng and
                  Long Huang and
                  Chen Wang},
  title        = {Enhanced In-air Signature Verification via Hand Skeleton Tracking
                  to Defeat Robot-level Replays},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {451--462},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627195},
  doi          = {10.1145/3627106.3627195},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DengHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DinaS023,
  author       = {Ayesha S. Dina and
                  A. B. Siddique and
                  D. Manivannan},
  title        = {{FS3:} Few-Shot and Self-Supervised Framework for Efficient Intrusion
                  Detection in Internet of Things Networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {138--149},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627193},
  doi          = {10.1145/3627106.3627193},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DinaS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EckelGGK23,
  author       = {Michael Eckel and
                  Dominik Roy George and
                  Bj{\"{o}}rn Grohmann and
                  Christoph Krau{\ss}},
  title        = {Remote Attestation with Constrained Disclosure},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {718--731},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627118},
  doi          = {10.1145/3627106.3627118},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EckelGGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FranzenWG23,
  author       = {Fabian Franzen and
                  Andreas Chris Wilhelmer and
                  Jens Grossklags},
  title        = {RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat
                  its Analysis},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {677--690},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627197},
  doi          = {10.1145/3627106.3627197},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FranzenWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GanzIHR23,
  author       = {Tom Ganz and
                  Erik Imgrund and
                  Martin H{\"{a}}rterich and
                  Konrad Rieck},
  title        = {{PAVUDI:} Patch-based Vulnerability Discovery using Machine Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {704--717},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627188},
  doi          = {10.1145/3627106.3627188},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GanzIHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GerettoHGBKG23,
  author       = {Elia Geretto and
                  Julius Hohnerlein and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe and
                  Klaus von Gleissenthall},
  title        = {Triereme: Speeding up hybrid fuzzing through efficient query scheduling},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {56--70},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627173},
  doi          = {10.1145/3627106.3627173},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GerettoHGBKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InnocentiGOMCK23,
  author       = {Tommaso Innocenti and
                  Matteo Golinelli and
                  Kaan Onarlioglu and
                  Seyed Ali Mirheidari and
                  Bruno Crispo and
                  Engin Kirda},
  title        = {OAuth 2.0 Redirect {URI} Validation Falls Short, Literally},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {256--267},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627140},
  doi          = {10.1145/3627106.3627140},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/InnocentiGOMCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KaplanLGQ23,
  author       = {Berkay Kaplan and
                  Israel J. Lopez{-}Toledo and
                  Carl A. Gunter and
                  Jingyu Qian},
  title        = {A Tagging Solution to Discover IoT Devices in Apartments},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {205--215},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627108},
  doi          = {10.1145/3627106.3627108},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KaplanLGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KernKH23,
  author       = {Dustin Kern and
                  Christoph Krau{\ss} and
                  Matthias Hollick},
  title        = {Detection of Anomalies in Electric Vehicle Charging Sessions},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {298--309},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627127},
  doi          = {10.1145/3627106.3627127},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KernKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KoideFN023,
  author       = {Takashi Koide and
                  Naoki Fukushi and
                  Hiroki Nakano and
                  Daiki Chiba},
  title        = {PhishReplicant: {A} Language Model-based Approach to Detect Generated
                  Squatting Domain Names},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627111},
  doi          = {10.1145/3627106.3627111},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KoideFN023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KotziasRPSB23,
  author       = {Platon Kotzias and
                  Kevin A. Roundy and
                  Michalis Pachilakis and
                  Iskander S{\'{a}}nchez{-}Rola and
                  Leyla Bilge},
  title        = {Scamdog Millionaire: Detecting E-commerce Scams in the Wild},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {29--43},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627184},
  doi          = {10.1145/3627106.3627184},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KotziasRPSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LadisaPRMB23,
  author       = {Piergiorgio Ladisa and
                  Serena Elisa Ponta and
                  Nicola Ronzoni and
                  Matias Martinez and
                  Olivier Barais},
  title        = {On the Feasibility of Cross-Language Detection of Malicious Packages
                  in npm and PyPI},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627138},
  doi          = {10.1145/3627106.3627138},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LadisaPRMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiGL0LXX23,
  author       = {Sijia Li and
                  Gaopeng Gou and
                  Chang Liu and
                  Gang Xiong and
                  Zhen Li and
                  Junchao Xiao and
                  Xinyu Xing},
  title        = {{TGC:} Transaction Graph Contrast Network for Ethereum Phishing Scam
                  Detection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {352--365},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627109},
  doi          = {10.1145/3627106.3627109},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiGL0LXX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiLG23,
  author       = {Fabing Li and
                  Xiang Li and
                  Mingyu Gao},
  title        = {Secure MLaaS with Temper: Trusted and Efficient Model Partitioning
                  and Enclave Reuse},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {621--635},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627145},
  doi          = {10.1145/3627106.3627145},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuJLLWL23,
  author       = {Xinyu Liu and
                  Ze Jin and
                  Jiaxi Liu and
                  Wei Liu and
                  Xiaoxi Wang and
                  Qixu Liu},
  title        = {ANDetect: {A} Third-party Ad Network Libraries Detection Framework
                  for Android Applications},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {98--112},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627182},
  doi          = {10.1145/3627106.3627182},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuJLLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuZM23,
  author       = {Zihao Liu and
                  Yan Zhang and
                  Chenglin Miao},
  title        = {Protecting Your Voice from Speech Synthesis Attacks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {394--408},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627183},
  doi          = {10.1145/3627106.3627183},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaarSRGM23,
  author       = {Lukas Maar and
                  Martin Schwarzl and
                  Fabian Rauscher and
                  Daniel Gruss and
                  Stefan Mangard},
  title        = {{DOPE:} DOmain Protection Enforcement with {PKS}},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {662--676},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627113},
  doi          = {10.1145/3627106.3627113},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MaarSRGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MahmudKC0TM23,
  author       = {Farabi Mahmud and
                  Sungkeun Kim and
                  Harpreet Singh Chawla and
                  Eun Jung Kim and
                  Chia{-}Che Tsai and
                  Abdullah Muzahid},
  title        = {Attack of the Knights: Non Uniform Cache Side Channel Attack},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {691--703},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627199},
  doi          = {10.1145/3627106.3627199},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MahmudKC0TM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MengYZGDC0Z23,
  author       = {Jie Meng and
                  Zeyu Yang and
                  Zhenyong Zhang and
                  Yangyang Geng and
                  Ruilong Deng and
                  Peng Cheng and
                  Jiming Chen and
                  Jianying Zhou},
  title        = {SePanner: Analyzing Semantics of Controller Variables in Industrial
                  Control Systems based on Network Traffic},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {310--323},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627179},
  doi          = {10.1145/3627106.3627179},
  timestamp    = {Tue, 09 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MengYZGDC0Z23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MirianHSV23,
  author       = {Ariana Mirian and
                  Grant Ho and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  title        = {An Empirical Analysis of Enterprise-Wide Mandatory Password Updates},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {150--162},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627198},
  doi          = {10.1145/3627106.3627198},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MirianHSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MooreKC23,
  author       = {Marina Moore and
                  Trishank Karthik Kuppusamy and
                  Justin Cappos},
  title        = {Artemis: Defanging Software Supply Chain Attacks in Multi-repository
                  Update Systems},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {83--97},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627129},
  doi          = {10.1145/3627106.3627129},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MooreKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuraliJSZJ0023,
  author       = {Srinivasan Murali and
                  Wenqiang Jin and
                  Vighnesh Sivaraman and
                  Huadi Zhu and
                  Tianxi Ji and
                  Pan Li and
                  Ming Li},
  title        = {Continuous Authentication Using Human-Induced Electric Potential},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {409--423},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627124},
  doi          = {10.1145/3627106.3627124},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuraliJSZJ0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NarayananCRABYF23,
  author       = {Vikram Narayanan and
                  Cl{\'{a}}udio Carvalho and
                  Angelo Ruocco and
                  Gheorghe Alm{\'{a}}si and
                  James Bottomley and
                  Mengmei Ye and
                  Tobin Feldman{-}Fitzthum and
                  Daniele Buono and
                  Hubertus Franke and
                  Anton Burtsev},
  title        = {Remote attestation of confidential VMs using ephemeral vTPMs},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {732--743},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627112},
  doi          = {10.1145/3627106.3627112},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NarayananCRABYF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NichollsKL23,
  author       = {Jack Nicholls and
                  Aditya Kuppa and
                  Nhien{-}An Le{-}Khac},
  title        = {FraudLens: Graph Structural Learning for Bitcoin Illicit Activity
                  Identification},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {324--336},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627200},
  doi          = {10.1145/3627106.3627200},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NichollsKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OchoaVTB23,
  author       = {Mart{\'{\i}}n Ochoa and
                  Hern{\'{a}}n Vanegas and
                  Jorge Toro{-}Pozo and
                  David A. Basin},
  title        = {SealClub: Computer-aided Paper Document Authentication},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {163--177},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627176},
  doi          = {10.1145/3627106.3627176},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OchoaVTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkAWMGKN23,
  author       = {Seonhye Park and
                  Alsharif Abuadbba and
                  Shuo Wang and
                  Kristen Moore and
                  Yansong Gao and
                  Hyoungshick Kim and
                  Surya Nepal},
  title        = {DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify
                  Proprietary Dataset Use in Deep Neural Networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {535--549},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627204},
  doi          = {10.1145/3627106.3627204},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkAWMGKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Plappert023,
  author       = {Christian Plappert and
                  Andreas Fuchs},
  title        = {Secure and Lightweight Over-the-Air Software Update Distribution for
                  Connected Vehicles},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {268--282},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627135},
  doi          = {10.1145/3627106.3627135},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Plappert023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Plappert023a,
  author       = {Christian Plappert and
                  Andreas Fuchs},
  title        = {Secure and Lightweight {ECU} Attestations for Resilient Over-the-Air
                  Updates in Connected Vehicles},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {283--297},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627202},
  doi          = {10.1145/3627106.3627202},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Plappert023a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Pourbemany023,
  author       = {Jafar Pourbemany and
                  Ye Zhu},
  title        = {Cross Body Signal Pairing {(CBSP):} {A} Key Generation Protocol for
                  Pairing Wearable Devices with Cardiac and Respiratory Sensors},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {424--438},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627185},
  doi          = {10.1145/3627106.3627185},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Pourbemany023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PutzMMS23,
  author       = {Philipp P{\"{u}}tz and
                  Richard Mitev and
                  Markus Miettinen and
                  Ahmad{-}Reza Sadeghi},
  title        = {Unleashing IoT Security: Assessing the Effectiveness of Best Practices
                  in Protecting Against Threats},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {190--204},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627133},
  doi          = {10.1145/3627106.3627133},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PutzMMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/QuiringMR23,
  author       = {Erwin Quiring and
                  Andreas M{\"{u}}ller and
                  Konrad Rieck},
  title        = {On the Detection of Image-Scaling Attacks in Machine Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {506--520},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627134},
  doi          = {10.1145/3627106.3627134},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/QuiringMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SaeifSG23,
  author       = {Saeif Alhazbi and
                  Savio Sciancalepore and
                  Gabriele Oligeri},
  title        = {The Day-After-Tomorrow: On the Performance of Radio Fingerprinting
                  over Time},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {439--450},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627192},
  doi          = {10.1145/3627106.3627192},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SaeifSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SebastianDCSB23,
  author       = {Silvia Sebasti{\'{a}}n and
                  Raluca{-}Georgia Diugan and
                  Juan Caballero and
                  Iskander S{\'{a}}nchez{-}Rola and
                  Leyla Bilge},
  title        = {Domain and Website Attribution beyond {WHOIS}},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {124--137},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627190},
  doi          = {10.1145/3627106.3627190},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SebastianDCSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SeeG0K23,
  author       = {Richard August See and
                  Maximilian Gehring and
                  Mathias Fischer and
                  Shankar Karuppayah},
  title        = {Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {594--608},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627139},
  doi          = {10.1145/3627106.3627139},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SeeG0K23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SeonghunRB23,
  author       = {Son Seonghun and
                  Debopriya Roy Dipta and
                  Berk G{\"{u}}lmezoglu},
  title        = {DefWeb: Defending User Privacy against Cache-based Website Fingerprinting
                  Attacks with Intelligent Noise Injection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {379--393},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627191},
  doi          = {10.1145/3627106.3627191},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SeonghunRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SeveriBOHKM23,
  author       = {Giorgio Severi and
                  Simona Boboila and
                  Alina Oprea and
                  John T. Holodnak and
                  Kendra Kratkiewicz and
                  Jason Matterer},
  title        = {Poisoning Network Flow Classifiers},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {337--351},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627123},
  doi          = {10.1145/3627106.3627123},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SeveriBOHKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShaonRK23,
  author       = {Fahad Shaon and
                  Sazzadur Rahaman and
                  Murat Kantarcioglu},
  title        = {The Queen's Guard: {A} Secure Enforcement of Fine-grained Access Control
                  In Distributed Data Analytics Platforms},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {241--255},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627132},
  doi          = {10.1145/3627106.3627132},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShaonRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StivalaAMGFP23,
  author       = {Giada Stivala and
                  Sahar Abdelnabi and
                  Andrea Mengascini and
                  Mariano Graziano and
                  Mario Fritz and
                  Giancarlo Pellegrino},
  title        = {From Attachments to {SEO:} Click Here to Learn More about Clickbait
                  PDFs!},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {14--28},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627172},
  doi          = {10.1145/3627106.3627172},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StivalaAMGFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TanX0023,
  author       = {Mingtian Tan and
                  Xiaofei Xie and
                  Jun Sun and
                  Tianhao Wang},
  title        = {Mitigating Membership Inference Attacks via Weighted Smoothing},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {787--798},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627189},
  doi          = {10.1145/3627106.3627189},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TanX0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TedeschiSP23,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled
                  Drones},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {178--189},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627174},
  doi          = {10.1145/3627106.3627174},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TedeschiSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TekgulA23,
  author       = {Buse G. A. Tekgul and
                  N. Asokan},
  title        = {{FLARE:} Fingerprinting Deep Reinforcement Learning Agents using Universal
                  Adversarial Masks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {492--505},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627128},
  doi          = {10.1145/3627106.3627128},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TekgulA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangGWZLG023,
  author       = {Ke Wang and
                  Jianbo Gao and
                  Qiao Wang and
                  Jiashuo Zhang and
                  Yue Li and
                  Zhi Guan and
                  Zhong Chen},
  title        = {Hades: Practical Decentralized Identity with Full Accountability and
                  Fine-grained Sybil-resistance},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {216--228},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627110},
  doi          = {10.1145/3627106.3627110},
  timestamp    = {Wed, 01 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangGWZLG023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangW23,
  author       = {Xiuling Wang and
                  Wendy Hui Wang},
  title        = {Link Membership Inference Attacks against Unsupervised Graph Representation
                  Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {477--491},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627115},
  doi          = {10.1145/3627106.3627115},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeeksCAKYV23,
  author       = {Connor Weeks and
                  Aravind Cheruvu and
                  Sifat Muhammad Abdullah and
                  Shravya Kanchi and
                  Daphne Yao and
                  Bimal Viswanath},
  title        = {A First Look at Toxicity Injection Attacks on Open-domain Chatbots},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {521--534},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627122},
  doi          = {10.1145/3627106.3627122},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeeksCAKYV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuZHJDCX23,
  author       = {Shaowen Xu and
                  Qihang Zhou and
                  Heqing Huang and
                  Xiaoqi Jia and
                  Haichao Du and
                  Yang Chen and
                  Yamin Xie},
  title        = {Log2Policy: An Approach to Generate Fine-Grained Access Control Rules
                  for Microservices from Scratch},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {229--240},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627137},
  doi          = {10.1145/3627106.3627137},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuZHJDCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YoonCK23,
  author       = {DaeGeun Yoon and
                  Taejoong Chung and
                  Yongdae Kim},
  title        = {Delegation of {TLS} Authentication to CDNs using Revocable Delegated
                  Credentials},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {113--123},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627144},
  doi          = {10.1145/3627106.3627144},
  timestamp    = {Sat, 17 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YoonCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhanBLHZGP23,
  author       = {Dazhi Zhan and
                  Wei Bai and
                  Xin Liu and
                  Yue Hu and
                  Lei Zhang and
                  Shize Guo and
                  Zhisong Pan},
  title        = {PSP-Mal: Evading Malware Detection via Prioritized Experience-based
                  Reinforcement Learning with Shapley Prior},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {580--593},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627178},
  doi          = {10.1145/3627106.3627178},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhanBLHZGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangDNBBS23,
  author       = {Yizhe Zhang and
                  Hongying Dong and
                  Alastair Nottingham and
                  Molly Buchanan and
                  Donald E. Brown and
                  Yixin Sun},
  title        = {Global Analysis with Aggregation-based Beaconing Detection across
                  Large Campus Networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {565--579},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627126},
  doi          = {10.1145/3627106.3627126},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangDNBBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhuangZTLWZ023,
  author       = {Xirong Zhuang and
                  Lan Zhang and
                  Chen Tang and
                  Huiqi Liu and
                  Bin Wang and
                  Yan Zheng and
                  Bo Ren},
  title        = {DeepContract: Controllable Authorization of Deep Learning Models},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {609--620},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627107},
  doi          = {10.1145/3627106.3627107},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhuangZTLWZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2023,
  title        = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106},
  doi          = {10.1145/3627106},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0001YKD022,
  author       = {Zheng Yang and
                  Chao Yin and
                  Junming Ke and
                  Tien Tuan Anh Dinh and
                  Jianying Zhou},
  title        = {If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {727--741},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567983},
  doi          = {10.1145/3564625.3567983},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/0001YKD022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0004GR22,
  author       = {Markus Bauer and
                  Ilya Grishchenko and
                  Christian Rossow},
  title        = {TyPro: Forward {CFI} for C-Style Indirect Function Calls Using Type
                  Propagation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {346--360},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564627},
  doi          = {10.1145/3564625.3564627},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/0004GR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0022X00LH22,
  author       = {Ning Wang and
                  Yang Xiao and
                  Yimin Chen and
                  Ning Zhang and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {Squeezing More Utility via Adaptive Clipping on Differentially Private
                  Gradients in Federated Meta-Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {647--657},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564652},
  doi          = {10.1145/3564625.3564652},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/0022X00LH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AhnAKP22,
  author       = {Sunwoo Ahn and
                  Seonggwan Ahn and
                  Hyungjoon Koo and
                  Yunheung Paek},
  title        = {Practical Binary Code Similarity Detection with BERT-based Transferable
                  Similarity Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {361--374},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567975},
  doi          = {10.1145/3564625.3567975},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AhnAKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AnwarCHSKO22,
  author       = {Afsah Anwar and
                  Yi Hui Chen and
                  Roy Hodgman and
                  Tom Sellers and
                  Engin Kirda and
                  Alina Oprea},
  title        = {A Recent Year On the Internet: Measuring and Understanding the Threats
                  to Everyday Internet Devices},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {251--266},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564649},
  doi          = {10.1145/3564625.3564649},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AnwarCHSKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ApruzzeseCY22,
  author       = {Giovanni Apruzzese and
                  Mauro Conti and
                  Ying Yuan},
  title        = {SpacePhish: The Evasion-space of Adversarial Attacks against Phishing
                  Website Detectors using Machine Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {171--185},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567980},
  doi          = {10.1145/3564625.3567980},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ApruzzeseCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaeB0P22,
  author       = {Yechan Bae and
                  Sarbartha Banerjee and
                  Sangho Lee and
                  Marcus Peinado},
  title        = {Spacelord: Private and Secure Smart Space Sharing},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {427--439},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564637},
  doi          = {10.1145/3564625.3564637},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaeB0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaruaPF22,
  author       = {Anomadarshi Barua and
                  Lelin Pan and
                  Mohammad Abdullah Al Faruque},
  title        = {BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial
                  Control Systems},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {440--454},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564638},
  doi          = {10.1145/3564625.3564638},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaruaPF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BitsikasP22,
  author       = {Evangelos Bitsikas and
                  Christina P{\"{o}}pper},
  title        = {You have been warned: Abusing 5G's Warning and Emergency Systems},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {561--575},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3568000},
  doi          = {10.1145/3564625.3568000},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BitsikasP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BuchholzAWNK22,
  author       = {Erik Buchholz and
                  Alsharif Abuadbba and
                  Shuo Wang and
                  Surya Nepal and
                  Salil Subhash Kanhere},
  title        = {Reconstruction Attack on Differential Private Trajectory Protection
                  Mechanisms},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {279--292},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564628},
  doi          = {10.1145/3564625.3564628},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BuchholzAWNK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoL0H22,
  author       = {Ying Cao and
                  Ruigang Liang and
                  Kai Chen and
                  Peiwei Hu},
  title        = {Boosting Neural Networks to Decompile Optimized Binaries},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {508--518},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567998},
  doi          = {10.1145/3564625.3567998},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoL0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChehTC22,
  author       = {Carmen Cheh and
                  Nicholas Tay and
                  Binbin Chen},
  title        = {From Hindsight to Foresight: Enhancing Design Artifacts for Business
                  Logic Flaw Discovery},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {400--411},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564654},
  doi          = {10.1145/3564625.3564654},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChehTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CsikorRL22,
  author       = {Levente Csikor and
                  Sriram Ramachandran and
                  Anantharaman Lakshminarayanan},
  title        = {ZeroDNS: Towards Better Zero Trust Security using {DNS}},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {699--713},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567968},
  doi          = {10.1145/3564625.3567968},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CsikorRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DaiHXZX022,
  author       = {Xiaohai Dai and
                  Liping Huang and
                  Jiang Xiao and
                  Zhaonan Zhang and
                  Xia Xie and
                  Hai Jin},
  title        = {Trebiz: Byzantine Fault Tolerance with Byzantine Merchants},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {923--935},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567976},
  doi          = {10.1145/3564625.3567976},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DaiHXZX022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DiaoZZK22,
  author       = {Yufeng Diao and
                  Yichi Zhang and
                  Guodong Zhao and
                  Mohamed Khamis},
  title        = {Drone Authentication via Acoustic Fingerprint},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {658--668},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564653},
  doi          = {10.1145/3564625.3564653},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DiaoZZK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DiptaG22,
  author       = {Debopriya Roy Dipta and
                  Berk G{\"{u}}lmezoglu},
  title        = {{DF-SCA:} Dynamic Frequency Side Channel Attacks are Practical},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {841--853},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567979},
  doi          = {10.1145/3564625.3567979},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DiptaG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ErbaT22,
  author       = {Alessandro Erba and
                  Nils Ole Tippenhauer},
  title        = {Assessing Model-free Anomaly Detection in Industrial Control Systems
                  Against Generic Concealment Attacks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {412--426},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564633},
  doi          = {10.1145/3564625.3564633},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ErbaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FainchteinAS22,
  author       = {Rahel A. Fainchtein and
                  Adam J. Aviv and
                  Micah Sherr},
  title        = {User Perceptions of the Privacy and Usability of Smart {DNS}},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {591--604},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567978},
  doi          = {10.1145/3564625.3567978},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FainchteinAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FangLGB22,
  author       = {Minghong Fang and
                  Jia Liu and
                  Neil Zhenqiang Gong and
                  Elizabeth S. Bentley},
  title        = {AFLGuard: Byzantine-robust Asynchronous Federated Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {632--646},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567991},
  doi          = {10.1145/3564625.3567991},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FangLGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FaulkenberryAMA22,
  author       = {Aaron Faulkenberry and
                  Athanasios Avgetidis and
                  Zane Ma and
                  Omar Alrawi and
                  Charles Lever and
                  Panagiotis Kintis and
                  Fabian Monrose and
                  Angelos D. Keromytis and
                  Manos Antonakakis},
  title        = {View from Above: Exploring the Malware Ecosystem from the Upper {DNS}
                  Hierarchy},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {240--250},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564646},
  doi          = {10.1145/3564625.3564646},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FaulkenberryAMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GerettoGBK22,
  author       = {Elia Geretto and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe},
  title        = {Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {375--387},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564639},
  doi          = {10.1145/3564625.3564639},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GerettoGBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Gong0BSSX0HF22,
  author       = {Chen Gong and
                  Zhou Yang and
                  Yunpeng Bai and
                  Jieke Shi and
                  Arunesh Sinha and
                  Bowen Xu and
                  David Lo and
                  Xinwen Hou and
                  Guoliang Fan},
  title        = {Curiosity-Driven and Victim-Aware Adversarial Policies},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {186--200},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564636},
  doi          = {10.1145/3564625.3564636},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Gong0BSSX0HF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Gotte0022,
  author       = {Jan Sebastian G{\"{o}}tte and
                  Liran Katzir and
                  Bj{\"{o}}rn Scheuermann},
  title        = {Ripples in the Pond: Transmitting Information through Grid Frequency
                  Modulation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {455--466},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564640},
  doi          = {10.1145/3564625.3564640},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Gotte0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuoWZZ22,
  author       = {Yinggang Guo and
                  Zicheng Wang and
                  Bingnan Zhong and
                  Qingkai Zeng},
  title        = {Formal Modeling and Security Analysis for Intra-level Privilege Separation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {88--101},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567984},
  doi          = {10.1145/3564625.3567984},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuoWZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuptaDSVKK22,
  author       = {Rajat Gupta and
                  Lukas Patrick Dresel and
                  Noah Spahn and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Taesoo Kim},
  title        = {{POPKORN:} Popping Windows Kernel Drivers At Scale},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {854--868},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564631},
  doi          = {10.1145/3564625.3564631},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuptaDSVKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HaydariCZMP22,
  author       = {Ammar Haydari and
                  Chen{-}Nee Chuah and
                  H. Michael Zhang and
                  Jane MacFarlane and
                  Sean Peisert},
  title        = {Differentially Private Map Matching for Mobility Trajectories},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {293--303},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567974},
  doi          = {10.1145/3564625.3567974},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HaydariCZMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HeoGJK0PKSL22,
  author       = {Jeongyoon Heo and
                  Sangwon Gil and
                  Youngman Jung and
                  Jinmok Kim and
                  Donguk Kim and
                  Woojin Park and
                  Yongdae Kim and
                  Kang G. Shin and
                  Choong{-}Hoon Lee},
  title        = {Are There Wireless Hidden Cameras Spying on Me?},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {714--726},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564632},
  doi          = {10.1145/3564625.3564632},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HeoGJK0PKSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InamGLMMG0H22,
  author       = {Muhammad Adil Inam and
                  Akul Goyal and
                  Jason Liu and
                  Jaron Mink and
                  Noor Michael and
                  Sneha Gaur and
                  Adam Bates and
                  Wajih Ul Hassan},
  title        = {FAuST: Striking a Bargain between Forensic Auditing's Security and
                  Throughput},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {813--826},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567990},
  doi          = {10.1145/3564625.3567990},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/InamGLMMG0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KleinMBKJ22,
  author       = {David Klein and
                  Marius Musch and
                  Thomas Barber and
                  Moritz Kopmann and
                  Martin Johns},
  title        = {Accept All Exploits: Exploring the Security Impact of Cookie Banners},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {911--922},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564647},
  doi          = {10.1145/3564625.3564647},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KleinMBKJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KoikeKYK22,
  author       = {Yuki Koike and
                  Hiroyuki Katsura and
                  Hiromu Yakura and
                  Yuma Kurogome},
  title        = {{SLOPT:} Bandit Optimization Framework for Mutation-Based Fuzzing},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {519--533},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564659},
  doi          = {10.1145/3564625.3564659},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KoikeKYK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LandenCIMWL22,
  author       = {Matthew Landen and
                  Key{-}whan Chung and
                  Moses Ike and
                  Sarah Mackay and
                  Jean{-}Paul Watson and
                  Wenke Lee},
  title        = {{DRAGON:} Deep Reinforcement Learning for Autonomous Grid Operation
                  and Attack Detection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {13--27},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567969},
  doi          = {10.1145/3564625.3567969},
  timestamp    = {Wed, 06 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LandenCIMWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Lang0MLWL22,
  author       = {Fan Lang and
                  Wei Wang and
                  Lingjia Meng and
                  Jingqiang Lin and
                  Qiongxiao Wang and
                  Linli Lu},
  title        = {MoLE: Mitigation of Side-channel Attacks against {SGX} via Dynamic
                  Data Location Escape},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {978--988},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3568002},
  doi          = {10.1145/3564625.3568002},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Lang0MLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Li0LZML22,
  author       = {Wenqing Li and
                  Shijie Jia and
                  Limin Liu and
                  Fangyu Zheng and
                  Yuan Ma and
                  Jingqiang Lin},
  title        = {CryptoGo: Automatic Detection of Go Cryptographic {API} Misuses},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {318--331},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567989},
  doi          = {10.1145/3564625.3567989},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Li0LZML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiCXBL22,
  author       = {Yong{-}Gang Li and
                  Yeh{-}Ching Chung and
                  Jinbiao Xing and
                  Yu Bao and
                  Guoyuan Lin},
  title        = {MProbe: Make the code probing meaningless},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {214--226},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567967},
  doi          = {10.1145/3564625.3567967},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiCXBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuSSJM22,
  author       = {Yushan Liu and
                  Xiaokui Shu and
                  Yixin Sun and
                  Jiyong Jang and
                  Prateek Mittal},
  title        = {{RAPID:} Real-Time Alert Investigation with Context-aware Prioritization
                  for Efficient Threat Discovery},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {827--840},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567997},
  doi          = {10.1145/3564625.3567997},
  timestamp    = {Sat, 28 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuSSJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuoXX22,
  author       = {Yu Luo and
                  Weifeng Xu and
                  Dianxiang Xu},
  title        = {Compact Abstract Graphs for Detecting Code Vulnerability with {GNN}
                  Models},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {497--507},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564655},
  doi          = {10.1145/3564625.3564655},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuoXX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaRE22,
  author       = {Xinshu Ma and
                  Florentin Rochet and
                  Tariq Elahi},
  title        = {Stopping Silent Sneaks: Defending against Malicious Mixes with Topological
                  Engineering},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {132--145},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567996},
  doi          = {10.1145/3564625.3567996},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MaRE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MahmudETEOS22,
  author       = {Samin Yaseer Mahmud and
                  K. Virgil English and
                  Seaver Thorn and
                  William Enck and
                  Adam Oest and
                  Muhammad Saad},
  title        = {Analysis of Payment Service Provider SDKs in Android},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {576--590},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564641},
  doi          = {10.1145/3564625.3564641},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MahmudETEOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MansouriOJ22,
  author       = {Mohamad Mansouri and
                  Melek {\"{O}}nen and
                  Wafa Ben Jaballah},
  title        = {Learning from Failures: Secure and Fault-Tolerant Aggregation for
                  Federated Learning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {146--158},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3568135},
  doi          = {10.1145/3564625.3568135},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MansouriOJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MatteiMKV22,
  author       = {James Mattei and
                  Madeline McLaughlin and
                  Samantha Katcher and
                  Daniel Votipka},
  title        = {A Qualitative Evaluation of Reverse Engineering Tool Usability},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {619--631},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567993},
  doi          = {10.1145/3564625.3567993},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MatteiMKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MiaoXLLMD22,
  author       = {Yinbin Miao and
                  Rongpeng Xie and
                  Xinghua Li and
                  Ximeng Liu and
                  Zhuo Ma and
                  Robert H. Deng},
  title        = {Compressed Federated Learning Based on Adaptive Local Differential
                  Privacy},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {159--170},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567973},
  doi          = {10.1145/3564625.3567973},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MiaoXLLMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NaHKS22,
  author       = {Seung Ho Na and
                  Hyeong Gwon Hong and
                  Junmo Kim and
                  Seungwon Shin},
  title        = {Closing the Loophole: Rethinking Reconstruction Attacks in Federated
                  Learning from a Privacy Standpoint},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {332--345},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564657},
  doi          = {10.1145/3564625.3564657},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NaHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Oh0QKL22,
  author       = {ChangSeok Oh and
                  Sangho Lee and
                  Chenxiong Qian and
                  Hyungjoon Koo and
                  Wenke Lee},
  title        = {DeView: Confining Progressive Web Applications by Debloating Web APIs},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {881--895},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567987},
  doi          = {10.1145/3564625.3567987},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Oh0QKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PecholtW22,
  author       = {Joana Pecholt and
                  Sascha Wessel},
  title        = {CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential
                  Computing Environments},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {989--998},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564648},
  doi          = {10.1145/3564625.3564648},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PecholtW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Picazo-SanchezE22,
  author       = {Pablo Picazo{-}Sanchez and
                  Benjamin Eriksson and
                  Andrei Sabelfeld},
  title        = {No Signal Left to Chance: Driving Browser Extension Analysis by Download
                  Patterns},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {896--910},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567988},
  doi          = {10.1145/3564625.3567988},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Picazo-SanchezE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RenWLLVL0C22,
  author       = {Qian Ren and
                  Yingjun Wu and
                  Han Liu and
                  Yue Li and
                  Anne Victor and
                  Hong Lei and
                  Lei Wang and
                  Bangdao Chen},
  title        = {Cloak: Transitioning States on Legacy Blockchains Using Secure and
                  Publicly Verifiable Off-Chain Multi-Party Computation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {117--131},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567995},
  doi          = {10.1145/3564625.3567995},
  timestamp    = {Wed, 01 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RenWLLVL0C22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SabryS22,
  author       = {Moe Sabry and
                  Reza Samavi},
  title        = {ArchiveSafe {LT:} Secure Long-term Archiving System},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {936--948},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564635},
  doi          = {10.1145/3564625.3564635},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SabryS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SathayeNR22,
  author       = {Harshad Sathaye and
                  Guevara Noubir and
                  Aanjhan Ranganathan},
  title        = {On the Implications of Spoofing and Jamming Aviation Datalink Applications},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {548--560},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564651},
  doi          = {10.1145/3564625.3564651},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SathayeNR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SciancaleporeG22,
  author       = {Savio Sciancalepore and
                  Dominik Roy George},
  title        = {Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial
                  Vehicles},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564626},
  doi          = {10.1145/3564625.3564626},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SciancaleporeG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SeoKMYPLSK22,
  author       = {Minjae Seo and
                  Jaehan Kim and
                  Eduard Marin and
                  Myoungsung You and
                  Taejune Park and
                  Seungsoo Lee and
                  Seungwon Shin and
                  Jinwoo Kim},
  title        = {Heimdallr: Fingerprinting {SD-WAN} Control-Plane Architecture via
                  Encrypted Control Traffic},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {949--963},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564642},
  doi          = {10.1145/3564625.3564642},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SeoKMYPLSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenDC22,
  author       = {Zhuojia Shen and
                  Komail Dharsee and
                  John Criswell},
  title        = {Randezvous: Making Randomization Effective on MCUs},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {28--41},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567970},
  doi          = {10.1145/3564625.3567970},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenZWB22,
  author       = {Liyue Shen and
                  Yanjun Zhang and
                  Jingwei Wang and
                  Guangdong Bai},
  title        = {Better Together: Attaining the Triad of Byzantine-robust Federated
                  Learning via Local Update Amplification},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {201--213},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564658},
  doi          = {10.1145/3564625.3564658},
  timestamp    = {Wed, 28 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenZWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SrinivasaPV22,
  author       = {Shreyas Srinivasa and
                  Jens Myrup Pedersen and
                  Emmanouil Vasilomanolakis},
  title        = {Interaction matters: a comprehensive analysis and a dataset of hybrid
                  IoT/OT honeypots},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {742--755},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564645},
  doi          = {10.1145/3564625.3564645},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SrinivasaPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SrivastavaNHBP22,
  author       = {Prashast Srivastava and
                  Stefan Nagy and
                  Matthew Hicks and
                  Antonio Bianchi and
                  Mathias Payer},
  title        = {One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored
                  Program State Restriction},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {388--399},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564643},
  doi          = {10.1145/3564625.3564643},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SrivastavaNHBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SultanaZZZMCCZS22,
  author       = {Nik Sultana and
                  Henry Zhu and
                  Ke Zhong and
                  Zhilei Zheng and
                  Ruijie Mao and
                  Digvijaysinh Chauhan and
                  Stephen Carrasquillo and
                  Junyong Zhao and
                  Lei Shi and
                  Nikos Vasilakis and
                  Boon Thau Loo},
  title        = {Towards Practical Application-level Support for Privilege Separation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {71--87},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564664},
  doi          = {10.1145/3564625.3564664},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SultanaZZZMCCZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ThapaJACPN22,
  author       = {Chandra Thapa and
                  Seung Ick Jang and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Josef Pieprzyk and
                  Surya Nepal},
  title        = {Transformer-Based Language Models for Software Vulnerability Detection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {481--496},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567985},
  doi          = {10.1145/3564625.3567985},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ThapaJACPN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ToffaliniP0C22,
  author       = {Flavio Toffalini and
                  Mathias Payer and
                  Jianying Zhou and
                  Lorenzo Cavallaro},
  title        = {Designing a Provenance Analysis for {SGX} Enclaves},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {102--116},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567994},
  doi          = {10.1145/3564625.3567994},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ToffaliniP0C22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Wang22,
  author       = {Xian Wang},
  title        = {ENIDrift: {A} Fast and Adaptive Ensemble System for Network Intrusion
                  Detection under Real-world Drift},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {785--798},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567992},
  doi          = {10.1145/3564625.3567992},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Wang22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangHXG22,
  author       = {Yizhuo Wang and
                  Yikun Hu and
                  Xuangan Xiao and
                  Dawu Gu},
  title        = {iService: Detecting and Evaluating the Impact of Confused Deputy Problem
                  in AppleOS},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {964--977},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3568001},
  doi          = {10.1145/3564625.3568001},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangHXG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangLHWYC22,
  author       = {Xutong Wang and
                  Chaoge Liu and
                  Xiaohui Hu and
                  Zhi Wang and
                  Jie Yin and
                  Xiang Cui},
  title        = {Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset
                  Against Backdoor Poisoning Attacks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {267--278},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564661},
  doi          = {10.1145/3564625.3564661},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangLHWYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangYLMHX0Y22,
  author       = {Xiaolei Wang and
                  Lin Yang and
                  Dongyang Li and
                  Linru Ma and
                  Yongzhong He and
                  Junchao Xiao and
                  Jiyuan Liu and
                  Yuexiang Yang},
  title        = {{MADDC:} Multi-Scale Anomaly Detection, Diagnosis and Correction for
                  Discrete Event Logs},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {769--784},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567972},
  doi          = {10.1145/3564625.3567972},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangYLMHX0Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Wu0C22,
  author       = {Bingkun Wu and
                  Weizhi Meng and
                  Wei{-}Yang Chiu},
  title        = {Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer
                  Interface},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {799--812},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564656},
  doi          = {10.1145/3564625.3564656},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Wu0C22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WuMCFLA22,
  author       = {Xiaoyuan Wu and
                  Collins W. Munyendo and
                  Eddie Cosic and
                  Genevieve A. Flynn and
                  Olivia Legault and
                  Adam J. Aviv},
  title        = {User Perceptions of Five-Word Passwords},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {605--618},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567981},
  doi          = {10.1145/3564625.3567981},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WuMCFLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuWKLP22,
  author       = {Jing Xu and
                  Rui Wang and
                  Stefanos Koffas and
                  Kaitai Liang and
                  Stjepan Picek},
  title        = {More is Better (Mostly): On the Backdoor Attacks in Federated Graph
                  Neural Networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {684--698},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567999},
  doi          = {10.1145/3564625.3567999},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XuWKLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuWRWV22,
  author       = {Nuo Xu and
                  Binghui Wang and
                  Ran Ran and
                  Wujie Wen and
                  Parv Venkitasubramaniam},
  title        = {NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference
                  Attacks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {669--683},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567986},
  doi          = {10.1145/3564625.3567986},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuWRWV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanWJYSW22,
  author       = {Jia Yan and
                  Ming Wan and
                  Xiangkun Jia and
                  Lingyun Ying and
                  Purui Su and
                  Zhanyi Wang},
  title        = {DitDetector: Bimodal Learning based on Deceptive Image and Text for
                  Macro Malware Detection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {227--239},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567982},
  doi          = {10.1145/3564625.3567982},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YanWJYSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangSXLWZQY022,
  author       = {Yutian Yang and
                  Wenbo Shen and
                  Xun Xie and
                  Kangjie Lu and
                  Mingsen Wang and
                  Tianyu Zhou and
                  Chenggang Qin and
                  Wang Yu and
                  Kui Ren},
  title        = {Making Memory Account Accountable: Analyzing and Detecting Memory
                  Missing-account bugs for Container Platforms},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {869--880},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564634},
  doi          = {10.1145/3564625.3564634},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangSXLWZQY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZangrandiEBSAC22,
  author       = {Luca Morgese Zangrandi and
                  Thijs van Ede and
                  Tim M. Booij and
                  Savio Sciancalepore and
                  Luca Allodi and
                  Andrea Continella},
  title        = {Stepping out of the {MUD:} Contextual threat information for IoT devices
                  with manufacturer-provided behavior profiles},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {467--480},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564644},
  doi          = {10.1145/3564625.3564644},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZangrandiEBSAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Zhang0T00CZ22,
  author       = {Qifan Zhang and
                  Junjie Shen and
                  Mingtian Tan and
                  Zhe Zhou and
                  Zhou Li and
                  Qi Alfred Chen and
                  Haipeng Zhang},
  title        = {Play the Imitation Game: Model Extraction Attack against Autonomous
                  Driving Localization},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {56--70},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567977},
  doi          = {10.1145/3564625.3567977},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Zhang0T00CZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangYYZ022,
  author       = {Zhechang Zhang and
                  Bin Yuan and
                  Kehan Yang and
                  Deqing Zou and
                  Hai Jin},
  title        = {StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy
                  Guidance},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {756--768},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564650},
  doi          = {10.1145/3564625.3564650},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangYYZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaoWZCY22,
  author       = {Yiru Zhao and
                  Xiaoke Wang and
                  Lei Zhao and
                  Yueqiang Cheng and
                  Heng Yin},
  title        = {Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided
                  Fuzzing},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {534--547},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564660},
  doi          = {10.1145/3564625.3564660},
  timestamp    = {Wed, 31 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhaoWZCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhdanovaUHZHH22,
  author       = {Maria Zhdanova and
                  Julian Urbansky and
                  Anne Hagemeier and
                  Daniel Zelle and
                  Isabelle Herrmann and
                  Dorian H{\"{o}}ffner},
  title        = {Local Power Grids at Risk - An Experimental and Simulation-based Analysis
                  of Attacks on Vehicle-To-Grid Communication},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {42--55},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3568136},
  doi          = {10.1145/3564625.3568136},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhdanovaUHZHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhengHSXZ22,
  author       = {Jieyu Zheng and
                  Feng He and
                  Shiyu Shen and
                  Chenxi Xue and
                  Yunlei Zhao},
  title        = {Parallel Small Polynomial Multiplication for Dilithium: {A} Faster
                  Design and Implementation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {304--317},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564629},
  doi          = {10.1145/3564625.3564629},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhengHSXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2022,
  title        = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625},
  doi          = {10.1145/3564625},
  isbn         = {978-1-4503-9759-9},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0001JNLD021,
  author       = {Zheng Yang and
                  Chenglu Jin and
                  Jianting Ning and
                  Zengpeng Li and
                  Anh Dinh and
                  Jianying Zhou},
  title        = {Group Time-based One-time Passwords and its Application to Efficient
                  Privacy-Preserving Proof of Location},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {497--512},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488009},
  doi          = {10.1145/3485832.3488009},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/0001JNLD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AbidiKS21,
  author       = {Ismi Abidi and
                  Vireshwar Kumar and
                  Rijurekha Sen},
  title        = {Practical Attestation for Edge Devices Running Compute Heavy Machine
                  Learning Applications},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {323--336},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485909},
  doi          = {10.1145/3485832.3485909},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AbidiKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AmichE21,
  author       = {Abderrahmen Amich and
                  Birhanu Eshete},
  title        = {Morphence: Moving Target Defense Against Adversarial Examples},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {61--75},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485899},
  doi          = {10.1145/3485832.3485899},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AmichE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AndalibiDKLC21,
  author       = {Vafa Andalibi and
                  Jayati Dev and
                  DongInn Kim and
                  Eliot Lear and
                  L. Jean Camp},
  title        = {Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer
                  in Enabling Ease of Deployment for Manufacturer Usage Description
                  {(MUD)}},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {337--348},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485879},
  doi          = {10.1145/3485832.3485879},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AndalibiDKLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BanescuVGAP21,
  author       = {Sebastian Banescu and
                  Samuel Valenzuela and
                  Marius Guggenmos and
                  Mohsen Ahmadvand and
                  Alexander Pretschner},
  title        = {Dynamic Taint Analysis versus Obfuscated Self-Checking},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {182--193},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485926},
  doi          = {10.1145/3485832.3485926},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BanescuVGAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BehniaY21,
  author       = {Rouzbeh Behnia and
                  Attila Altay Yavuz},
  title        = {Towards Practical Post-quantum Signatures for Resource-Limited Internet
                  of Things},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {119--130},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488023},
  doi          = {10.1145/3485832.3488023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BehniaY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BitsikasP21,
  author       = {Evangelos Bitsikas and
                  Christina P{\"{o}}pper},
  title        = {Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular
                  Telecommunications},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {900--915},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485914},
  doi          = {10.1145/3485832.3485914},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BitsikasP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chen0C0MSW021,
  author       = {Xiaoyi Chen and
                  Ahmed Salem and
                  Dingfan Chen and
                  Michael Backes and
                  Shiqing Ma and
                  Qingni Shen and
                  Zhonghai Wu and
                  Yang Zhang},
  title        = {BadNL: Backdoor Attacks against {NLP} Models with Semantic-preserving
                  Improvements},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {554--569},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485837},
  doi          = {10.1145/3485832.3485837},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Chen0C0MSW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChowLZJ21,
  author       = {Sherman S. M. Chow and
                  Ming Li and
                  Yongjun Zhao and
                  Wenqiang Jin},
  title        = {Sipster: Settling {IOU} Privately and Quickly with Smart Meters},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {219--234},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488029},
  doi          = {10.1145/3485832.3488029},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChowLZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Cronin0WC21,
  author       = {Patrick Cronin and
                  Xing Gao and
                  Haining Wang and
                  Chase Cotton},
  title        = {An Exploration of {ARM} System-Level Cache and {GPU} Side Channels},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {784--795},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485902},
  doi          = {10.1145/3485832.3485902},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Cronin0WC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DaiS21,
  author       = {Tianxiang Dai and
                  Haya Schulmann},
  title        = {SMap: Internet-wide Scanning for Spoofing},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {1039--1050},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485917},
  doi          = {10.1145/3485832.3485917},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DaiS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DelshadtehraniC21,
  author       = {Leila Delshadtehrani and
                  Sadullah Canakci and
                  William Blair and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {FlexFilt: Towards Flexible Instruction Filtering for Security},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {646--659},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488019},
  doi          = {10.1145/3485832.3488019},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DelshadtehraniC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DemiccoEP21,
  author       = {David Demicco and
                  Rukayat Erinfolami and
                  Aravind Prakash},
  title        = {Program Obfuscation via {ABI} Debiasing},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {146--157},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488017},
  doi          = {10.1145/3485832.3488017},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DemiccoEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EloulMM21,
  author       = {Shaltiel Eloul and
                  Sean J. Moran and
                  Jacob Mendel},
  title        = {Improving Streaming Cryptocurrency Transaction Classification via
                  Biased Sampling and Graph Feedback},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {761--772},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485913},
  doi          = {10.1145/3485832.3485913},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EloulMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FangSGLPCZLZS21,
  author       = {Dongliang Fang and
                  Zhanwei Song and
                  Le Guan and
                  Puzhuo Liu and
                  Anni Peng and
                  Kai Cheng and
                  Yaowen Zheng and
                  Peng Liu and
                  Hongsong Zhu and
                  Limin Sun},
  title        = {ICS3Fuzzer: {A} Framework for Discovering Protocol Implementation
                  Bugs in {ICS} Supervisory Software by Fuzzing},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {849--860},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488028},
  doi          = {10.1145/3485832.3488028},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FangSGLPCZLZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoDC21,
  author       = {Mingyuan Gao and
                  Hung Dang and
                  Ee{-}Chien Chang},
  title        = {{TEEKAP:} Self-Expiring Data Capsule using Trusted Execution Environment},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {235--247},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485919},
  doi          = {10.1145/3485832.3485919},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GazdagGGHL21,
  author       = {Stefan{-}Lukas Gazdag and
                  Sophia Grundner{-}Culemann and
                  Tobias Guggemos and
                  Tobias Heider and
                  Daniel Loebenberger},
  title        = {A formal analysis of IKEv2's post-quantum extension},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {91--105},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485885},
  doi          = {10.1145/3485832.3485885},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GazdagGGHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GhorbaniMZPNC21,
  author       = {Mohammad Mahdi Ghorbani and
                  Fereydoun Farrahi Moghaddam and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Kim Khoa Nguyen and
                  Mohamed Cheriet},
  title        = {DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based
                  Environment},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {837--848},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485907},
  doi          = {10.1145/3485832.3485907},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GhorbaniMZPNC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuanXGLCL21,
  author       = {Zhong Guan and
                  Gang Xiong and
                  Gaopeng Gou and
                  Zhen Li and
                  Mingxin Cui and
                  Chang Liu},
  title        = {{BAPM:} Block Attention Profiling Model for Multi-tab Website Fingerprinting
                  Attacks on Tor},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {248--259},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485891},
  doi          = {10.1145/3485832.3485891},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuanXGLCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HanRT21,
  author       = {Yufei Han and
                  Kevin Alejandro Roundy and
                  Acar Tamersoy},
  title        = {Towards Stalkerware Detection with Precise Warnings},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {957--969},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485901},
  doi          = {10.1145/3485832.3485901},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HanRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HaoLXC021,
  author       = {Meng Hao and
                  Hongwei Li and
                  Guowen Xu and
                  Hanxiao Chen and
                  Tianwei Zhang},
  title        = {Efficient, Private and Robust Federated Learning},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {45--60},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488014},
  doi          = {10.1145/3485832.3488014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HaoLXC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HetzeltRBMS21,
  author       = {Felicitas Hetzelt and
                  Martin Radev and
                  Robert Buhren and
                  Mathias Morbitzer and
                  Jean{-}Pierre Seifert},
  title        = {{VIA:} Analyzing Device Interfaces of Protected Virtual Machines},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {273--284},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488011},
  doi          = {10.1145/3485832.3488011},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HetzeltRBMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HongWL21,
  author       = {Hyunji Hong and
                  Seunghoon Woo and
                  Heejo Lee},
  title        = {Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts
                  by Leveraging User Discussions},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {194--206},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488026},
  doi          = {10.1145/3485832.3488026},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HongWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Hu021,
  author       = {Hailong Hu and
                  Jun Pang},
  title        = {Stealing Machine Learning Models: Attacks and Countermeasures for
                  Generative Adversarial Networks},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485838},
  doi          = {10.1145/3485832.3485838},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Hu021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuaOJFP21,
  author       = {Baojian Hua and
                  Wanrong Ouyang and
                  Chengman Jiang and
                  Qiliang Fan and
                  Zhizhong Pan},
  title        = {Rupair: Towards Automatic Buffer Overflow Detection and Rectification
                  for Rust},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {812--823},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485841},
  doi          = {10.1145/3485832.3485841},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuaOJFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KaneiHSA21,
  author       = {Fumihiro Kanei and
                  Ayako Akiyama Hasegawa and
                  Eitaro Shioji and
                  Mitsuaki Akiyama},
  title        = {A Cross-role and Bi-national Analysis on Security Efforts and Constraints
                  of Software Development Projects},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {349--364},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485922},
  doi          = {10.1145/3485832.3485922},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KaneiHSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KangKLK21,
  author       = {Honggoo Kang and
                  Yonghwi Kwon and
                  Sangjin Lee and
                  Hyungjoon Koo},
  title        = {SoftMark: Software Watermarking via a Binary Function Relocation},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {169--181},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488027},
  doi          = {10.1145/3485832.3488027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KangKLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KhanWYD021,
  author       = {Sojhal Ismail Khan and
                  Dominika C. Woszczyk and
                  Chengzeng You and
                  Soteris Demetriou and
                  Muhammad Naveed},
  title        = {Characterizing Improper Input Validation Vulnerabilities of Mobile
                  Crowdsourcing Services},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {944--956},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485888},
  doi          = {10.1145/3485832.3485888},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KhanWYD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KianiALLL21,
  author       = {Sohaib Kiani and
                  Sana Awan and
                  Chao Lan and
                  Fengjun Li and
                  Bo Luo},
  title        = {Two Souls in an Adversarial Image: Towards Universal Adversarial Example
                  Detection using Multi-view Inconsistency},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {31--44},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485904},
  doi          = {10.1145/3485832.3485904},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KianiALLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimK21,
  author       = {Beom Heyn Kim and
                  Hyoungshick Kim},
  title        = {Rocky: Replicating Block Devices for Tamper and Failure Resistant
                  Edge-based Virtualized Desktop Infrastructure},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {285--296},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485886},
  doi          = {10.1145/3485832.3485886},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KimK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiourtiLRSJ21,
  author       = {Panagiota Kiourti and
                  Wenchao Li and
                  Anirban Roy and
                  Karan Sikka and
                  Susmit Jha},
  title        = {{MISA:} Online Defense of Trojaned Models using Misattributions},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {570--585},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485908},
  doi          = {10.1145/3485832.3485908},
  timestamp    = {Mon, 05 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KiourtiLRSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KohlerLB0M21,
  author       = {Sebastian K{\"{o}}hler and
                  Giulio Lovisotto and
                  Simon Birnbach and
                  Richard Baker and
                  Ivan Martinovic},
  title        = {They See Me Rollin': Inherent Vulnerability of the Rolling Shutter
                  in {CMOS} Image Sensors},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {399--413},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488016},
  doi          = {10.1145/3485832.3488016},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KohlerLB0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KooPK21,
  author       = {Hyungjoon Koo and
                  Soyeon Park and
                  Taesoo Kim},
  title        = {A Look Back on a Function Identification Problem},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {158--168},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488018},
  doi          = {10.1145/3485832.3488018},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KooPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KuhnapfelPNSRW21,
  author       = {Niclas K{\"{u}}hnapfel and
                  Stefan Preu{\ss}ler and
                  Maximilian Noppel and
                  Thomas Schneider and
                  Konrad Rieck and
                  Christian Wressnegger},
  title        = {LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped
                  Systems},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {796--811},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485911},
  doi          = {10.1145/3485832.3485911},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KuhnapfelPNSRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeELPQJZB21,
  author       = {Tuan Le and
                  Sriharsha Etigowni and
                  Sizhuang Liang and
                  Xirui Peng and
                  H. Jerry Qi and
                  Mehdi Javanmard and
                  Saman A. Zonouz and
                  Raheem Beyah},
  title        = {Physical Logic Bombs in 3D Printers via Emerging 4D Techniques},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {732--747},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485880},
  doi          = {10.1145/3485832.3485880},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LeELPQJZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeuKRC21,
  author       = {Patrick Leu and
                  Martin Kotuliak and
                  Marc Roeschlin and
                  Srdjan Capkun},
  title        = {Security of Multicarrier Time-of-Flight Ranging},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {887--899},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485898},
  doi          = {10.1145/3485832.3485898},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeuKRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiQCLX21,
  author       = {Deqiang Li and
                  Tian Qiu and
                  Shuo Chen and
                  Qianmu Li and
                  Shouhuai Xu},
  title        = {Can We Leverage Predictive Uncertainty to Detect Dataset Shift and
                  Adversarial Examples in Android Malware Detection?},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {596--608},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485916},
  doi          = {10.1145/3485832.3485916},
  timestamp    = {Sat, 30 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiQCLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiZG021,
  author       = {Zecheng Li and
                  Yu Zhou and
                  Songtao Guo and
                  Bin Xiao},
  title        = {SolSaviour: {A} Defending Framework for Deployed Defective Smart Contracts},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {748--760},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488015},
  doi          = {10.1145/3485832.3488015},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiZG021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiZWLC21,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Huibo Wang and
                  Kang Li and
                  Yueqiang Cheng},
  title        = {{TLB} Poisoning Attacks on {AMD} Secure Encrypted Virtualization},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {609--619},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485876},
  doi          = {10.1145/3485832.3485876},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiZWLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Liu0LLDS21,
  author       = {Mingxuan Liu and
                  Yiming Zhang and
                  Baojun Liu and
                  Zhou Li and
                  Haixin Duan and
                  Donghong Sun},
  title        = {Detecting and Characterizing {SMS} Spearphishing Attacks},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {930--943},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488012},
  doi          = {10.1145/3485832.3488012},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Liu0LLDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuDH21,
  author       = {Duo Lu and
                  Yuli Deng and
                  Dijiang Huang},
  title        = {Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting
                  Passcode for User Authentication},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {468--481},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485906},
  doi          = {10.1145/3485832.3485906},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuFX21,
  author       = {Xiaofeng Lu and
                  Zhenhan Feng and
                  Jupeng Xia},
  title        = {An Efficient Man-Machine Recognition Method Based On Mouse Trajectory
                  Feature De-redundancy},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {365--374},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485895},
  doi          = {10.1145/3485832.3485895},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuFX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Luo0YZW21,
  author       = {Lannan Luo and
                  Qiang Zeng and
                  Bokai Yang and
                  Fei Zuo and
                  Junzhe Wang},
  title        = {Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart
                  Apps on IoT Cloud Platforms},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {982--995},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488022},
  doi          = {10.1145/3485832.3488022},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Luo0YZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaHL21,
  author       = {Huanyu Ma and
                  Shuai Han and
                  Hao Lei},
  title        = {Optimized Paillier's Cryptosystem with Fast Encryption and Decryption},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {106--118},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485842},
  doi          = {10.1145/3485832.3485842},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MaHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MarsonAAMK21,
  author       = {Giorgia Azzurra Marson and
                  S{\'{e}}bastien Andreina and
                  Lorenzo Alluminio and
                  Konstantin Munichev and
                  Ghassan Karame},
  title        = {Mitosis: Practically Scaling Permissioned Blockchains},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {773--783},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485915},
  doi          = {10.1145/3485832.3485915},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MarsonAAMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MoukarzelH21,
  author       = {Michael Moukarzel and
                  Matthew Hicks},
  title        = {RingRAM: {A} Unified Hardware SecurityPrimitive for IoT Devices that
                  Gets Better with Age},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {660--674},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485905},
  doi          = {10.1145/3485832.3485905},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MoukarzelH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Munch0Y21,
  author       = {Jean{-}Pierre M{\"{u}}nch and
                  Thomas Schneider and
                  Hossein Yalame},
  title        = {{VASA:} Vector {AES} Instructions for Security Applications},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {131--145},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485897},
  doi          = {10.1145/3485832.3485897},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Munch0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NezhadH21,
  author       = {Mahshid Mehr Nezhad and
                  Feng Hao},
  title        = {OPay: an Orientation-based Contactless Payment Solution Against Passive
                  Attacks},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {375--384},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485887},
  doi          = {10.1145/3485832.3485887},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NezhadH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OeschGR21,
  author       = {Sean Oesch and
                  Anuj Gautam and
                  Scott Ruoti},
  title        = {The Emperor's New Autofill Framework: {A} Security Analysis of Autofill
                  on iOS and Android},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {996--1010},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485884},
  doi          = {10.1145/3485832.3485884},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/OeschGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PanZYY21,
  author       = {Xudong Pan and
                  Mi Zhang and
                  Yifan Yan and
                  Min Yang},
  title        = {Understanding the Threats of Trojaned Quantized Neural Network in
                  Model Supply Chains},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {634--645},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485881},
  doi          = {10.1145/3485832.3485881},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PanZYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkJ021,
  author       = {Namgyu Park and
                  Sangwoo Ji and
                  Jong Kim},
  title        = {Detecting Audio Adversarial Examples with Logit Noising},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {586--595},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485912},
  doi          = {10.1145/3485832.3485912},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkJ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkNNCS21,
  author       = {Taejune Park and
                  Jaehyun Nam and
                  Seung Ho Na and
                  Jaewoong Chung and
                  Seungwon Shin},
  title        = {Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular
                  Expression Matching in {DPI}},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {620--633},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485878},
  doi          = {10.1145/3485832.3485878},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkNNCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PeseSLS21,
  author       = {Mert D. Pes{\'{e}} and
                  Jay W. Schauer and
                  Junhui Li and
                  Kang G. Shin},
  title        = {{S2-CAN:} Sufficiently Secure Controller Area Network},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {425--438},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485883},
  doi          = {10.1145/3485832.3485883},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PeseSLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Pham0MH21,
  author       = {Duy{-}Phuc Pham and
                  Damien Marion and
                  Matthieu Mastio and
                  Annelie Heuser},
  title        = {Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated
                  Malware Classification},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {706--719},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485894},
  doi          = {10.1145/3485832.3485894},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Pham0MH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PhamHTCT21,
  author       = {Thai{-}Dien Pham and
                  Thien{-}Lac Ho and
                  Tram Truong Huu and
                  Tien{-}Dung Cao and
                  Hong Linh Truong},
  title        = {MAppGraph: Mobile-App Classification on Encrypted Network Traffic
                  using Deep Graph Convolution Neural Networks},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {1025--1038},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485925},
  doi          = {10.1145/3485832.3485925},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PhamHTCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RazaGLA21,
  author       = {Muhammad Taqi Raza and
                  Yunqi Guo and
                  Songwu Lu and
                  Fatima Muhammad Anwar},
  title        = {On Key Reinstallation Attacks over 4G {LTE} Control-Plane: Feasibility
                  and Negative Impact},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {877--886},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485833},
  doi          = {10.1145/3485832.3485833},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RazaGLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RezaeiH21,
  author       = {Fatemeh Rezaei and
                  Amir Houmansadr},
  title        = {{FINN:} Fingerprinting Network Flows using Neural Networks},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {1011--1024},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488010},
  doi          = {10.1145/3485832.3488010},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RezaeiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RiveraMSOB21,
  author       = {Elijah Rivera and
                  Samuel Mergendahl and
                  Howard E. Shrobe and
                  Hamed Okhravi and
                  Nathan Burow},
  title        = {Keeping Safe Rust Safe with Galeed},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {824--836},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485903},
  doi          = {10.1145/3485832.3485903},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RiveraMSOB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RocklPHMF21,
  author       = {Jonas R{\"{o}}ckl and
                  Mykolai Protsenko and
                  Monika Huber and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Advanced System Resiliency Based on Virtualization Techniques for
                  IoT Devices},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {455--467},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485836},
  doi          = {10.1145/3485832.3485836},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RocklPHMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RuggiaLVCM21,
  author       = {Antonio Ruggia and
                  Eleonora Losiouk and
                  Luca Verderame and
                  Mauro Conti and
                  Alessio Merlo},
  title        = {Repack Me If You Can: An Anti-Repackaging Solution Based on Android
                  Virtualization},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {970--981},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488021},
  doi          = {10.1145/3485832.3488021},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RuggiaLVCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SajidWAAIDK21,
  author       = {Md Sajidul Islam Sajid and
                  Jinpeng Wei and
                  Basel Abdeen and
                  Ehab Al{-}Shaer and
                  Md. Mazharul Islam and
                  Walter Diong and
                  Latifur Khan},
  title        = {{SODA:} {A} System for Cyber Deception Orchestration and Automation},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {675--689},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485918},
  doi          = {10.1145/3485832.3485918},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SajidWAAIDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SaniYBD21,
  author       = {Abubakar Sadiq Sani and
                  Dong Yuan and
                  Elisa Bertino and
                  Zhao Yang Dong},
  title        = {Crypto-Chain: {A} Relay Resilience Framework for Smart Vehicles},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {439--454},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485920},
  doi          = {10.1145/3485832.3485920},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SaniYBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianA21,
  author       = {Maliheh Shirvanian and
                  Shashank Agrawal},
  title        = {2D-2FA: {A} New Dimension in Two-Factor Authentication},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {482--496},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485910},
  doi          = {10.1145/3485832.3485910},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SimmonsDOR21,
  author       = {James Simmons and
                  Oumar Diallo and
                  Sean Oesch and
                  Scott Ruoti},
  title        = {Systematization of Password ManagerUse Cases and Design Paradigms},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {528--540},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485889},
  doi          = {10.1145/3485832.3485889},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SimmonsDOR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SivakumaranB21,
  author       = {Pallavi Sivakumaran and
                  Jorge Blasco},
  title        = {argXtract: Deriving IoT Security Configurations via Automated Static
                  Analysis of Stripped {ARM} Cortex-M Binaries},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {861--876},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488007},
  doi          = {10.1145/3485832.3488007},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SivakumaranB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SongC00021,
  author       = {Qiyang Song and
                  Jiahao Cao and
                  Kun Sun and
                  Qi Li and
                  Ke Xu},
  title        = {Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based
                  Machine Learning Data Marketplace},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {260--272},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485921},
  doi          = {10.1145/3485832.3485921},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SongC00021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StojkovskiLKR21,
  author       = {Borce Stojkovski and
                  Gabriele Lenzini and
                  Vincent Koenig and
                  Salvador Rivas},
  title        = {What's in a Cyber Threat Intelligence sharing platform?: {A} mixed-methods
                  user experience investigation of {MISP}},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {385--398},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488030},
  doi          = {10.1145/3485832.3488030},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StojkovskiLKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Tan0021,
  author       = {Mingtian Tan and
                  Zhe Zhou and
                  Zhou Li},
  title        = {The Many-faced God: Attacking Face Verification System with Embedding
                  and Image Recovery},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {17--30},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485840},
  doi          = {10.1145/3485832.3485840},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Tan0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TedeschiSP21,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{ARID:} Anonymous Remote IDentification of Unmanned Aerial Vehicles},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485834},
  doi          = {10.1145/3485832.3485834},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TedeschiSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UetzHHSH21,
  author       = {Rafael Uetz and
                  Christian Hemminghaus and
                  Louis Hackl{\"{a}}nder and
                  Philipp Schlipper and
                  Martin Henze},
  title        = {Reproducible and Adaptable Log Data Generation for Sound Cybersecurity
                  Experiments},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {690--705},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488020},
  doi          = {10.1145/3485832.3488020},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UetzHHSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WalkerS21,
  author       = {Payton Walker and
                  Nitesh Saxena},
  title        = {Evaluating the Effectiveness of Protection Jamming Devices in Mitigating
                  Smart Speaker Eavesdropping Attacks Using Gaussian White Noise},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {414--424},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485896},
  doi          = {10.1145/3485832.3485896},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WalkerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiZGDFWLW21,
  author       = {Rong Wei and
                  Fangyu Zheng and
                  Lili Gao and
                  Jiankuo Dong and
                  Guang Fan and
                  Lipeng Wan and
                  Jingqiang Lin and
                  Yuewu Wang},
  title        = {Heterogeneous-PAKE: Bridging the Gap between {PAKE} Protocols and
                  Their Real-World Deployment},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {76--90},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485877},
  doi          = {10.1145/3485832.3485877},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiZGDFWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WuLNL21,
  author       = {Yi Wu and
                  Zhuohang Li and
                  Nicholas Van Nostrand and
                  Jian Liu},
  title        = {Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability
                  Analysis of Qi Wireless Charging},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {916--929},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485839},
  doi          = {10.1145/3485832.3485839},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WuLNL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangWLYLGLLLH21,
  author       = {Zijie Yang and
                  Binghui Wang and
                  Haoran Li and
                  Dong Yuan and
                  Zhuotao Liu and
                  Neil Zhenqiang Gong and
                  Chang Liu and
                  Qi Li and
                  Xiao Liang and
                  Shaofeng Hu},
  title        = {On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric
                  Mobile Social Networks},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {297--310},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488013},
  doi          = {10.1145/3485832.3488013},
  timestamp    = {Sun, 27 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YangWLYLGLLLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangL0ZTKM21,
  author       = {Yumei Zhang and
                  Xinzhi Liu and
                  Cong Sun and
                  Dongrui Zeng and
                  Gang Tan and
                  Xiao Kan and
                  Siqi Ma},
  title        = {ReCFA: Resilient Control-Flow Attestation},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {311--322},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485900},
  doi          = {10.1145/3485832.3485900},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangL0ZTKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangWRZXH21,
  author       = {Haodong Zhang and
                  Chuanwang Wang and
                  Wenqiang Ruan and
                  Junjie Zhang and
                  Ming Xu and
                  Weili Han},
  title        = {Digit Semantics based Optimization for Practical Password Cracking
                  Tools},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {513--527},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488025},
  doi          = {10.1145/3485832.3488025},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangWRZXH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangWYCMZWLW21,
  author       = {Shize Zhang and
                  Zhiliang Wang and
                  Jiahai Yang and
                  Xin Cheng and
                  Xiaoqian Ma and
                  Hui Zhang and
                  Bo Wang and
                  Zimu Li and
                  Jianping Wu},
  title        = {MineHunter: {A} Practical Cryptomining Traffic Detection Algorithm
                  Based on Time Series Tracking},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {1051--1063},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485835},
  doi          = {10.1145/3485832.3485835},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangWYCMZWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangYF21,
  author       = {Zhaohe John Zhang and
                  Edwin Yang and
                  Song Fang},
  title        = {CommanderGabble: {A} Universal Attack Against {ASR} Systems Leveraging
                  Fast Speech},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {720--731},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485892},
  doi          = {10.1145/3485832.3485892},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangYT21,
  author       = {Yihe Zhang and
                  Xu Yuan and
                  Nian{-}Feng Tzeng},
  title        = {Platform-Oblivious Anti-Spam Gateway},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {1064--1077},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488024},
  doi          = {10.1145/3485832.3488024},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangYT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhuWCLMIQCKSHLZ21,
  author       = {Shitong Zhu and
                  Zhongjie Wang and
                  Xun Chen and
                  Shasha Li and
                  Keyu Man and
                  Umar Iqbal and
                  Zhiyun Qian and
                  Kevin S. Chan and
                  Srikanth V. Krishnamurthy and
                  Zubair Shafiq and
                  Yu Hao and
                  Guoren Li and
                  Zheng Zhang and
                  Xiaochen Zou},
  title        = {Eluding ML-based Adblockers With Actionable Adversarial Examples},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {541--553},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488008},
  doi          = {10.1145/3485832.3488008},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhuWCLMIQCKSHLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2021,
  title        = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832},
  doi          = {10.1145/3485832},
  isbn         = {978-1-4503-8579-4},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0001SMZGAKP20,
  author       = {Raymond Cheng and
                  William Scott and
                  Elisaweta Masserova and
                  Irene Zhang and
                  Vipul Goyal and
                  Thomas E. Anderson and
                  Arvind Krishnamurthy and
                  Bryan Parno},
  title        = {Talek: Private Group Messaging with Hidden Access Patterns},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {84--99},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427231},
  doi          = {10.1145/3427228.3427231},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/0001SMZGAKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/0023LLWXL20,
  author       = {Tao Liu and
                  Zihao Liu and
                  Qi Liu and
                  Wujie Wen and
                  Wenyao Xu and
                  Ming Li},
  title        = {StegoNet: Turn Deep Neural Network into a Stegomalware},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {928--938},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427268},
  doi          = {10.1145/3427228.3427268},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/0023LLWXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlderBOP20,
  author       = {Fritz Alder and
                  Jo Van Bulck and
                  David F. Oswald and
                  Frank Piessens},
  title        = {Faulty Point Unit: {ABI} Poisoning Attacks on Intel {SGX}},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {415--427},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427270},
  doi          = {10.1145/3427228.3427270},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AlderBOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Ali-GombeTGR20,
  author       = {Aisha I. Ali{-}Gombe and
                  Alexandra Tambaoan and
                  Angela Gurfolino and
                  Golden G. Richard III},
  title        = {App-Agnostic Post-Execution Semantic Analysis of Android In-Memory
                  Forensics Artifacts},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {28--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427244},
  doi          = {10.1145/3427228.3427244},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Ali-GombeTGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AliEDMY20,
  author       = {Suzan Ali and
                  Mounir Elgharabawy and
                  Quentin Duchaussoy and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control
                  Solutions},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {69--83},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427287},
  doi          = {10.1145/3427228.3427287},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AliEDMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AmmarC20,
  author       = {Mahmoud Ammar and
                  Bruno Crispo},
  title        = {Verify{\&}Revive: Secure Detection and Recovery of Compromised
                  Low-end Embedded Devices},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {717--732},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427253},
  doi          = {10.1145/3427228.3427253},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AmmarC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AndriamilantoAG20,
  author       = {Nampoina Andriamilanto and
                  Tristan Allard and
                  Ga{\"{e}}tan Le Guelvouit},
  title        = {FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary
                  Attacks against Web Authentication Mechanisms},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {627--642},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427297},
  doi          = {10.1145/3427228.3427297},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AndriamilantoAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BauerB20,
  author       = {Luke A. Bauer and
                  Vincent Bindschaedler},
  title        = {Towards Realistic Membership Inferences: The Case of Survey Data},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {116--128},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427282},
  doi          = {10.1145/3427228.3427282},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BauerB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BelyavskyBCRU20,
  author       = {Dmitry Belyavsky and
                  Billy Bob Brumley and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Luis Rivera{-}Zamarripa and
                  Igor Ustinov},
  title        = {Set It and Forget It! Turnkey {ECC} for Instant Integration},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {760--771},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427291},
  doi          = {10.1145/3427228.3427291},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BelyavskyBCRU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BragaFS20,
  author       = {Daniel De Almeida Braga and
                  Pierre{-}Alain Fouque and
                  Mohamed Sabt},
  title        = {Dragonblood is Still Leaking: Practical Cache-based Side-Channel in
                  the Wild},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {291--303},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427295},
  doi          = {10.1145/3427228.3427295},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BragaFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoGM020,
  author       = {Chen Cao and
                  Le Guan and
                  Jiang Ming and
                  Peng Liu},
  title        = {Device-agnostic Firmware Execution is Possible: {A} Concolic Execution
                  Approach for Peripheral Emulation},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {746--759},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427280},
  doi          = {10.1145/3427228.3427280},
  timestamp    = {Wed, 16 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoGM020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chinprutthiwong20,
  author       = {Phakpoom Chinprutthiwong and
                  Raj Vardhan and
                  Guangliang Yang and
                  Guofei Gu},
  title        = {Security Study of Service Worker Cross-Site Scripting},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {643--654},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427290},
  doi          = {10.1145/3427228.3427290},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Chinprutthiwong20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CozziVDSBB20,
  author       = {Emanuele Cozzi and
                  Pierre{-}Antoine Vervier and
                  Matteo Dell'Amico and
                  Yun Shen and
                  Leyla Bilge and
                  Davide Balzarotti},
  title        = {The Tangled Genealogy of IoT Malware},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427256},
  doi          = {10.1145/3427228.3427256},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CozziVDSBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DasJWAPM20,
  author       = {Sanjeev Das and
                  Kedrian James and
                  Jan Werner and
                  Manos Antonakakis and
                  Michalis Polychronakis and
                  Fabian Monrose},
  title        = {A Flexible Framework for Expediting Bug Finding by Leveraging Past
                  (Mis-)Behavior to Discover New Bugs},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {345--359},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427269},
  doi          = {10.1145/3427228.3427269},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DasJWAPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoanAR20,
  author       = {Bao Gia Doan and
                  Ehsan Abbasnejad and
                  Damith C. Ranasinghe},
  title        = {Februus: Input Purification Defense Against Trojan Attacks on Deep
                  Neural Network Systems},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {897--912},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427264},
  doi          = {10.1145/3427228.3427264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DoanAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DuYZDWH0020,
  author       = {Kun Du and
                  Hao Yang and
                  Yubao Zhang and
                  Haixin Duan and
                  Haining Wang and
                  Shuang Hao and
                  Zhou Li and
                  Min Yang},
  title        = {Understanding Promotion-as-a-Service on GitHub},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {597--610},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427258},
  doi          = {10.1145/3427228.3427258},
  timestamp    = {Mon, 15 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DuYZDWH0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ErbaTGPCZT20,
  author       = {Alessandro Erba and
                  Riccardo Taormina and
                  Stefano Galelli and
                  Marcello Pogliani and
                  Michele Carminati and
                  Stefano Zanero and
                  Nils Ole Tippenhauer},
  title        = {Constrained Concealment Attacks against Reconstruction-based Anomaly
                  Detectors in Industrial Control Systems},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {480--495},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427660},
  doi          = {10.1145/3427228.3427660},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ErbaTGPCZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FerrariCPZ20,
  author       = {Dario Ferrari and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  title        = {NoSQL Breakdown: {A} Large-scale Analysis of Misconfigured NoSQL Services},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {567--581},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427260},
  doi          = {10.1145/3427228.3427260},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FerrariCPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FormanA20,
  author       = {Timothy J. Forman and
                  Adam J. Aviv},
  title        = {Double Patterns: {A} Usable Solution to Increase the Security of Android
                  Unlock Patterns},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {219--233},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427252},
  doi          = {10.1145/3427228.3427252},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FormanA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GalhardoMBG20,
  author       = {Carlos Cardoso Galhardo and
                  Peter Mell and
                  Irena Bojanova and
                  Assane Gueye},
  title        = {Measurements of the Most Significant Software Security Weaknesses},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {154--164},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427257},
  doi          = {10.1145/3427228.3427257},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GalhardoMBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GreubelPK20,
  author       = {Andr{\'{e}} Greubel and
                  Steffen Pohl and
                  Samuel Kounev},
  title        = {Quantifying measurement quality and load distribution in Tor},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {129--140},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427238},
  doi          = {10.1145/3427228.3427238},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GreubelPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GulerGGJOBGH20,
  author       = {Emre G{\"{u}}ler and
                  Philipp G{\"{o}}rz and
                  Elia Geretto and
                  Andrea Jemmett and
                  Sebastian {\"{O}}sterlund and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Thorsten Holz},
  title        = {Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {360--372},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427266},
  doi          = {10.1145/3427228.3427266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GulerGGJOBGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HassanLJ0ZWCLRG20,
  author       = {Wajih Ul Hassan and
                  Ding Li and
                  Kangkook Jee and
                  Xiao Yu and
                  Kexuan Zou and
                  Dawei Wang and
                  Zhengzhang Chen and
                  Zhichun Li and
                  Junghwan Rhee and
                  Jiaping Gui and
                  Adam Bates},
  title        = {This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting
                  using Suspicion-Based Hierarchical Storage},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {165--178},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427255},
  doi          = {10.1145/3427228.3427255},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HassanLJ0ZWCLRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KaczmarczyckGIP20,
  author       = {Fabian Kaczmarczyck and
                  Bernhard Grill and
                  Luca Invernizzi and
                  Jennifer Pullman and
                  Cecilia M. Procopiuc and
                  David Tao and
                  Borbala Benko and
                  Elie Bursztein},
  title        = {Spotlight: Malware Lead Generation at Scale},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {17--27},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427273},
  doi          = {10.1145/3427228.3427273},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KaczmarczyckGIP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KhanCSA0K20,
  author       = {Hassan Khan and
                  Jason Ceci and
                  Jonah Stegman and
                  Adam J. Aviv and
                  Rozita Dara and
                  Ravi Kuber},
  title        = {Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited:
                  {A} Holistic View of {PIN} Authentication in Digital Lives and Beyond},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {249--262},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427240},
  doi          = {10.1145/3427228.3427240},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KhanCSA0K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimKKKJK20,
  author       = {Mingeun Kim and
                  Dongkwan Kim and
                  Eunsoo Kim and
                  Suryeon Kim and
                  Yeongjin Jang and
                  Yongdae Kim},
  title        = {FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic
                  Analysis},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {733--745},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427294},
  doi          = {10.1145/3427228.3427294},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KimKKKJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KuppaAL20,
  author       = {Aditya Kuppa and
                  Lamine M. Aouad and
                  Nhien{-}An Le{-}Khac},
  title        = {Effect of Security Controls on Patching Window: {A} Causal Inference
                  based Approach},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {556--566},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427271},
  doi          = {10.1145/3427228.3427271},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KuppaAL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiaoWCHD20,
  author       = {Song Liao and
                  Christin Wilson and
                  Long Cheng and
                  Hongxin Hu and
                  Huixing Deng},
  title        = {Measuring the Effectiveness of Privacy Policies for Voice Assistant
                  Applications},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {856--869},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427250},
  doi          = {10.1145/3427228.3427250},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiaoWCHD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LinTG20,
  author       = {Yuhang Lin and
                  Olufogorehan Tunde{-}Onadele and
                  Xiaohui Gu},
  title        = {{CDL:} Classified Distributed Learning for Detecting Security Attacks
                  in Containerized Applications},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427236},
  doi          = {10.1145/3427228.3427236},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LinTG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuthraCOHF20,
  author       = {Aman Luthra and
                  James Cavanaugh and
                  Hugo Renzzo Oclese and
                  Rina M. Hirsch and
                  Xiang Fu},
  title        = {ZeroAUDIT},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {798--812},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427249},
  doi          = {10.1145/3427228.3427249},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LuthraCOHF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaLYLNB20,
  author       = {Siqi Ma and
                  Hehao Li and
                  Wenbo Yang and
                  Juanru Li and
                  Surya Nepal and
                  Elisa Bertino},
  title        = {Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based
                  Android Data Clone Services},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {320--331},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427263},
  doi          = {10.1145/3427228.3427263},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MaLYLNB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MahdaviHKKLPSOK20,
  author       = {Rasoul Akhavan Mahdavi and
                  Thomas Humphries and
                  Bailey Kacsmar and
                  Simeon Krastnikov and
                  Nils Lukas and
                  John A. Premkumar and
                  Masoumeh Shafieinejad and
                  Simon Oya and
                  Florian Kerschbaum and
                  Erik{-}Oliver Blass},
  title        = {Practical Over-Threshold Multi-Party Private Set Intersection},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {772--783},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427267},
  doi          = {10.1145/3427228.3427267},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MahdaviHKKLPSOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MainardiSBP20,
  author       = {Nicholas Mainardi and
                  Davide Sampietro and
                  Alessandro Barenghi and
                  Gerardo Pelosi},
  title        = {Efficient Oblivious Substring Search via Architectural Support},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {526--541},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427296},
  doi          = {10.1145/3427228.3427296},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MainardiSBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MatsumotoBDOP20,
  author       = {Stephanos Matsumoto and
                  Jay Bosamiya and
                  Yucheng Dai and
                  Paul C. van Oorschot and
                  Bryan Parno},
  title        = {{CAPS:} Smoothly Transitioning to a More Resilient Web {PKI}},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {655--668},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427284},
  doi          = {10.1145/3427228.3427284},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MatsumotoBDOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MichaelMLGH020,
  author       = {Noor Michael and
                  Jaron Mink and
                  Jason Liu and
                  Sneha Gaur and
                  Wajih Ul Hassan and
                  Adam Bates},
  title        = {On the Forensic Validity of Approximated Audit Logs},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {189--202},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427272},
  doi          = {10.1145/3427228.3427272},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MichaelMLGH020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MitevPMES20,
  author       = {Richard Mitev and
                  Anna Pazii and
                  Markus Miettinen and
                  William Enck and
                  Ahmad{-}Reza Sadeghi},
  title        = {LeakyPick: IoT Audio Spy Detector},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {694--705},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427277},
  doi          = {10.1145/3427228.3427277},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MitevPMES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MunteanNLTG020,
  author       = {Paul Muntean and
                  Matthias Neumayer and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  title        = {{\(\rho\)}FEM: Efficient Backward-edge Protection Using Reversed Forward-edge
                  Mappings},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {466--479},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427246},
  doi          = {10.1145/3427228.3427246},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MunteanNLTG020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NguyenD0B20,
  author       = {Duc Cuong Nguyen and
                  Erik Derr and
                  Michael Backes and
                  Sven Bugiel},
  title        = {Up2Dep: Android Tool Support to Fix Insecure Code Dependencies},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {263--276},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427658},
  doi          = {10.1145/3427228.3427658},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NguyenD0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OeschADKSWR20,
  author       = {Sean Oesch and
                  Ruba Abu{-}Salma and
                  Oumar Diallo and
                  Juliane Kr{\"{a}}mer and
                  James Simmons and
                  Justin Wu and
                  Scott Ruoti},
  title        = {Understanding User Perceptions of Security and Privacy for Group Chat:
                  {A} Survey of Users in the {US} and {UK}},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {234--248},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427275},
  doi          = {10.1145/3427228.3427275},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/OeschADKSWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Patrick-EvansCK20,
  author       = {James Patrick{-}Evans and
                  Lorenzo Cavallaro and
                  Johannes Kinder},
  title        = {Probabilistic Naming of Functions in Stripped Binaries},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {373--385},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427265},
  doi          = {10.1145/3427228.3427265},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Patrick-EvansCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PennekampBLDXFB20,
  author       = {Jan Pennekamp and
                  Erik Buchholz and
                  Yannik Lockner and
                  Markus Dahlmanns and
                  Tiandong Xi and
                  Marcel Fey and
                  Christian Brecher and
                  Christian Hopmann and
                  Klaus Wehrle},
  title        = {Privacy-Preserving Production Process Parameter Exchange},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {510--525},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427248},
  doi          = {10.1145/3427228.3427248},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PennekampBLDXFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PriyadarshanNS20,
  author       = {Soumyakant Priyadarshan and
                  Huan Nguyen and
                  R. Sekar},
  title        = {Practical Fine-Grained Binary Code Randomization{\textdagger}},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {401--414},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427292},
  doi          = {10.1145/3427228.3427292},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PriyadarshanNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PuMWRV20,
  author       = {Jiameng Pu and
                  Neal Mangaokar and
                  Bolun Wang and
                  Chandan K. Reddy and
                  Bimal Viswanath},
  title        = {NoiseScope: Detecting Deepfake Images in a Blind Setting},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {913--927},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427285},
  doi          = {10.1145/3427228.3427285},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PuMWRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RabadiT20,
  author       = {Dima Rabadi and
                  Sin G. Teo},
  title        = {Advanced Windows Methods on Malware Detection and Classification},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {54--68},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427242},
  doi          = {10.1145/3427228.3427242},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RabadiT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ReenR20,
  author       = {Gaganjeet Singh Reen and
                  Christian Rossow},
  title        = {DPIFuzz: {A} Differential Fuzzing Framework to Detect {DPI} Elusion
                  Strategies for {QUIC}},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {332--344},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427662},
  doi          = {10.1145/3427228.3427662},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ReenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RosenbergSER20,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {611--626},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427230},
  doi          = {10.1145/3427228.3427230},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RosenbergSER20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RossoCGA20,
  author       = {Martin Rosso and
                  Michele Campobasso and
                  Ganduulga Gankhuyag and
                  Luca Allodi},
  title        = {{SAIBERSOC:} Synthetic Attack Injection to Benchmark and Evaluate
                  the Performance of Security Operation Centers},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {141--153},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427233},
  doi          = {10.1145/3427228.3427233},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RossoCGA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SankaranD020,
  author       = {Arnav Sankaran and
                  Pubali Datta and
                  Adam Bates},
  title        = {Workflow Integration Alleviates Identity and Access Management in
                  Serverless Computing},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {496--509},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427665},
  doi          = {10.1145/3427228.3427665},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SankaranD020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchonherrEZHK20,
  author       = {Lea Sch{\"{o}}nherr and
                  Thorsten Eisenhofer and
                  Steffen Zeiler and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
                  Recognition Systems},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {843--855},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427276},
  doi          = {10.1145/3427228.3427276},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchonherrEZHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SebastianC20,
  author       = {Silvia Sebasti{\'{a}}n and
                  Juan Caballero},
  title        = {AVclass2: Massive Malware Tag Extraction from {AV} Labels},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {42--53},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427261},
  doi          = {10.1145/3427228.3427261},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SebastianC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenD20,
  author       = {Zekun Shen and
                  Brendan Dolan{-}Gavitt},
  title        = {HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free
                  Vulnerabilities},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {454--465},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427645},
  doi          = {10.1145/3427228.3427645},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShiW0SW20,
  author       = {Cong Shi and
                  Yan Wang and
                  Yingying Chen and
                  Nitesh Saxena and
                  Chen Wang},
  title        = {WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands
                  via Cross-Domain Comparison without Training},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {829--842},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427259},
  doi          = {10.1145/3427228.3427259},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShiW0SW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianMSA20,
  author       = {Maliheh Shirvanian and
                  Manar Mohamed and
                  Nitesh Saxena and
                  S. Abhishek Anand},
  title        = {Voicefox: Leveraging Inbuilt Transcription to Enhance the Security
                  of Machine-Human Speaker Verification against Voice Synthesis Attacks},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {870--883},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427289},
  doi          = {10.1145/3427228.3427289},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianMSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShresthaLS20,
  author       = {Prakash Shrestha and
                  Zengrui Liu and
                  Nitesh Saxena},
  title        = {IvoriWatch: Exploring Transparent Integrity Verification of Remote
                  User Input Leveraging Wearables},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {706--716},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427279},
  doi          = {10.1145/3427228.3427279},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShresthaLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SuzakiTGM20,
  author       = {Kuniyasu Suzaki and
                  Akira Tsukamoto and
                  Andy Green and
                  Mohammad Mannan},
  title        = {Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment
                  for Disposable IoT devices},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {428--441},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427293},
  doi          = {10.1145/3427228.3427293},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SuzakiTGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TaiJHZDZ20,
  author       = {Jianwei Tai and
                  Xiaoqi Jia and
                  Qingjia Huang and
                  Weijuan Zhang and
                  Haichao Du and
                  Shengzhi Zhang},
  title        = {{SEEF-ALDR:} {A} Speaker Embedding Enhancement Framework via Adversarial
                  Learning based Disentangled Representation},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {939--950},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427274},
  doi          = {10.1145/3427228.3427274},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TaiJHZDZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Thomasset020,
  author       = {Corentin Thomasset and
                  David Barrera},
  title        = {SERENIoT: Distributed Network Security Policy Management and Enforcement
                  for Smart Homes},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {542--555},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427235},
  doi          = {10.1145/3427228.3427235},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Thomasset020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TianLLS020,
  author       = {Yangguang Tian and
                  Nan Li and
                  Yingjiu Li and
                  Pawel Szalachowski and
                  Jianying Zhou},
  title        = {Policy-based Chameleon Hash for Blockchain Rewriting with Black-box
                  Accountability},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {813--828},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427247},
  doi          = {10.1145/3427228.3427247},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TianLLS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UcciPLA20,
  author       = {Daniele Ucci and
                  Roberto Perdisci and
                  Jaewoo Lee and
                  Mustaque Ahamad},
  title        = {Towards a Practical Differentially Private Collaborative Phone Blacklisting
                  System},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {100--115},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427239},
  doi          = {10.1145/3427228.3427239},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UcciPLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WanS00H20,
  author       = {Shengye Wan and
                  Mingshen Sun and
                  Kun Sun and
                  Ning Zhang and
                  Xu He},
  title        = {RusTEE: Developing Memory-Safe {ARM} TrustZone Applications},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {442--453},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427262},
  doi          = {10.1145/3427228.3427262},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WanS00H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WieflingDI20,
  author       = {Stephan Wiefling and
                  Markus D{\"{u}}rmuth and
                  Luigi Lo Iacono},
  title        = {More Than Just Good Passwords? {A} Study on Usability and Security
                  Perceptions of Risk-based Authentication},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {203--218},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427243},
  doi          = {10.1145/3427228.3427243},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WieflingDI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XiaoSZLH20,
  author       = {Yang Xiao and
                  Shanghao Shi and
                  Ning Zhang and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {Session Key Distribution Made Practical for {CAN} and {CAN-FD} Message
                  Authentication},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {681--693},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427278},
  doi          = {10.1145/3427228.3427278},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XiaoSZLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuD020,
  author       = {Xuening Xu and
                  Xiaojiang Du and
                  Qiang Zeng},
  title        = {Attacking Graph-Based Classification without Changing Existing Connections},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {951--962},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427245},
  doi          = {10.1145/3427228.3427245},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuD020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuLRSXNY0D20,
  author       = {Guowen Xu and
                  Hongwei Li and
                  Hao Ren and
                  Jianfei Sun and
                  Shengmin Xu and
                  Jianting Ning and
                  Haomiao Yang and
                  Kan Yang and
                  Robert H. Deng},
  title        = {Secure and Verifiable Inference in Deep Neural Networks},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {784--797},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427232},
  doi          = {10.1145/3427228.3427232},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XuLRSXNY0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XueNHLHP20,
  author       = {Nian Xue and
                  Liang Niu and
                  Xianbin Hong and
                  Zhen Li and
                  Larissa Hoffaeller and
                  Christina P{\"{o}}pper},
  title        = {DeepSIM: {GPS} Spoofing Detection on UAVs using Satellite Imagery
                  Matching},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {304--319},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427254},
  doi          = {10.1145/3427228.3427254},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XueNHLHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XueWLZZHLLM20,
  author       = {Tao Xue and
                  Yu Wen and
                  Bo Luo and
                  Boyang Zhang and
                  Yang Zheng and
                  Yanfei Hu and
                  Yingjiu Li and
                  Gang Li and
                  Dan Meng},
  title        = {GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure
                  Data Sharing and Analysis in Spark},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {582--596},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427640},
  doi          = {10.1145/3427228.3427640},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XueWLZZHLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YagemannCURSL20,
  author       = {Carter Yagemann and
                  Simon P. Chung and
                  Erkam Uzun and
                  Sai Ragam and
                  Brendan Saltaformaggio and
                  Wenke Lee},
  title        = {On the Feasibility of Automating Stock Market Manipulation},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {277--290},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427241},
  doi          = {10.1145/3427228.3427241},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YagemannCURSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YilmazSC20,
  author       = {Fadi Yilmaz and
                  Meera Sridhar and
                  Wontae Choi},
  title        = {Guide Me to Exploit: Assisted {ROP} Exploit Generation for ActionScript
                  Virtual Machine},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {386--400},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427568},
  doi          = {10.1145/3427228.3427568},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YilmazSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangQFYLXS20,
  author       = {Yiming Zhang and
                  Yiyue Qian and
                  Yujie Fan and
                  Yanfang Ye and
                  Xin Li and
                  Qi Xiong and
                  Fudong Shao},
  title        = {dStyle-GAN: Generative Adversarial Network based on Writing and Photography
                  Styles for Drug Identification in Darknet Markets},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {669--680},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427603},
  doi          = {10.1145/3427228.3427603},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangQFYLXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangTWR0020,
  author       = {Linghan Zhang and
                  Sheng Tan and
                  Zi Wang and
                  Yili Ren and
                  Zhi Wang and
                  Jie Yang},
  title        = {VibLive: {A} Continuous Liveness Detection for Secure Voice User Interface
                  in IoT Environment},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {884--896},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427281},
  doi          = {10.1145/3427228.3427281},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangTWR0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2020,
  title        = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228},
  doi          = {10.1145/3427228},
  isbn         = {978-1-4503-8858-0},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AgadakosJWKP19,
  author       = {Ioannis Agadakos and
                  Di Jin and
                  David Williams{-}King and
                  Vasileios P. Kemerlis and
                  Georgios Portokalidis},
  editor       = {David M. Balenson},
  title        = {Nibbler: debloating binary shared libraries},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {70--83},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359823},
  doi          = {10.1145/3359789.3359823},
  timestamp    = {Thu, 30 May 2024 10:08:27 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AgadakosJWKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AhmadvandFB19,
  author       = {Mohsen Ahmadvand and
                  Dennis Fischer and
                  Sebastian Banescu},
  editor       = {David M. Balenson},
  title        = {{SIP} shaker: software integrity protection composition},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {203--214},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359848},
  doi          = {10.1145/3359789.3359848},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AhmadvandFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Alves-FossS19,
  author       = {Jim Alves{-}Foss and
                  Jia Song},
  editor       = {David M. Balenson},
  title        = {Function boundary detection in stripped binaries},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {84--96},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359825},
  doi          = {10.1145/3359789.3359825},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Alves-FossS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AraujoAAGHK19,
  author       = {Frederico Araujo and
                  Gbadebo Ayoade and
                  Khaled Al{-}Naami and
                  Yang Gao and
                  Kevin W. Hamlen and
                  Latifur Khan},
  editor       = {David M. Balenson},
  title        = {Improving intrusion detectors by crook-sourcing},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {245--256},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359822},
  doi          = {10.1145/3359789.3359822},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AraujoAAGHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BenadjilaMRTT19,
  author       = {Ryad Benadjila and
                  Arnauld Michelizza and
                  Mathieu Renard and
                  Philippe Thierry and
                  Philippe Trebuchet},
  editor       = {David M. Balenson},
  title        = {WooKey: designing a trusted and efficient {USB} device},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {673--686},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359802},
  doi          = {10.1145/3359789.3359802},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BenadjilaMRTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BrasserCDFKS19,
  author       = {Ferdinand Brasser and
                  Srdjan Capkun and
                  Alexandra Dmitrienko and
                  Tommaso Frassetto and
                  Kari Kostiainen and
                  Ahmad{-}Reza Sadeghi},
  editor       = {David M. Balenson},
  title        = {{DR.SGX:} automated and adjustable side-channel protection for {SGX}
                  using data location randomization},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {788--800},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359809},
  doi          = {10.1145/3359789.3359809},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BrasserCDFKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChevalierPDH19,
  author       = {Ronny Chevalier and
                  David Plaquin and
                  Chris I. Dalton and
                  Guillaume Hiet},
  editor       = {David M. Balenson},
  title        = {Survivor: a fine-grained intrusion response and recovery approach
                  for commodity operating systems},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {762--775},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359792},
  doi          = {10.1145/3359789.3359792},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChevalierPDH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CristalliLBL19,
  author       = {Stefano Cristalli and
                  Long Lu and
                  Danilo Bruschi and
                  Andrea Lanzi},
  editor       = {David M. Balenson},
  title        = {Detecting (absent) app-to-app authentication on cross-device short-distance
                  channels},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {328--338},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359814},
  doi          = {10.1145/3359789.3359814},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CristalliLBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DashKP19,
  author       = {Pritam Dash and
                  Mehdi Karimibiuki and
                  Karthik Pattabiraman},
  editor       = {David M. Balenson},
  title        = {Out of control: stealthy attacks against robotic vehicles protected
                  by control-based techniques},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {660--672},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359847},
  doi          = {10.1145/3359789.3359847},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DashKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DickinsonSS19,
  author       = {Luke Dickinson and
                  Trevor Smith and
                  Kent E. Seamons},
  editor       = {David M. Balenson},
  title        = {Leveraging locality of reference for certificate revocation},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {514--528},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359819},
  doi          = {10.1145/3359789.3359819},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DickinsonSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Fass0S19,
  author       = {Aurore Fass and
                  Michael Backes and
                  Ben Stock},
  editor       = {David M. Balenson},
  title        = {JStap: a static pre-filter for malicious JavaScript detection},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {257--269},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359813},
  doi          = {10.1145/3359789.3359813},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Fass0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ForuhandehMGLC19,
  author       = {Mahsa Foruhandeh and
                  Yanmao Man and
                  Ryan M. Gerdes and
                  Ming Li and
                  Thidapat Chantem},
  editor       = {David M. Balenson},
  title        = {{SIMPLE:} single-frame based physical layer identification for intrusion
                  detection and prevention on in-vehicle networks},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {229--244},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359834},
  doi          = {10.1145/3359789.3359834},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ForuhandehMGLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoXW0RN19,
  author       = {Yansong Gao and
                  Chang Xu and
                  Derui Wang and
                  Shiping Chen and
                  Damith Chinthana Ranasinghe and
                  Surya Nepal},
  editor       = {David M. Balenson},
  title        = {{STRIP:} a defence against trojan attacks on deep neural networks},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {113--125},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359790},
  doi          = {10.1145/3359789.3359790},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoXW0RN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GeCGL0ZL19,
  author       = {Huangyi Ge and
                  Sze Yiu Chau and
                  Victor E. Gonsalves and
                  Huian Li and
                  Tianhao Wang and
                  Xukai Zou and
                  Ninghui Li},
  editor       = {David M. Balenson},
  title        = {Koinonia: verifiable e-voting with long-term privacy},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {270--285},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359804},
  doi          = {10.1145/3359789.3359804},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GeCGL0ZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GencLS19,
  author       = {Ziya Alper Gen{\c{c}} and
                  Gabriele Lenzini and
                  Daniele Sgandurra},
  editor       = {David M. Balenson},
  title        = {A game of "Cut and Mouse": bypassing antivirus by simulating user
                  inputs},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {456--465},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359844},
  doi          = {10.1145/3359789.3359844},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GencLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuiXLKC19,
  author       = {Jiaping Gui and
                  Xusheng Xiao and
                  Ding Li and
                  Chung Hwan Kim and
                  Haifeng Chen},
  editor       = {David M. Balenson},
  title        = {Progressive processing of system-behavioral query},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {378--389},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359818},
  doi          = {10.1145/3359789.3359818},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuiXLKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Hasegawa0SA19,
  author       = {Ayako Akiyama Hasegawa and
                  Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama},
  editor       = {David M. Balenson},
  title        = {I know what you did last login: inconsistent messages tell existence
                  of a target's account to insiders},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {732--746},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359832},
  doi          = {10.1145/3359789.3359832},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Hasegawa0SA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HauserMS0VK19,
  author       = {Christophe Hauser and
                  Jayakrishna Menon and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {David M. Balenson},
  title        = {Sleak: automating address space layout derandomization},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {190--202},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359820},
  doi          = {10.1145/3359789.3359820},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HauserMS0VK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HeZL19,
  author       = {Zecheng He and
                  Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {David M. Balenson},
  title        = {Model inversion attacks against collaborative inference},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {148--162},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359824},
  doi          = {10.1145/3359789.3359824},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HeZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HerzbergK19,
  author       = {Amir Herzberg and
                  Yehonatan Kfir},
  editor       = {David M. Balenson},
  title        = {The chatty-sensor: a provably-covert channel in cyber physical systems},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {638--649},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359794},
  doi          = {10.1145/3359789.3359794},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HerzbergK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JangK19,
  author       = {Joonun Jang and
                  Huy Kang Kim},
  editor       = {David M. Balenson},
  title        = {FuzzBuilder: automated building greybox fuzzing environment for {C/C++}
                  library},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {627--637},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359846},
  doi          = {10.1145/3359789.3359846},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JangK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jiang0LLGM19,
  author       = {Fangjie Jiang and
                  Quanwei Cai and
                  Jingqiang Lin and
                  Bo Luo and
                  Le Guan and
                  Ziqiang Ma},
  editor       = {David M. Balenson},
  title        = {{TF-BIV:} transparent and fine-grained binary integrity verification
                  in the cloud},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {57--69},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359795},
  doi          = {10.1145/3359789.3359795},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jiang0LLGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JinYD019,
  author       = {Chenglu Jin and
                  Zheng Yang and
                  Marten van Dijk and
                  Jianying Zhou},
  editor       = {David M. Balenson},
  title        = {Proof of aliveness},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359827},
  doi          = {10.1145/3359789.3359827},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JinYD019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JindalSALKV19,
  author       = {Chani Jindal and
                  Christopher Salls and
                  Hojjat Aghakhani and
                  Keith Long and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {David M. Balenson},
  title        = {Neurlux: dynamic malware analysis without feature engineering},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {444--455},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359835},
  doi          = {10.1145/3359789.3359835},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JindalSALKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarimCHCB19,
  author       = {Imtiaz Karim and
                  Fabrizio Cicala and
                  Syed Rafiul Hussain and
                  Omar Chowdhury and
                  Elisa Bertino},
  editor       = {David M. Balenson},
  title        = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface
                  for Android smartphones},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {529--543},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359833},
  doi          = {10.1145/3359789.3359833},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarimCHCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KurogomeOKIHMS19,
  author       = {Yuma Kurogome and
                  Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Syogo Hayashi and
                  Tatsuya Mori and
                  Koushik Sen},
  editor       = {David M. Balenson},
  title        = {{EIGER:} automated {IOC} generation for accurate and interpretable
                  endpoint malware detection},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {687--701},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359808},
  doi          = {10.1145/3359789.3359808},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KurogomeOKIHMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiHZG19,
  author       = {Zheng Li and
                  Chengyu Hu and
                  Yang Zhang and
                  Shanqing Guo},
  editor       = {David M. Balenson},
  title        = {How to prove your model belongs to you: a blind-watermark based framework
                  to protect intellectual property of {DNN}},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {126--137},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359801},
  doi          = {10.1145/3359789.3359801},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiHZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiLLTL019,
  author       = {Yu Li and
                  Yannan Liu and
                  Min Li and
                  Ye Tian and
                  Bo Luo and
                  Qiang Xu},
  editor       = {David M. Balenson},
  title        = {{D2NN:} a fine-grained dual modular redundancy framework for deep
                  neural networks},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {138--147},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359831},
  doi          = {10.1145/3359789.3359831},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiLLTL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaFLLNOBDMJ19,
  author       = {Siqi Ma and
                  Runhan Feng and
                  Juanru Li and
                  Yang Liu and
                  Surya Nepal and
                  Diethelm Ostry and
                  Elisa Bertino and
                  Robert H. Deng and
                  Zhuo Ma and
                  Sanjay Jha},
  editor       = {David M. Balenson},
  title        = {An empirical study of {SMS} one-time password authentication in Android
                  apps},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {339--354},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359828},
  doi          = {10.1145/3359789.3359828},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MaFLLNOBDMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MainardiBP19,
  author       = {Nicholas Mainardi and
                  Alessandro Barenghi and
                  Gerardo Pelosi},
  editor       = {David M. Balenson},
  title        = {Privacy preserving substring search protocol with polylogarithmic
                  communication cost},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {297--312},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359842},
  doi          = {10.1145/3359789.3359842},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MainardiBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MambrettiNSKRK19,
  author       = {Andrea Mambretti and
                  Matthias Neugschwandtner and
                  Alessandro Sorniotti and
                  Engin Kirda and
                  William K. Robertson and
                  Anil Kurmus},
  editor       = {David M. Balenson},
  title        = {Speculator: a tool to analyze speculative execution attacks and mitigations},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {747--761},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359837},
  doi          = {10.1145/3359789.3359837},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MambrettiNSKRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MarchalS19,
  author       = {Samuel Marchal and
                  Sebastian Szyller},
  editor       = {David M. Balenson},
  title        = {Detecting organized eCommerce fraud using scalable categorical clustering},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {215--228},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359810},
  doi          = {10.1145/3359789.3359810},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MarchalS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MofradALYCZ19,
  author       = {Saeid Mofrad and
                  Ishtiaq Ahmed and
                  Shiyong Lu and
                  Ping Yang and
                  Heming Cui and
                  Fengwei Zhang},
  editor       = {David M. Balenson},
  title        = {SecDATAVIEW: a secure big data workflow management system for heterogeneous
                  computing environments},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {390--403},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359845},
  doi          = {10.1145/3359789.3359845},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MofradALYCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MohamedSS19,
  author       = {Manar Mohamed and
                  Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {David M. Balenson},
  title        = {Challenge-response behavioral mobile authentication: a comparative
                  study of graphical patterns and cognitive games},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {355--365},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359838},
  doi          = {10.1145/3359789.3359838},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MohamedSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MunteanNLTG019,
  author       = {Paul Muntean and
                  Matthias Neumayer and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {David M. Balenson},
  title        = {Analyzing control flow integrity with {LLVM-CFI}},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {584--597},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359806},
  doi          = {10.1145/3359789.3359806},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MunteanNLTG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Naderi-Afooshteh19,
  author       = {Abbas Naderi{-}Afooshteh and
                  Yonghwi Kwon and
                  Anh Nguyen{-}Tuong and
                  Mandana Bagheri{-}Marzijarani and
                  Jack W. Davidson},
  editor       = {David M. Balenson},
  title        = {Cubismo: decloaking server-side malware via cubist program analysis},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {430--443},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359821},
  doi          = {10.1145/3359789.3359821},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Naderi-Afooshteh19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NagendraYPD19,
  author       = {Vasudevan Nagendra and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Samir R. Das},
  editor       = {David M. Balenson},
  title        = {Coordinated dataflow protection for ultra-high bandwidth science networks},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {568--583},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359843},
  doi          = {10.1145/3359789.3359843},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NagendraYPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NajafiMP0M19,
  author       = {Pejman Najafi and
                  Alexander M{\"{u}}hle and
                  Wenzel P{\"{u}}nter and
                  Feng Cheng and
                  Christoph Meinel},
  editor       = {David M. Balenson},
  title        = {MalRank: a measure of maliciousness in SIEM-based knowledge graphs},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {417--429},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359791},
  doi          = {10.1145/3359789.3359791},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NajafiMP0M19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NakatsukaPT19,
  author       = {Yoshimichi Nakatsuka and
                  Andrew Paverd and
                  Gene Tsudik},
  editor       = {David M. Balenson},
  title        = {PDoT: private DNS-over-TLS with {TEE} support},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {489--499},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359793},
  doi          = {10.1145/3359789.3359793},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NakatsukaPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NamAG19,
  author       = {Myoung Jin Nam and
                  Periklis Akritidis and
                  David J. Greaves},
  editor       = {David M. Balenson},
  title        = {{FRAMER:} a tagged-pointer capability system with memory safety applications},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {612--626},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359799},
  doi          = {10.1145/3359789.3359799},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NamAG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OllivierBBM19,
  author       = {Mathilde Ollivier and
                  S{\'{e}}bastien Bardin and
                  Richard Bonichon and
                  Jean{-}Yves Marion},
  editor       = {David M. Balenson},
  title        = {How to kill symbolic deobfuscation for free (or: unleashing the potential
                  of path-oriented protections)},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {177--189},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359812},
  doi          = {10.1145/3359789.3359812},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OllivierBBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OsmanMHY19,
  author       = {Tousif Osman and
                  Mohammad Mannan and
                  Urs Hengartner and
                  Amr M. Youssef},
  editor       = {David M. Balenson},
  title        = {AppVeto: mobile application self-defense through resource access veto},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {366--377},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359839},
  doi          = {10.1145/3359789.3359839},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OsmanMHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PalitMP19,
  author       = {Tapti Palit and
                  Fabian Monrose and
                  Michalis Polychronakis},
  editor       = {David M. Balenson},
  title        = {Mitigating data leakage by protecting memory-resident sensitive data},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {598--611},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359815},
  doi          = {10.1145/3359789.3359815},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PalitMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PawlowskiVAKHGB19,
  author       = {Andre Pawlowski and
                  Victor van der Veen and
                  Dennis Andriesse and
                  Erik van der Kouwe and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {David M. Balenson},
  title        = {{VPS:} excavating high-level {C++} constructs from low-level binaries
                  to protect dynamic dispatching},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {97--112},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359797},
  doi          = {10.1145/3359789.3359797},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PawlowskiVAKHGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PoeplauF19,
  author       = {Sebastian Poeplau and
                  Aur{\'{e}}lien Francillon},
  editor       = {David M. Balenson},
  title        = {Systematic comparison of symbolic execution systems: intermediate
                  representation and its generation},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {163--176},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359796},
  doi          = {10.1145/3359789.3359796},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PoeplauF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RondonBAU19,
  author       = {Luis Puche Rondon and
                  Leonardo Babun and
                  Kemal Akkaya and
                  A. Selcuk Uluagac},
  editor       = {David M. Balenson},
  title        = {HDMI-walk: attacking {HDMI} distribution networks via consumer electronic
                  control protocol},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {650--659},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359841},
  doi          = {10.1145/3359789.3359841},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RondonBAU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Sanchez-RolaBS19,
  author       = {Iskander S{\'{a}}nchez{-}Rola and
                  Davide Balzarotti and
                  Igor Santos},
  editor       = {David M. Balenson},
  title        = {BakingTimer: privacy analysis of server-side request processing time},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {478--488},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359803},
  doi          = {10.1145/3359789.3359803},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Sanchez-RolaBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SandersY19,
  author       = {Matthew W. Sanders and
                  Chuan Yue},
  editor       = {David M. Balenson},
  title        = {Mining least privilege attribute based access control policies},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {404--416},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359805},
  doi          = {10.1145/3359789.3359805},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SandersY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShejwalkarHPG19,
  author       = {Virat Shejwalkar and
                  Amir Houmansadr and
                  Hossein Pishro{-}Nik and
                  Dennis Goeckel},
  editor       = {David M. Balenson},
  title        = {Revisiting utility metrics for location privacy-preserving mechanisms},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {313--327},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359829},
  doi          = {10.1145/3359789.3359829},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShejwalkarHPG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SikderBAU19,
  author       = {Amit Kumar Sikder and
                  Leonardo Babun and
                  Hidayet Aksu and
                  A. Selcuk Uluagac},
  editor       = {David M. Balenson},
  title        = {Aegis: a context-aware security framework for smart home systems},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {28--41},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359840},
  doi          = {10.1145/3359789.3359840},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SikderBAU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SlaterNMMT19,
  author       = {David Slater and
                  Scott Novotney and
                  Jessica Moore and
                  Sean Morgan and
                  Scott Tenaglia},
  editor       = {David M. Balenson},
  title        = {Robust keystroke transcription from the acoustic side-channel},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {776--787},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359816},
  doi          = {10.1145/3359789.3359816},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SlaterNMMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SpoorenVJJD19,
  author       = {Jan Spooren and
                  Thomas Vissers and
                  Peter Janssen and
                  Wouter Joosen and
                  Lieven Desmet},
  editor       = {David M. Balenson},
  title        = {Premadoma: an operational solution for {DNS} registries to prevent
                  malicious domain registrations},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {557--567},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359836},
  doi          = {10.1145/3359789.3359836},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SpoorenVJJD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StylianopoulosK19,
  author       = {Charalampos Stylianopoulos and
                  Simon Kindstr{\"{o}}m and
                  Magnus Almgren and
                  Olaf Landsiedel and
                  Marina Papatriantafilou},
  editor       = {David M. Balenson},
  title        = {Co-evaluation of pattern matching algorithms on IoT devices with embedded
                  GPUs},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {17--27},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359811},
  doi          = {10.1145/3359789.3359811},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StylianopoulosK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UkropKMW19,
  author       = {Martin Ukrop and
                  Lydia Kraus and
                  Vashek Matyas and
                  Heider Ahmad Mutleq Wahsheh},
  editor       = {David M. Balenson},
  title        = {Will you trust this {TLS} certificate?: perceptions of people working
                  in {IT}},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {718--731},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359800},
  doi          = {10.1145/3359789.3359800},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UkropKMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UrbanDHP19,
  author       = {Tobias Urban and
                  Martin Degeling and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {David M. Balenson},
  title        = {"\emph{Your hashed {IP} address: Ubuntu.}": perspectives on transparency
                  tools for online advertising},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {702--717},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359798},
  doi          = {10.1145/3359789.3359798},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UrbanDHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/UsuiOKIMM19,
  author       = {Toshinori Usui and
                  Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Jun Miyoshi and
                  Kanta Matsuura},
  editor       = {David M. Balenson},
  title        = {My script engines know what you did in the dark: converting engines
                  into script {API} tracers},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {466--477},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359849},
  doi          = {10.1145/3359789.3359849},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/UsuiOKIMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VaidyaWS19,
  author       = {Tavish Vaidya and
                  Tim Walsh and
                  Micah Sherr},
  editor       = {David M. Balenson},
  title        = {Whisper: a unilateral defense against VoIP traffic re-identification
                  attacks},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {286--296},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359807},
  doi          = {10.1145/3359789.3359807},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VaidyaWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangALW0S19,
  author       = {Chen Wang and
                  S. Abhishek Anand and
                  Jian Liu and
                  Payton Walker and
                  Yingying Chen and
                  Nitesh Saxena},
  editor       = {David M. Balenson},
  title        = {Defeating hidden audio channel attacks on voice assistants via audio-induced
                  surface vibrations},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {42--56},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359830},
  doi          = {10.1145/3359789.3359830},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangALW0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangDZH0LWDSSLG19,
  author       = {Hao Yang and
                  Kun Du and
                  Yubao Zhang and
                  Shuang Hao and
                  Zhou Li and
                  Mingxuan Liu and
                  Haining Wang and
                  Hai{-}Xin Duan and
                  Yazhou Shi and
                  XiaoDong Su and
                  Guang Liu and
                  Zhifeng Geng and
                  Jianping Wu},
  editor       = {David M. Balenson},
  title        = {Casino royale: a deep exploration of illegal online gambling},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {500--513},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359817},
  doi          = {10.1145/3359789.3359817},
  timestamp    = {Mon, 15 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YangDZH0LWDSSLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangHJSLLWSZL19,
  author       = {Yu Zhang and
                  Wei Huo and
                  Kunpeng Jian and
                  Ji Shi and
                  Haoliang Lu and
                  Longquan Liu and
                  Chen Wang and
                  Dandan Sun and
                  Chao Zhang and
                  Baoxu Liu},
  editor       = {David M. Balenson},
  title        = {SRFuzzer: an automatic fuzzing framework for physical {SOHO} router
                  devices to discover multi-type vulnerabilities},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {544--556},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359826},
  doi          = {10.1145/3359789.3359826},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangHJSLLWSZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2019,
  editor       = {David M. Balenson},
  title        = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789},
  doi          = {10.1145/3359789},
  isbn         = {978-1-4503-7628-0},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AckerHS18,
  author       = {Steven {Van Acker} and
                  Daniel Hausknecht and
                  Andrei Sabelfeld},
  title        = {Raising the Bar: Evaluating Origin-wide Security Manifests},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {342--354},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274701},
  doi          = {10.1145/3274694.3274701},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AckerHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AhmadvandHBP18,
  author       = {Mohsen Ahmadvand and
                  Anahit Hayrapetyan and
                  Sebastian Banescu and
                  Alexander Pretschner},
  title        = {Practical Integrity Protection with Oblivious Hashing},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {40--52},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274732},
  doi          = {10.1145/3274694.3274732},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AhmadvandHBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Ahmed0M18,
  author       = {Chuadhry Mujeeb Ahmed and
                  Jianying Zhou and
                  Aditya P. Mathur},
  title        = {Noise Matters: Using Sensor and Process Noise Fingerprint to Detect
                  Stealthy Cyber Attacks and Authenticate sensors in {CPS}},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {566--581},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274748},
  doi          = {10.1145/3274694.3274748},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Ahmed0M18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AllenLCJCL18,
  author       = {Joey Allen and
                  Matthew Landen and
                  Sanya Chaba and
                  Yang Ji and
                  Simon Pak Ho Chung and
                  Wenke Lee},
  title        = {Improving Accuracy of Android Malware Detection with Lightweight Contextual
                  Awareness},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {210--221},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274744},
  doi          = {10.1145/3274694.3274744},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AllenLCJCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AndreAS18,
  author       = {Andr{\'{e}} Greubel and
                  Alexandra Dmitrienko and
                  Samuel Kounev},
  title        = {SmarTor: Smarter Tor with Smart Contracts: Improving resilience of
                  topology distribution in the Tor network},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {677--691},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274722},
  doi          = {10.1145/3274694.3274722},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AndreAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivWK18,
  author       = {Adam J. Aviv and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Comparing Video Based Shoulder Surfing with Live Simulation},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {453--466},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274702},
  doi          = {10.1145/3274694.3274702},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaekKC0SDA18,
  author       = {Jaejong Baek and
                  Sukwha Kyung and
                  Haehyun Cho and
                  Ziming Zhao and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi
                  Calling},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {278--288},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274753},
  doi          = {10.1145/3274694.3274753},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BaekKC0SDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BlanchardMS18,
  author       = {Nikola K. Blanchard and
                  Cl{\'{e}}ment Malaingre and
                  Ted Selker},
  title        = {Improving security and usability of passphrases with guided word choice},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {723--732},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274734},
  doi          = {10.1145/3274694.3274734},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BlanchardMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CastellanosO018,
  author       = {John Henry Castellanos and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou},
  title        = {Finding Dependencies between Cyber-Physical Domains for Security Testing
                  of Industrial Control Systems},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {582--594},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274745},
  doi          = {10.1145/3274694.3274745},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CastellanosO018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChauWWCKL18,
  author       = {Sze Yiu Chau and
                  Bincheng Wang and
                  Jianxiong Wang and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing
                  and Implementing Content Delivery Apps},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {236--251},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274752},
  doi          = {10.1145/3274694.3274752},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChoZKPL0DA18,
  author       = {Haehyun Cho and
                  Penghui Zhang and
                  Donguk Kim and
                  Jinbum Park and
                  Choong{-}Hoon Lee and
                  Ziming Zhao and
                  Adam Doup{\'{e}} and
                  Gail{-}Joon Ahn},
  title        = {Prime+Count: Novel Cross-world Covert Channels on {ARM} TrustZone},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {441--452},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274704},
  doi          = {10.1145/3274694.3274704},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChoZKPL0DA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ContinellaPPZ18,
  author       = {Andrea Continella and
                  Mario Polino and
                  Marcello Pogliani and
                  Stefano Zanero},
  title        = {There's a Hole in that Bucket!: {A} Large-scale Analysis of Misconfigured
                  {S3} Buckets},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {702--711},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274736},
  doi          = {10.1145/3274694.3274736},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ContinellaPPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CoptyDEEMZ18,
  author       = {Fady Copty and
                  Matan Danos and
                  Orit Edelstein and
                  Cindy Eisner and
                  Dov Murik and
                  Benjamin Zeltser},
  title        = {Accurate Malware Detection by Extreme Abstraction},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {101--111},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274700},
  doi          = {10.1145/3274694.3274700},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CoptyDEEMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DemoulinVPDQSZC18,
  author       = {Henri Maxime Demoulin and
                  Tavish Vaidya and
                  Isaac Pedisich and
                  Bob DiMaiolo and
                  Jingyu Qian and
                  Chirag Shah and
                  Yuankai Zhang and
                  Ang Chen and
                  Andreas Haeberlen and
                  Boon Thau Loo and
                  Linh Thi Xuan Phan and
                  Micah Sherr and
                  Clay Shields and
                  Wenchao Zhou},
  title        = {DeDoS: Defusing DoS with Dispersion Oriented Software},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {712--722},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274727},
  doi          = {10.1145/3274694.3274727},
  timestamp    = {Mon, 15 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DemoulinVPDQSZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EcheverriaCKLSZ18,
  author       = {Juan Echeverr{\'{\i}}a and
                  Emiliano De Cristofaro and
                  Nicolas Kourtellis and
                  Ilias Leontiadis and
                  Gianluca Stringhini and
                  Shi Zhou},
  title        = {{LOBO:} Evaluation of Generalization Deficiencies in Twitter Bot Classifiers},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {137--146},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274738},
  doi          = {10.1145/3274694.3274738},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EcheverriaCKLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EtigowniHKDZ18,
  author       = {Sriharsha Etigowni and
                  Shamina Hossain{-}McKenzie and
                  Maryam Kazerooni and
                  Katherine R. Davis and
                  Saman A. Zonouz},
  title        = {Crystal (ball): {I} Look at Physics and Predict Control Flow! Just-Ahead-Of-Time
                  Controller Recovery},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {553--565},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274724},
  doi          = {10.1145/3274694.3274724},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/EtigowniHKDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FangYGL18,
  author       = {Minghong Fang and
                  Guolei Yang and
                  Neil Zhenqiang Gong and
                  Jia Liu},
  title        = {Poisoning Attacks to Graph-Based Recommender Systems},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {381--392},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274706},
  doi          = {10.1145/3274694.3274706},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FangYGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FarhangWKG018,
  author       = {Sadegh Farhang and
                  Jake Weidman and
                  Mohammad Mahdi Kamani and
                  Jens Grossklags and
                  Peng Liu},
  title        = {Take It or Leave It: {A} Survey Study on Operating System Upgrade
                  Practices},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {490--504},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274733},
  doi          = {10.1145/3274694.3274733},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FarhangWKG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FarkhaniJARKO18,
  author       = {Reza Mirzazade Farkhani and
                  Saman Jafari and
                  Sajjad Arshad and
                  William K. Robertson and
                  Engin Kirda and
                  Hamed Okhravi},
  title        = {On the Effectiveness of Type-based Control Flow Integrity},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {28--39},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274739},
  doi          = {10.1145/3274694.3274739},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FarkhaniJARKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FutagamiUK18,
  author       = {Shota Futagami and
                  Tomoya Unoki and
                  Kenichi Kourai},
  title        = {Secure Out-of-band Remote Management of Virtual Machines with Transparent
                  Passthrough},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {430--440},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274749},
  doi          = {10.1145/3274694.3274749},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FutagamiUK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GarmanySGKBH18,
  author       = {Behrad Garmany and
                  Martin Stoffel and
                  Robert Gawlik and
                  Philipp Koppe and
                  Tim Blazytko and
                  Thorsten Holz},
  title        = {Towards Automated Generation of Exploitation Primitives for Web Browsers},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {300--312},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274723},
  doi          = {10.1145/3274694.3274723},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GarmanySGKBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Goer0ABG18,
  author       = {Franck de Go{\"{e}}r and
                  Sanjay Rawat and
                  Dennis Andriesse and
                  Herbert Bos and
                  Roland Groz},
  title        = {Now You See Me: Real-time Dynamic Function Call Detection},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {618--628},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274712},
  doi          = {10.1145/3274694.3274712},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Goer0ABG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ImCW18,
  author       = {Bumjin Im and
                  Ang Chen and
                  Dan S. Wallach},
  title        = {An Historical Analysis of the SEAndroid Policy Evolution},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {629--640},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274709},
  doi          = {10.1145/3274694.3274709},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ImCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jain0GB18,
  author       = {Vivek Jain and
                  Sanjay Rawat and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {{TIFF:} Using Input Type Inference To Improve Fuzzing},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {505--517},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274746},
  doi          = {10.1145/3274694.3274746},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jain0GB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JunaidMK18,
  author       = {Mohsin Junaid and
                  Jiang Ming and
                  David Chenho Kung},
  title        = {StateDroid: Stateful Detection of Stealthy Attacks in Android Apps
                  via Horn-Clause Verification},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {198--209},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274707},
  doi          = {10.1145/3274694.3274707},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JunaidMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KesarwaniMAM18,
  author       = {Manish Kesarwani and
                  Bhaskar Mukhoty and
                  Vijay Arya and
                  Sameep Mehta},
  title        = {Model Extraction Warning in MLaaS Paradigm},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {371--380},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274740},
  doi          = {10.1145/3274694.3274740},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KesarwaniMAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KouweKOBG18,
  author       = {Erik van der Kouwe and
                  Taddeus Kroes and
                  Chris Ouwehand and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Type-After-Type: Practical and Complete Type-Safe Memory Reuse},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {17--27},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274705},
  doi          = {10.1145/3274694.3274705},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KouweKOBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiangBLLT18,
  author       = {Weixin Liang and
                  Kai Bu and
                  Ke Li and
                  Jinhong Li and
                  Arya Tavakoli},
  title        = {MemCloak: Practical Access Obfuscation for Untrusted Memory},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {187--197},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274695},
  doi          = {10.1145/3274694.3274695},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiangBLLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LinLWJ0Z18,
  author       = {Xin Lin and
                  Lingguang Lei and
                  Yuewu Wang and
                  Jiwu Jing and
                  Kun Sun and
                  Quan Zhou},
  title        = {A Measurement Study on Linux Container Security: Attacks and Countermeasures},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {418--429},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274720},
  doi          = {10.1145/3274694.3274720},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LinLWJ0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuLD18,
  author       = {Ximing Liu and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication
                  Based on Keystroke Timings},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {53--65},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274699},
  doi          = {10.1145/3274694.3274699},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuZLZ018,
  author       = {Changming Liu and
                  Deqing Zou and
                  Peng Luo and
                  Bin B. Zhu and
                  Hai Jin},
  title        = {A Heuristic Framework to Detect Concurrency Vulnerabilities},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {529--541},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274718},
  doi          = {10.1145/3274694.3274718},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuZLZ018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuZLZL18,
  author       = {Bo Lu and
                  Xiaokuan Zhang and
                  Ziman Ling and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {A Measurement Study of Authentication Rate-Limiting Mechanisms of
                  Modern Websites},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274714},
  doi          = {10.1145/3274694.3274714},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuZLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MachiryRGFCKV18,
  author       = {Aravind Machiry and
                  Nilo Redini and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Using Loops For Malware Classification Resilient to Feature-unaware
                  Perturbations},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {112--123},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274731},
  doi          = {10.1145/3274694.3274731},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MachiryRGFCKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ManiVDS18,
  author       = {Akshaya Mani and
                  Tavish Vaidya and
                  David Dworken and
                  Micah Sherr},
  title        = {An Extensive Evaluation of the Internet's Open Proxies},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {252--265},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274711},
  doi          = {10.1145/3274694.3274711},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ManiVDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MayerSV18,
  author       = {Peter Mayer and
                  Christian Schwartz and
                  Melanie Volkamer},
  title        = {On The Systematic Development and Evaluation Of Password Security
                  Awareness-Raising Materials},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {733--748},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274747},
  doi          = {10.1145/3274694.3274747},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MayerSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McCulleyR18,
  author       = {Shane McCulley and
                  Vassil Roussev},
  title        = {Latent Typing Biometrics in Online Collaboration Services},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {66--76},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274754},
  doi          = {10.1145/3274694.3274754},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McCulleyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MishraP18,
  author       = {Shachee Mishra and
                  Michalis Polychronakis},
  title        = {Shredder: Breaking Exploits through {API} Specialization},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274703},
  doi          = {10.1145/3274694.3274703},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MishraP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NeupaneSSSB18,
  author       = {Ajaya Neupane and
                  Kiavash Satvat and
                  Nitesh Saxena and
                  Despina Stavrinos and
                  Haley Johnson Bishop},
  title        = {Do Social Disorders Facilitate Social Engineering?: {A} Case Study
                  of Autism and Phishing Attacks},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {467--477},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274730},
  doi          = {10.1145/3274694.3274730},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NeupaneSSSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NikolicKSSH18,
  author       = {Ivica Nikolic and
                  Aashish Kolluri and
                  Ilya Sergey and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {Finding The Greedy, Prodigal, and Suicidal Contracts at Scale},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {653--663},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274743},
  doi          = {10.1145/3274694.3274743},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NikolicKSSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OpreaLNB18,
  author       = {Alina Oprea and
                  Zhou Li and
                  Robin Norris and
                  Kevin D. Bowers},
  title        = {{MADE:} Security Analytics for Enterprise Threat Detection},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {124--136},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274710},
  doi          = {10.1145/3274694.3274710},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/OpreaLNB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PangDMG18,
  author       = {Chengbin Pang and
                  Yunlan Du and
                  Bing Mao and
                  Shanqing Guo},
  title        = {Mapping to Bits: Efficiently Detecting Type Confusion Errors},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {518--528},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274719},
  doi          = {10.1145/3274694.3274719},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PangDMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ProskurinLMEZ18,
  author       = {Sergej Proskurin and
                  Tamas K. Lengyel and
                  Marius Momeu and
                  Claudia Eckert and
                  Apostolis Zarras},
  title        = {Hiding in the Shadows: Empowering {ARM} for Stealthy Virtual Machine
                  Introspection},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {407--417},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274698},
  doi          = {10.1145/3274694.3274698},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ProskurinLMEZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RahmanNS18,
  author       = {Md. Lutfor Rahman and
                  Ajaya Neupane and
                  Chengyu Song},
  title        = {{IAC:} On the Feasibility of Utilizing Neural Signals for Access Control},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {641--652},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274713},
  doi          = {10.1145/3274694.3274713},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RahmanNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RamanathanMYZ18,
  author       = {Sivaramakrishnan Ramanathan and
                  Jelena Mirkovic and
                  Minlan Yu and
                  Ying Zhang},
  title        = {{SENSS} Against Volumetric DDoS Attacks},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {266--277},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274717},
  doi          = {10.1145/3274694.3274717},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RamanathanMYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RodriguezP18,
  author       = {Juan D. Parra Rodriguez and
                  Joachim Posegga},
  title        = {{RAPID:} Resource and API-Based Detection Against In-Browser Miners},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {313--326},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274735},
  doi          = {10.1145/3274694.3274735},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RodriguezP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchillingWNM18,
  author       = {Robert Schilling and
                  Mario Werner and
                  Pascal Nasahl and
                  Stefan Mangard},
  title        = {Pointing in the Right Direction - Securing Memory Accesses in a Faulty
                  World},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {595--604},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274728},
  doi          = {10.1145/3274694.3274728},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchillingWNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SyBFF18,
  author       = {Erik Sy and
                  Christian Burkert and
                  Hannes Federrath and
                  Mathias Fischer},
  title        = {Tracking Users across the Web via {TLS} Session Resumption},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {289--299},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274708},
  doi          = {10.1145/3274694.3274708},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SyBFF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TorresSS18,
  author       = {Christof Ferreira Torres and
                  Julian Sch{\"{u}}tte and
                  Radu State},
  title        = {Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {664--676},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274737},
  doi          = {10.1145/3274694.3274737},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TorresSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TranLKBS18,
  author       = {Muoi Tran and
                  Loi Luu and
                  Min Suk Kang and
                  Iddo Bentov and
                  Prateek Saxena},
  title        = {Obscuro: {A} Bitcoin Mixer using Trusted Execution Environments},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {692--701},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274750},
  doi          = {10.1145/3274694.3274750},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TranLKBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TuveriHGB18,
  author       = {Nicola Tuveri and
                  Sohaib ul Hassan and
                  Cesar Pereida Garc{\'{\i}}a and
                  Billy Bob Brumley},
  title        = {Side-Channel Analysis of {SM2:} {A} Late-Stage Featurization Case
                  Study},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {147--160},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274725},
  doi          = {10.1145/3274694.3274725},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TuveriHGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangKMZX18,
  author       = {Fei Wang and
                  Yonghwi Kwon and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Lprov: Practical Library-aware Provenance Tracing},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {605--617},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274751},
  doi          = {10.1145/3274694.3274751},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangKMZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiLLL018,
  author       = {Lingxiao Wei and
                  Bo Luo and
                  Yu Li and
                  Yannan Liu and
                  Qiang Xu},
  title        = {I Know What You See: Power Side-Channel Attack on Convolutional Neural
                  Network Accelerators},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {393--406},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274696},
  doi          = {10.1145/3274694.3274696},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiLLL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WermkeHARTF18,
  author       = {Dominik Wermke and
                  Nicolas Huaman and
                  Yasemin Acar and
                  Bradley Reaves and
                  Patrick Traynor and
                  Sascha Fahl},
  title        = {A Large Scale Investigation of Obfuscation Use in Google Play},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {222--235},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274726},
  doi          = {10.1145/3274694.3274726},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WermkeHARTF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WichelmannMES18,
  author       = {Jan Wichelmann and
                  Ahmad Moghimi and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {MicroWalk: {A} Framework for Finding Side Channels in Binaries},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {161--173},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274741},
  doi          = {10.1145/3274694.3274741},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WichelmannMES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WieseWM018,
  author       = {Oliver Wiese and
                  Christoph Weinhold and
                  Jan{-}Ole Malchow and
                  Volker Roth},
  title        = {I Need this Back, Later!: An Exploration of Practical Secret Sharing},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {478--489},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274729},
  doi          = {10.1145/3274694.3274729},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WieseWM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuWLGCJ18,
  author       = {Yixiao Xu and
                  Tao Wang and
                  Qi Li and
                  Qingyuan Gong and
                  Yang Chen and
                  Yong Jiang},
  title        = {A Multi-tab Website Fingerprinting Attack},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {327--341},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274697},
  doi          = {10.1145/3274694.3274697},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XuWLGCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YeHCL0XWX18,
  author       = {Yanfang Ye and
                  Shifu Hou and
                  Lingwei Chen and
                  Xin Li and
                  Liang Zhao and
                  Shouhuai Xu and
                  Jiabin Wang and
                  Qi Xiong},
  title        = {{ICSD:} An Automatic System for Insecure Code Snippet Detection in
                  Stack Overflow over Heterogeneous Information Network},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {542--552},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274742},
  doi          = {10.1145/3274694.3274742},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YeHCL0XWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangZL18,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  title        = {Analyzing Cache Side Channels Using Deep Neural Networks},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {174--186},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274715},
  doi          = {10.1145/3274694.3274715},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhouTWWLZ18,
  author       = {Zhe Zhou and
                  Di Tang and
                  Wenhao Wang and
                  Xiaofeng Wang and
                  Zhou Li and
                  Kehuan Zhang},
  title        = {Beware of Your Screen: Anonymous Fingerprinting of Device Screens
                  for Off-line Payment Protection},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {77--88},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274721},
  doi          = {10.1145/3274694.3274721},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhouTWWLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZiegeldorfMW18,
  author       = {Jan Henrik Ziegeldorf and
                  Jan Metzke and
                  Klaus Wehrle},
  title        = {{SHIELD:} {A} Framework for Efficient and Secure Machine Learning
                  Classification in Constrained Environments},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {355--370},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274716},
  doi          = {10.1145/3274694.3274716},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZiegeldorfMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2018,
  title        = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694},
  doi          = {10.1145/3274694},
  isbn         = {978-1-4503-6569-7},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AbbasiHZE17,
  author       = {Ali Abbasi and
                  Thorsten Holz and
                  Emmanuele Zambon and
                  Sandro Etalle},
  title        = {{ECFI:} Asynchronous Control Flow Integrity for Programmable Logic
                  Controllers},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {437--448},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134618},
  doi          = {10.1145/3134600.3134618},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AbbasiHZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivDWK17,
  author       = {Adam J. Aviv and
                  John T. Davin and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Towards Baselines for Shoulder Surfing on Mobile Authentication},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {486--498},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134609},
  doi          = {10.1145/3134600.3134609},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivDWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AzimpourkiviTC17,
  author       = {Mozhgan Azimpourkivi and
                  Umut Topkara and
                  Bogdan Carbunar},
  title        = {A Secure Mobile Authentication Alternative to Biometrics},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {28--41},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134619},
  doi          = {10.1145/3134600.3134619},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AzimpourkiviTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BarronN17,
  author       = {Timothy Barron and
                  Nick Nikiforakis},
  title        = {Picky Attackers: Quantifying the Role of System Properties on Intruder
                  Behavior},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {387--398},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134614},
  doi          = {10.1145/3134600.3134614},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BarronN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BellafqiraCBQC17,
  author       = {Reda Bellafqira and
                  Gouenou Coatrieux and
                  Dalel Bouslimi and
                  Gwenol{\'{e}} Quellec and
                  Michel Cozic},
  title        = {Proxy Re-Encryption Based on Homomorphic Encryption},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {154--161},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134616},
  doi          = {10.1145/3134600.3134616},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BellafqiraCBQC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BianchiGFKV17,
  author       = {Antonio Bianchi and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public
                  Information},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {16--27},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134615},
  doi          = {10.1145/3134600.3134615},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BortolameottiEC17,
  author       = {Riccardo Bortolameotti and
                  Thijs van Ede and
                  Marco Caselli and
                  Maarten H. Everts and
                  Pieter H. Hartel and
                  Rick Hofstede and
                  Willem Jonker and
                  Andreas Peter},
  title        = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive
                  Application Fingerprinting},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {373--386},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134605},
  doi          = {10.1145/3134600.3134605},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BulckMP17,
  author       = {Jo Van Bulck and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens},
  title        = {VulCAN: Efficient Component Authentication and Software Isolation
                  for Automotive Control Networks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {225--237},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134623},
  doi          = {10.1145/3134600.3134623},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BulckMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoG17,
  author       = {Xiaoyu Cao and
                  Neil Zhenqiang Gong},
  title        = {Mitigating Evasion Attacks to Deep Neural Networks via Region-based
                  Classification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {278--287},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134606},
  doi          = {10.1145/3134600.3134606},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenDBJC17,
  author       = {Binbin Chen and
                  Xinshu Dong and
                  Guangdong Bai and
                  Sumeet Jauhar and
                  Yueqiang Cheng},
  title        = {Secure and Efficient Software-based Attestation for Industrial Control
                  Devices with {ARM} Processors},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {425--436},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134621},
  doi          = {10.1145/3134600.3134621},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenDBJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenHCGHR17,
  author       = {Shang{-}Tse Chen and
                  Yufei Han and
                  Duen Horng Chau and
                  Christopher S. Gates and
                  Michael Hart and
                  Kevin A. Roundy},
  title        = {Predicting Cyber Threats with Virtual Security Products},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {189--199},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134617},
  doi          = {10.1145/3134600.3134617},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenHCGHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenHY17,
  author       = {Lingwei Chen and
                  Shifu Hou and
                  Yanfang Ye},
  title        = {SecureDroid: Enhancing Security of Machine Learning-based Detection
                  against Adversarial Android Malware Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {362--372},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134636},
  doi          = {10.1145/3134600.3134636},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenLEAZ17,
  author       = {Haining Chen and
                  Ninghui Li and
                  William Enck and
                  Yousra Aafer and
                  Xiangyu Zhang},
  title        = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {553--565},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134638},
  doi          = {10.1145/3134600.3134638},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenLEAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChengTY17,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng (Daphne) Yao},
  title        = {Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against
                  Data-Oriented Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {315--326},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134640},
  doi          = {10.1145/3134600.3134640},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChengTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChevalierVPH17,
  author       = {Ronny Chevalier and
                  Maugan Villatel and
                  David Plaquin and
                  Guillaume Hiet},
  title        = {Co-processor-based Behavior Monitoring: Application to the Detection
                  of Attacks Against the System Management Mode},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {399--411},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134622},
  doi          = {10.1145/3134600.3134622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChevalierVPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DabrowskiUW17,
  author       = {Adrian Dabrowski and
                  Johanna Ullrich and
                  Edgar R. Weippl},
  title        = {Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The
                  Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {303--314},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134639},
  doi          = {10.1145/3134600.3134639},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DabrowskiUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DellAmicoBKEV17,
  author       = {Matteo Dell'Amico and
                  Leyla Bilge and
                  Ashwin Kumar Kayyoor and
                  Petros Efstathopoulos and
                  Pierre{-}Antoine Vervier},
  title        = {Lean On Me: Mining Internet Service Dependencies From Large-Scale
                  {DNS} Data},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {449--460},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134637},
  doi          = {10.1145/3134600.3134637},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DellAmicoBKEV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DengM17,
  author       = {Xiyue Deng and
                  Jelena Mirkovic},
  title        = {Commoner Privacy And {A} Study On Network Traces},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {566--576},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134602},
  doi          = {10.1145/3134600.3134602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DengM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GosainACA17,
  author       = {Devashish Gosain and
                  Anshika Agarwal and
                  Sambuddho Chakravarty and
                  Hrishikesh B. Acharya},
  title        = {The Devil's in The Details: Placing Decoy Routers in the Internet},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {577--589},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134608},
  doi          = {10.1145/3134600.3134608},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GosainACA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuanJCZLLLXX17,
  author       = {Le Guan and
                  Shijie Jia and
                  Bo Chen and
                  Fengwei Zhang and
                  Bo Luo and
                  Jingqiang Lin and
                  Peng Liu and
                  Xinyu Xing and
                  Luning Xia},
  title        = {Supporting Transparent Snapshot for Bare-metal Malware Analysis on
                  Mobile Devices},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {339--349},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134647},
  doi          = {10.1145/3134600.3134647},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuanJCZLLLXX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HusariAACN17,
  author       = {Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Mohiuddin Ahmed and
                  Bill Chu and
                  Xi Niu},
  title        = {TTPDrill: Automatic and Accurate Extraction of Threat Actions from
                  Unstructured Text of {CTI} Sources},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {103--115},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134646},
  doi          = {10.1145/3134600.3134646},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HusariAACN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jang0J17,
  author       = {Uyeong Jang and
                  Xi Wu and
                  Somesh Jha},
  title        = {Objective Metrics and Gradient Descent Algorithms for Adversarial
                  Examples in Machine Learning},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {262--277},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134635},
  doi          = {10.1145/3134600.3134635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jang0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JiangZAWCLG17,
  author       = {Jianyu Jiang and
                  Shixiong Zhao and
                  Danish Alsayed and
                  Yuexuan Wang and
                  Heming Cui and
                  Feng Liang and
                  Zhaoquan Gu},
  title        = {Kakute: {A} Precise, Unified Information Flow Analysis System for
                  Big-data Security},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134607},
  doi          = {10.1145/3134600.3134607},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JiangZAWCLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsonBS17,
  author       = {Peter C. Johnson and
                  Sergey Bratus and
                  Sean W. Smith},
  title        = {Protecting Against Malicious Bits On the Wire: Automatically Generating
                  a {USB} Protocol Parser for a Production Kernel},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {528--541},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134630},
  doi          = {10.1145/3134600.3134630},
  timestamp    = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsonBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimHHJ17,
  author       = {Jun Young Kim and
                  Ralph Holz and
                  Wen Hu and
                  Sanjay Jha},
  title        = {Automated Analysis of Secure Internet of Things Protocols},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {238--249},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134624},
  doi          = {10.1145/3134600.3134624},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KimHHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimKCKSZX17,
  author       = {Taegyu Kim and
                  Chung Hwan Kim and
                  Hongjun Choi and
                  Yonghwi Kwon and
                  Brendan Saltaformaggio and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {RevARM: {A} Platform-Agnostic {ARM} Binary Rewriter for Security Applications},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {412--424},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134627},
  doi          = {10.1145/3134600.3134627},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KimKCKSZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeeKK17,
  author       = {Hoyeon Lee and
                  Seungyeon Kim and
                  Taekyoung Kwon},
  title        = {Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent
                  Fingerprints and Smudges Remaining on Smartphones},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {512--527},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134643},
  doi          = {10.1145/3134600.3134643},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeeKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MirkovicKR17,
  author       = {Jelena Mirkovic and
                  Erik Kline and
                  Peter L. Reiher},
  title        = {{RESECT:} Self-Learning Traffic Filters for {IP} Spoofing Defense},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {474--485},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134644},
  doi          = {10.1145/3134600.3134644},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MirkovicKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NemecKSSM17,
  author       = {Mat{\'{u}}s Nemec and
                  Dusan Klinec and
                  Petr Svenda and
                  Peter Sekan and
                  Vashek Matyas},
  title        = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {162--175},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134612},
  doi          = {10.1145/3134600.3134612},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NemecKSSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OgasawaraK17,
  author       = {Junya Ogasawara and
                  Kenji Kono},
  title        = {Nioh: Hardening The Hypervisor by Filtering Illegal {I/O} Requests
                  to Virtual Devices},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {542--552},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134648},
  doi          = {10.1145/3134600.3134648},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OgasawaraK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PeetersHMGHH17,
  author       = {Roel Peeters and
                  Jens Hermans and
                  Pieter Maene and
                  Katri Grenman and
                  Kimmo Halunen and
                  Juha H{\"{a}}iki{\"{o}}},
  title        = {n-Auth: Mobile Authentication Done Right},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134613},
  doi          = {10.1145/3134600.3134613},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PeetersHMGHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyKDH17,
  author       = {Jannik Pewny and
                  Philipp Koppe and
                  Lucas Davi and
                  Thorsten Holz},
  title        = {Breaking and Fixing Destructive Code Read Defenses},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {55--67},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134626},
  doi          = {10.1145/3134600.3134626},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyKDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/QuachCP17,
  author       = {Anh Quach and
                  Matthew Cole and
                  Aravind Prakash},
  title        = {Supplementing Modern Software Defenses with Stack-Pointer Sanity},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {116--127},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134641},
  doi          = {10.1145/3134600.3134641},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/QuachCP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RoundyTSHKDS17,
  author       = {Kevin A. Roundy and
                  Acar Tamersoy and
                  Michael Spertus and
                  Michael Hart and
                  Daniel Kats and
                  Matteo Dell'Amico and
                  Robert Scott},
  title        = {Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {200--211},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134645},
  doi          = {10.1145/3134600.3134645},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RoundyTSHKDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SallsSSKV17,
  author       = {Christopher Salls and
                  Yan Shoshitaishvili and
                  Nick Stephens and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Piston: Uncooperative Remote Runtime Patching},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {141--153},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134611},
  doi          = {10.1145/3134600.3134611},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianSG17,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena and
                  Jesvin James George},
  title        = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study
                  of Remote Key-Fingerprint Verification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {499--511},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134610},
  doi          = {10.1145/3134600.3134610},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SkowyraGBLO17,
  author       = {Richard Skowyra and
                  Steven R. Gomez and
                  David Bigelow and
                  James Landry and
                  Hamed Okhravi},
  title        = {{QUASAR:} Quantitative Attack Space Analysis and Reasoning},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {68--78},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134633},
  doi          = {10.1145/3134600.3134633},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SkowyraGBLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SluganovicSDM17,
  author       = {Ivo Sluganovic and
                  Matej Serbec and
                  Ante Derek and
                  Ivan Martinovic},
  title        = {HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {250--261},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134625},
  doi          = {10.1145/3134600.3134625},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SluganovicSDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StoneCG17,
  author       = {Chris McMahon Stone and
                  Tom Chothia and
                  Flavio D. Garcia},
  title        = {Spinner: Semi-Automatic Detection of Pinning without Hostname Verification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {176--188},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134628},
  doi          = {10.1145/3134600.3134628},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StoneCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StringhiniSHZ17,
  author       = {Gianluca Stringhini and
                  Yun Shen and
                  Yufei Han and
                  Xiangliang Zhang},
  title        = {Marmite: Spreading Malicious File Reputation Through Download Graphs},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134604},
  doi          = {10.1145/3134600.3134604},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StringhiniSHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ThomasOCR17,
  author       = {Richard James Thomas and
                  Mihai Ordean and
                  Tom Chothia and
                  Joeri de Ruiter},
  title        = {{TRAKS:} {A} Universal Key Management Scheme for {ERTMS}},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {327--338},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134631},
  doi          = {10.1145/3134600.3134631},
  timestamp    = {Sun, 28 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ThomasOCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangZZY17,
  author       = {Xiaolei Wang and
                  Sencun Zhu and
                  Dehua Zhou and
                  Yuexiang Yang},
  title        = {Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated
                  Dynamic Analysis of Android Malware},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {350--361},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134601},
  doi          = {10.1145/3134600.3134601},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangZZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeidmanG17,
  author       = {Jake Weidman and
                  Jens Grossklags},
  title        = {I Like It, but {I} Hate It: Employee Perceptions Towards an Institutional
                  Transition to {BYOD} Second-Factor Authentication},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {212--224},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134629},
  doi          = {10.1145/3134600.3134629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeidmanG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeissbacherMSSR17,
  author       = {Michael Weissbacher and
                  Enrico Mariconti and
                  Guillermo Suarez{-}Tangil and
                  Gianluca Stringhini and
                  William K. Robertson and
                  Engin Kirda},
  title        = {Ex-Ray: Detection of History-Leaking Browser Extensions},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {590--602},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134632},
  doi          = {10.1145/3134600.3134632},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WeissbacherMSSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanSCX17,
  author       = {Hua Yan and
                  Yulei Sui and
                  Shiping Chen and
                  Jingling Xue},
  title        = {Machine-Learning-Guided Typestate Analysis for Static Use-After-Free
                  Detection},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {42--54},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134620},
  doi          = {10.1145/3134600.3134620},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YanSCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangK0G17,
  author       = {Wei Yang and
                  Deguang Kong and
                  Tao Xie and
                  Carl A. Gunter},
  title        = {Malware Detection in Adversarial Settings: Exploiting Feature Evolutions
                  and Confusions in Android Apps},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {288--302},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134642},
  doi          = {10.1145/3134600.3134642},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangK0G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YoonSPYKFOV17,
  author       = {Changhoon Yoon and
                  Seungwon Shin and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Heedo Kang and
                  Martin W. Fong and
                  Brian O'Connor and
                  Thomas Vachuska},
  title        = {A Security-Mode for Carrier-Grade {SDN} Controllers},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {461--473},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134603},
  doi          = {10.1145/3134600.3134603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YoonSPYKFOV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangPS17,
  author       = {Mingwei Zhang and
                  Michalis Polychronakis and
                  R. Sekar},
  title        = {Protecting {COTS} Binaries from Disclosure-guided Code Reuse Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {128--140},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134634},
  doi          = {10.1145/3134600.3134634},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2017,
  title        = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600},
  doi          = {10.1145/3134600},
  isbn         = {978-1-4503-5345-8},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AgadakosHDSP16,
  author       = {Ioannis Agadakos and
                  Per A. Hallgren and
                  Dimitrios Damopoulos and
                  Andrei Sabelfeld and
                  Georgios Portokalidis},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Location-enhanced authentication using the IoT: because you cannot
                  be in two places at once},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {251--264},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991090},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AgadakosHDSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Al-NaamiCMKLHT16,
  author       = {Khaled Al{-}Naami and
                  Swarup Chandra and
                  Ahmad Mustafa and
                  Latifur Khan and
                  Zhiqiang Lin and
                  Kevin W. Hamlen and
                  Bhavani Thuraisingham},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Adaptive encrypted traffic fingerprinting with bi-directional dependence},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {177--188},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991123},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Al-NaamiCMKLHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlShehriC16,
  author       = {Mohammad N. AlShehri and
                  Heather Crawford},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Using image saliency and regions of interest to encourage stronger
                  graphical passwords},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991108},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlShehriC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlacaO16,
  author       = {Furkan Alaca and
                  Paul C. van Oorschot},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Device fingerprinting for augmenting web authentication: classification
                  and analysis of methods},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {289--301},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991091},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlacaO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlgwilCLY16,
  author       = {Abdalnaser Algwil and
                  Dan Ciresan and
                  Bei{-}Bei Liu and
                  Jeff Yan},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {A security analysis of automated chinese turing tests},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {520--532},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991083},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlgwilCLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AllanBFPY16,
  author       = {Thomas Allan and
                  Billy Bob Brumley and
                  Katrina Falkner and
                  Joop van de Pol and
                  Yuval Yarom},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Amplifying side channels through performance degradation},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {422--435},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991084},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AllanBFPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlrwaisYALOWL16,
  author       = {Sumayah A. Alrwais and
                  Kan Yuan and
                  Eihal Alowaisheq and
                  Xiaojing Liao and
                  Alina Oprea and
                  XiaoFeng Wang and
                  Zhou Li},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Catching predators at watering holes: finding and understanding strategically
                  compromised websites},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {153--166},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991112},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlrwaisYALOWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ApplebaumMSKW16,
  author       = {Andy Applebaum and
                  Doug Miller and
                  Blake Strom and
                  Chris Korban and
                  Ross Wolf},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Intelligent, automated red team emulation},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {363--373},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991111},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ApplebaumMSKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BanescuCGNP16,
  author       = {Sebastian Banescu and
                  Christian S. Collberg and
                  Vijay Ganesh and
                  Zack Newsham and
                  Alexander Pretschner},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Code obfuscation against symbolic execution attacks},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {189--200},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991114},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BanescuCGNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BeaumontMM16,
  author       = {Mark R. Beaumont and
                  Jim McCarthy and
                  Toby C. Murray},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {The cross domain desktop compositor: using hardware-based video compositing
                  for a multi-level secure user interface},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {533--545},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991087},
  timestamp    = {Thu, 08 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BeaumontMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BortolameottiPE16,
  author       = {Riccardo Bortolameotti and
                  Andreas Peter and
                  Maarten H. Everts and
                  Willem Jonker and
                  Pieter H. Hartel},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Reliably determining data leakage in the presence of strong attackers},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {484--495},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991095},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BortolameottiPE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chang-FongE16,
  author       = {Nicholas Chang{-}Fong and
                  Aleksander Essex},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {The cloudier side of cryptographic end-to-end verifiable voting: a
                  security analysis of Helios},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {324--335},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991106},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Chang-FongE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenJXL16,
  author       = {Bo Chen and
                  Shijie Jia and
                  Luning Xia and
                  Peng Liu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Sanitizing data is not enough!: towards sanitizing structural artifacts
                  in flash media},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {496--507},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991101},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenJXL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16,
  author       = {Andrea Continella and
                  Alessandro Guagnelli and
                  Giovanni Zingaro and
                  Giulio De Pasquale and
                  Alessandro Barenghi and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {ShieldFS: a self-healing, ransomware-aware filesystem},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {336--347},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991110},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EtigowniTHZB16,
  author       = {Sriharsha Etigowni and
                  Dave (Jing) Tian and
                  Grant Hernandez and
                  Saman A. Zonouz and
                  Kevin R. B. Butler},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{CPAC:} securing critical infrastructure with cyber-physical access
                  control},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {139--152},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991126},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EtigowniTHZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FengS16,
  author       = {Huan Feng and
                  Kang G. Shin},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Understanding and defending the binder attack surface in Android},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {398--409},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991120},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FengS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HoangYG16,
  author       = {Thang Hoang and
                  Attila Altay Yavuz and
                  Jorge Guajardo},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Practical and secure dynamic searchable encryption via oblivious access
                  on distributed data structure},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {302--313},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991088},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HoangYG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HorschWE16,
  author       = {Julian Horsch and
                  Sascha Wessel and
                  Claudia Eckert},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {CoKey: fast token-based cooperative cryptography},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {314--323},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991117},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HorschWE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuangHML16,
  author       = {Wei Huang and
                  Zhen Huang and
                  Dhaval Miyani and
                  David Lie},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{LMP:} light-weighted memory protection with hardware assistance},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {460--470},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991089},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuangHML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InciIES16,
  author       = {Mehmet Sinan Inci and
                  Gorka Irazoqui and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Efficient, adversarial neighbor discovery using logical channels on
                  Microsoft Azure},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {436--447},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991113},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/InciIES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JansenTP16,
  author       = {Kai Jansen and
                  Nils Ole Tippenhauer and
                  Christina P{\"{o}}pper},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Multi-receiver {GPS} spoofing detection: error models and realization},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {237--250},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991092},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JansenTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarbabDDM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Cypider: building community-based cyber-defense infrastructure for
                  android malware detection},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {348--362},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991124},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarbabDDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimL016,
  author       = {Hyungsub Kim and
                  Sangho Lee and
                  Jong Kim},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Inferring browser activity and status through remote monitoring of
                  storage usage},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {410--421},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991080},
  timestamp    = {Thu, 08 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KimL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiZXJQH16,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Hai Jin and
                  Hanchao Qi and
                  Jie Hu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {VulPecker: an automated vulnerability detection system based on code
                  similarity analysis},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {201--213},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991102},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiZXJQH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MarinSGCWP16,
  author       = {Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Flavio D. Garcia and
                  Tom Chothia and
                  Rik Willems and
                  Bart Preneel},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {On the (in)security of the latest generation implantable cardiac defibrillators
                  and how to secure them},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {226--236},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991094},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MarinSGCWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MartinRB16,
  author       = {Jeremy Martin and
                  Erik C. Rye and
                  Robert Beverly},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Decomposition of {MAC} address structure for granular device inference},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {78--88},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991098},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MartinRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MatsumotoSP16,
  author       = {Stephanos Matsumoto and
                  Samuel Steffen and
                  Adrian Perrig},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{CASTLE:} {CA} signing in a touch-less environment},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {546--557},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991115},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MatsumotoSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MohamedS16,
  author       = {Manar Mohamed and
                  Nitesh Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Gametrics: towards attack-resilient behavioral authentication with
                  simple cognitive games},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {277--288},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991096},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MohamedS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NappaMTKC16,
  author       = {Antonio Nappa and
                  Rana Faisal Munir and
                  Irfan Khan Tanoli and
                  Christian Kreibich and
                  Juan Caballero},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {RevProbe: detecting silent reverse proxies in malicious server infrastructures},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991093},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NappaMTKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PeiGSM0ZSZX16,
  author       = {Kexin Pei and
                  Zhongshu Gu and
                  Brendan Saltaformaggio and
                  Shiqing Ma and
                  Fei Wang and
                  Zhiwei Zhang and
                  Luo Si and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{HERCULE:} attack story reconstruction via community discovery on
                  correlated log graph},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {583--595},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991122},
  timestamp    = {Thu, 05 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PeiGSM0ZSZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyH16,
  author       = {Jannik Pewny and
                  Thorsten Holz},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {EvilCoder: automated bug insertion},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {214--225},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991103},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SarbinowskiKGA16,
  author       = {Pawel Sarbinowski and
                  Vasileios P. Kemerlis and
                  Cristiano Giuffrida and
                  Elias Athanasopoulos},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {VTPin: practical VTable hijacking protection for binaries},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {448--459},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991121},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SarbinowskiKGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchearCMRR16,
  author       = {Nabil Schear and
                  Patrick T. Cable II and
                  Thomas M. Moyer and
                  Bryan Richard and
                  Robert Rudd},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Bootstrapping and maintaining trust in the cloud},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {65--77},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991104},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchearCMRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenTS16,
  author       = {Shiqi Shen and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Auror: defending against poisoning attacks in collaborative deep learning
                  systems},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {508--519},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991125},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShiWHF16,
  author       = {Yang Shi and
                  Wujing Wei and
                  Zongjian He and
                  Hongfei Fan},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {An ultra-lightweight white-box encryption scheme for securing resource-constrained
                  IoT devices},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {16--29},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991086},
  timestamp    = {Sun, 15 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ShiWHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShresthaMTS16,
  author       = {Babins Shrestha and
                  Manar Mohamed and
                  Sandeep Tamrakar and
                  Nitesh Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Theft-resilient mobile wallets: transparently authenticating {NFC}
                  users with tapping gesture biometrics},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {265--276},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991097},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShresthaMTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SommerAH16,
  author       = {Robin Sommer and
                  Johanna Amann and
                  Seth Hall},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Spicy: a unified deep packet inspection framework for safely dissecting
                  all your data},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {558--569},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991100},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SommerAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SonchackDASK16,
  author       = {John Sonchack and
                  Anurag Dubey and
                  Adam J. Aviv and
                  Jonathan M. Smith and
                  Eric Keller},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Timing-based reconnaissance and defense in software-defined networks},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991081},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SonchackDASK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunHZZ16,
  author       = {Pengfei Sun and
                  Rui Han and
                  Mingbo Zhang and
                  Saman A. Zonouz},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Trace-free memory data structure forensics via past inference and
                  future speculations},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {570--582},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991118},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunHZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunPGJ16,
  author       = {Yuqiong Sun and
                  Giuseppe Petracca and
                  Xinyang Ge and
                  Trent Jaeger},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Pileus: protecting user resources from vulnerable cloud services},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {52--64},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991109},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunPGJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TabriziP16,
  author       = {Farid Molazem Tabrizi and
                  Karthik Pattabiraman},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Formal security analysis of smart embedded systems},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991085},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TabriziP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ThaoO16,
  author       = {Tran Phuong Thao and
                  Kazumasa Omote},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{ELAR:} extremely lightweight auditing and repairing for cloud security},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {40--51},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991082},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ThaoO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TianCMCWT16,
  author       = {Yuan Tian and
                  Eric Yawei Chen and
                  Xiaojun Ma and
                  Shuo Chen and
                  Xiao Wang and
                  Patrick Tague},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Swords and shields: a study of mobile game hacks and existing defenses},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {386--397},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991119},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TianCMCWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TsankovPTVF16,
  author       = {Petar Tsankov and
                  Marco Pistoia and
                  Omer Tripp and
                  Martin T. Vechev and
                  Pietro Ferrara},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{FASE:} functionality-aware security enforcement},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {471--483},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991116},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TsankovPTVF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangZLG16,
  author       = {Hui Wang and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Dawu Gu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {The Achilles heel of OAuth: a multi-platform study of OAuth-based
                  authentication},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {167--176},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991105},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangZLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WooKAM16,
  author       = {Simon S. Woo and
                  Elsi Kaiser and
                  Ron Artstein and
                  Jelena Mirkovic},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Life-experience passwords (LEPs)},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {113--126},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991107},
  timestamp    = {Wed, 07 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WooKAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieZLW16,
  author       = {Zhen Xie and
                  Sencun Zhu and
                  Qing Li and
                  Wenjing Wang},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {You can promote, but you can't hide: large-scale abused app detection
                  in mobile app stores},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {374--385},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991099},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangHL16,
  author       = {Lei Yang and
                  Abdulmalik Humayed and
                  Fengjun Li},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {A multi-cloud based privacy-preserving data publishing scheme for
                  the internet of things},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {30--39},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991127},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YangHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2016,
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2991079},
  doi          = {10.1145/2991079},
  isbn         = {978-1-4503-4771-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlmeshekahGAS15,
  author       = {Mohammed H. Almeshekah and
                  Christopher N. Gutierrez and
                  Mikhail J. Atallah and
                  Eugene H. Spafford},
  title        = {ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {311--320},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818015},
  doi          = {10.1145/2818000.2818015},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AlmeshekahGAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivBK15,
  author       = {Adam J. Aviv and
                  Devon Budzitowski and
                  Ravi Kuber},
  title        = {Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4
                  Grid Sizes for Android's Pattern Unlock},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {301--310},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818014},
  doi          = {10.1145/2818000.2818014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BagciRMSH15,
  author       = {Ibrahim Ethem Bagci and
                  Utz Roedig and
                  Ivan Martinovic and
                  Matthias Schulz and
                  Matthias Hollick},
  title        = {Using Channel State Information for Tamper Detection in the Internet
                  of Things},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818028},
  doi          = {10.1145/2818000.2818028},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BagciRMSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BleikertzVGM15,
  author       = {S{\"{o}}ren Bleikertz and
                  Carsten Vogel and
                  Thomas Gro{\ss} and
                  Sebastian M{\"{o}}dersheim},
  title        = {Proactive Security Analysis of Changes in Virtualized Infrastructures},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818034},
  doi          = {10.1145/2818000.2818034},
  timestamp    = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BleikertzVGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BogaertsDLJ15,
  author       = {Jasper Bogaerts and
                  Maarten Decat and
                  Bert Lagaisse and
                  Wouter Joosen},
  title        = {Entity-Based Access Control: supporting more expressive access control
                  policies},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {291--300},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818009},
  doi          = {10.1145/2818000.2818009},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BogaertsDLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoG0X15,
  author       = {Chen Cao and
                  Neng Gao and
                  Peng Liu and
                  Ji Xiang},
  title        = {Towards Analyzing the Input Validation Vulnerabilities associated
                  with Android System Services},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {361--370},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818033},
  doi          = {10.1145/2818000.2818033},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoG0X15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChangWCZ15,
  author       = {Bing Chang and
                  Zhan Wang and
                  Bo Chen and
                  Fengwei Zhang},
  title        = {MobiPluto: File System Friendly Deniable Storage for Mobile Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {381--390},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818046},
  doi          = {10.1145/2818000.2818046},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChangWCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CojocarZVBFB15,
  author       = {Lucian Cojocar and
                  Jonas Zaddach and
                  Roel Verdult and
                  Herbert Bos and
                  Aur{\'{e}}lien Francillon and
                  Davide Balzarotti},
  title        = {{PIE:} Parser Identification in Embedded Systems},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {251--260},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818035},
  doi          = {10.1145/2818000.2818035},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CojocarZVBFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CokerMDGS15,
  author       = {Zack Coker and
                  Michael Maass and
                  Tianyuan Ding and
                  Claire {Le Goues} and
                  Joshua Sunshine},
  title        = {Evaluating the Flexibility of the Java Sandbox},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818003},
  doi          = {10.1145/2818000.2818003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CokerMDGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DecatLJ15,
  author       = {Maarten Decat and
                  Bert Lagaisse and
                  Wouter Joosen},
  title        = {Scalable and Secure Concurrent Evaluation of History-based Access
                  Control Policies},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {281--290},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818008},
  doi          = {10.1145/2818000.2818008},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DecatLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EdwardsHFE15,
  author       = {Benjamin Edwards and
                  Steven A. Hofmeyr and
                  Stephanie Forrest and
                  Michel van Eeten},
  title        = {Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {391--400},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818010},
  doi          = {10.1145/2818000.2818010},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EdwardsHFE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15,
  author       = {Luca Falsina and
                  Yanick Fratantonio and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Federico Maggi},
  title        = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android
                  Applications},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {201--210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818042},
  doi          = {10.1145/2818000.2818042},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FerraraTP15,
  author       = {Pietro Ferrara and
                  Omer Tripp and
                  Marco Pistoia},
  title        = {MorphDroid: Fine-grained Privacy Verification},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {371--380},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818037},
  doi          = {10.1145/2818000.2818037},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FerraraTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoMSZ15,
  author       = {Song Gao and
                  Manar Mohamed and
                  Nitesh Saxena and
                  Chengcui Zhang},
  title        = {Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver
                  Relay Attacks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818006},
  doi          = {10.1145/2818000.2818006},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoMSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GelernterGH15,
  author       = {Nethanel Gelernter and
                  Yoel Grinstein and
                  Amir Herzberg},
  title        = {Cross-Site Framing Attacks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818029},
  doi          = {10.1145/2818000.2818029},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GelernterGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GkaniatsouMBSFB15,
  author       = {Andriana Gkaniatsou and
                  Fiona McNeill and
                  Alan Bundy and
                  Graham Steel and
                  Riccardo Focardi and
                  Claudio Bozzato},
  title        = {Getting to know your Card: Reverse-Engineering the Smart-Card Application
                  Protocol Data Unit},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {441--450},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818020},
  doi          = {10.1145/2818000.2818020},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GkaniatsouMBSFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GotzfriedMCMFV15,
  author       = {Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Ruan de Clercq and
                  Pieter Maene and
                  Felix C. Freiling and
                  Ingrid Verbauwhede},
  title        = {Soteria: Offline Software Protection within Low-cost Embedded Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {241--250},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2856129},
  doi          = {10.1145/2818000.2856129},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GotzfriedMCMFV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HallerGAPB15,
  author       = {Istv{\'{a}}n Haller and
                  Enes G{\"{o}}ktas and
                  Elias Athanasopoulos and
                  Georgios Portokalidis and
                  Herbert Bos},
  title        = {ShrinkWrap: VTable Protection without Loose Ends},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {341--350},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818025},
  doi          = {10.1145/2818000.2818025},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HallerGAPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HupperichMKHG15,
  author       = {Thomas Hupperich and
                  Davide Maiorca and
                  Marc K{\"{u}}hrer and
                  Thorsten Holz and
                  Giorgio Giacinto},
  title        = {On the Robustness of Mobile Device Fingerprinting: Can Mobile Users
                  Escape Modern Web-Tracking Mechanisms?},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {191--200},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818032},
  doi          = {10.1145/2818000.2818032},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HupperichMKHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JiYWLLB15,
  author       = {Shouling Ji and
                  Shukun Yang and
                  Ting Wang and
                  Changchang Liu and
                  Wei{-}Han Lee and
                  Raheem A. Beyah},
  title        = {{PARS:} {A} Uniform and Open-source Password Analysis and Research
                  System},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818018},
  doi          = {10.1145/2818000.2818018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JiYWLLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KrentzM15,
  author       = {Konrad{-}Felix Krentz and
                  Christoph Meinel},
  title        = {Handling Reboots and Mobility in 802.15.4 Security},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {121--130},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818002},
  doi          = {10.1145/2818000.2818002},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KrentzM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiDP15,
  author       = {Letitia W. Li and
                  Guillaume Duc and
                  Renaud Pacalet},
  title        = {Hardware-assisted Memory Tracing on New SoCs Embedding {FPGA} Fabrics},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {461--470},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818030},
  doi          = {10.1145/2818000.2818030},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiHYG15,
  author       = {Tianlin Li and
                  Yaohui Hu and
                  Ping Yang and
                  Kartik Gopalan},
  title        = {Privacy-preserving Virtual Machine},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818044},
  doi          = {10.1145/2818000.2818044},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiHYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaLKRZX15,
  author       = {Shiqing Ma and
                  Kyu Hyung Lee and
                  Chung Hwan Kim and
                  Junghwan Rhee and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Accurate, Low Cost and Instrumentation-Free Security Audit Logging
                  for Windows},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {401--410},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818039},
  doi          = {10.1145/2818000.2818039},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MaLKRZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MastiMKSC15,
  author       = {Ramya Jayaram Masti and
                  Claudio Marforio and
                  Kari Kostiainen and
                  Claudio Soriente and
                  Srdjan Capkun},
  title        = {Logical Partitions on Many-Core Platforms},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {451--460},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818026},
  doi          = {10.1145/2818000.2818026},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MastiMKSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MayerV15,
  author       = {Peter Mayer and
                  Melanie Volkamer},
  title        = {Secure and Efficient Key Derivation in Portfolio Authentication Schemes
                  Using Blakley Secret Sharing},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {431--440},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818043},
  doi          = {10.1145/2818000.2818043},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MayerV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuttiBP15,
  author       = {Simone Mutti and
                  Enrico Bacis and
                  Stefano Paraboschi},
  title        = {SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android
                  databases},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {411--420},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818041},
  doi          = {10.1145/2818000.2818041},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MuttiBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15,
  author       = {Simone Mutti and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Luca Invernizzi and
                  Jacopo Corbetta and
                  Dhilung Kirat and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818036},
  doi          = {10.1145/2818000.2818036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PanticH15,
  author       = {Nick Pantic and
                  Mohammad Iftekhar Husain},
  title        = {Covert Botnet Command and Control Using Twitter},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {171--180},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818047},
  doi          = {10.1145/2818000.2818047},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PanticH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PetraccaSJA15,
  author       = {Giuseppe Petracca and
                  Yuqiong Sun and
                  Trent Jaeger and
                  Ahmad Atamli},
  title        = {AuDroid: Preventing Attacks on Audio Channels in Mobile Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {181--190},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818005},
  doi          = {10.1145/2818000.2818005},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PetraccaSJA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PetsiosKPK15,
  author       = {Theofilos Petsios and
                  Vasileios P. Kemerlis and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  title        = {DynaGuard: Armoring Canary-based Protections against Brute-force Attacks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {351--360},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818031},
  doi          = {10.1145/2818000.2818031},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PetsiosKPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PettaiL15,
  author       = {Martin Pettai and
                  Peeter Laud},
  title        = {Combining Differential Privacy and Secure Multiparty Computation},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {421--430},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818027},
  doi          = {10.1145/2818000.2818027},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PettaiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PrakashY15,
  author       = {Aravind Prakash and
                  Heng Yin},
  title        = {Defeating {ROP} Through Denial of Stack Pivot},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {111--120},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818023},
  doi          = {10.1145/2818000.2818023},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PrakashY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/QiaoZS15,
  author       = {Rui Qiao and
                  Mingwei Zhang and
                  R. Sekar},
  title        = {A Principled Approach for {ROP} Defense},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {101--110},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818021},
  doi          = {10.1145/2818000.2818021},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/QiaoZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RanganathanDC15,
  author       = {Aanjhan Ranganathan and
                  Boris Danev and
                  Srdjan Capkun},
  title        = {Proximity Verification for Contactless Access Control and Authentication
                  Systems},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {271--280},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818004},
  doi          = {10.1145/2818000.2818004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RanganathanDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RaykovaLKG15,
  author       = {Mariana Raykova and
                  Hasnain Lakhani and
                  Hasanat Kazmi and
                  Ashish Gehani},
  title        = {Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric
                  Networks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818001},
  doi          = {10.1145/2818000.2818001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RaykovaLKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RoyDLHCORLG15,
  author       = {Sankardas Roy and
                  Jordan DeLoach and
                  Yuping Li and
                  Nic Herndon and
                  Doina Caragea and
                  Xinming Ou and
                  Venkatesh Prasad Ranganath and
                  Hongmin Li and
                  Nicolais Guevara},
  title        = {Experimental Study with Real-world Data for Android App Security Analysis
                  using Machine Learning},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818038},
  doi          = {10.1145/2818000.2818038},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RoyDLHCORLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianS15,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {On the Security and Usability of Crypto Phones},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818007},
  doi          = {10.1145/2818000.2818007},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SzeS15,
  author       = {Wai{-}Kit Sze and
                  R. Sekar},
  title        = {Provenance-based Integrity Protection for Windows},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818011},
  doi          = {10.1145/2818000.2818011},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SzeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TianBB15,
  author       = {Jing (Dave) Tian and
                  Adam Bates and
                  Kevin R. B. Butler},
  title        = {Defending Against Malicious {USB} Firmware with GoodUSB},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {261--270},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818040},
  doi          = {10.1145/2818000.2818040},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TianBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TranPS15,
  author       = {Tung Tran and
                  Riccardo Pelizzi and
                  R. Sekar},
  title        = {JaTE: Transparent and Efficient JavaScript Confinement},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818019},
  doi          = {10.1145/2818000.2818019},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TranPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ValenteC15,
  author       = {Junia Valente and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Using Visual Challenges to Verify the Integrity of Security Cameras},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {141--150},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818045},
  doi          = {10.1145/2818000.2818045},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ValenteC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangYBSF15,
  author       = {Minghua Wang and
                  Heng Yin and
                  Abhishek Vasisht Bhaskar and
                  Purui Su and
                  Dengguo Feng},
  title        = {Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped
                  Binaries},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {331--340},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818017},
  doi          = {10.1145/2818000.2818017},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangYBSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangZLLYLG15,
  author       = {Hui Wang and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Hui Liu and
                  Wenbo Yang and
                  Bodong Li and
                  Dawu Gu},
  title        = {Vulnerability Assessment of OAuth Implementations in Android Applications},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818024},
  doi          = {10.1145/2818000.2818024},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangZLLYLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiYH15,
  author       = {Jinpeng Wei and
                  Lok K. Yan and
                  Muhammad Azizul Hakim},
  title        = {{MOSE:} Live Migration Based On-the-Fly Software Emulation},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {221--230},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818022},
  doi          = {10.1145/2818000.2818022},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZandHVKK15,
  author       = {Ali Zand and
                  Amir Houmansadr and
                  Giovanni Vigna and
                  Richard A. Kemmerer and
                  Christopher Kruegel},
  title        = {Know Your Achilles' Heel: Automatic Detection of Network Critical
                  Services},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818012},
  doi          = {10.1145/2818000.2818012},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZandHVKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangS15,
  author       = {Mingwei Zhang and
                  R. Sekar},
  title        = {Control Flow and Code Integrity for {COTS} binaries: An Effective
                  Defense Against Real-World {ROP} Attacks},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818016},
  doi          = {10.1145/2818000.2818016},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2015,
  title        = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2818000},
  isbn         = {978-1-4503-3682-6},
  timestamp    = {Tue, 15 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AltBD14,
  author       = {Lance Alt and
                  Robert Beverly and
                  Alberto Dainotti},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Uncovering network tarpits with degreaser},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {156--165},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664285},
  doi          = {10.1145/2664243.2664285},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AltBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivF14,
  author       = {Adam J. Aviv and
                  Dane Fichter},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Understanding visual perceptions of usability and security of Android's
                  graphical password pattern},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {286--295},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664253},
  doi          = {10.1145/2664243.2664253},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BackesBG14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Scippa: system-centric {IPC} provenance on Android},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {36--45},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664264},
  doi          = {10.1145/2664243.2664264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BackesBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BackesBGS14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Android security framework: extensible multi-layered access control
                  on Android},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664265},
  doi          = {10.1145/2664243.2664265},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BackesBGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BalduzziPW14,
  author       = {Marco Balduzzi and
                  Alessandro Pasta and
                  Kyle Wilhoit},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {A security evaluation of {AIS} automated identification system},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {436--445},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664257},
  doi          = {10.1145/2664243.2664257},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BalduzziPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BarretoCQM14,
  author       = {Carlos A. Barreto and
                  Alvaro A. C{\'{a}}rdenas and
                  Nicanor Quijano and
                  Eduardo Mojica{-}Nava},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{CPS:} market analysis of attacks against demand response in the smart
                  grid},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {136--145},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664284},
  doi          = {10.1145/2664243.2664284},
  timestamp    = {Tue, 01 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BarretoCQM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BiedermannKS14,
  author       = {Sebastian Biedermann and
                  Stefan Katzenbeisser and
                  Jakub Szefer},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Hot-hardening: getting more out of your security settings},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {6--15},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664246},
  doi          = {10.1145/2664243.2664246},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BiedermannKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BleikertzVG14,
  author       = {S{\"{o}}ren Bleikertz and
                  Carsten Vogel and
                  Thomas Gro{\ss}},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Cloud radar: near real-time detection of security failures in dynamic
                  virtualized infrastructures},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {26--35},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664274},
  doi          = {10.1145/2664243.2664274},
  timestamp    = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BleikertzVG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoPCZ14,
  author       = {Yinzhi Cao and
                  Xiang Pan and
                  Yan Chen and
                  Jianwei Zhuge},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {JShield: towards real-time and vulnerability-based detection of polluted
                  drive-by download attacks},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {466--475},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664256},
  doi          = {10.1145/2664243.2664256},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoPCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CarnavaletM14,
  author       = {Xavier de Carn{\'{e}} de Carnavalet and
                  Mohammad Mannan},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Challenges and implications of verifiable builds for security-critical
                  open-source software},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {16--25},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664288},
  doi          = {10.1145/2664243.2664288},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CarnavaletM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CarterLT14,
  author       = {Henry Carter and
                  Charles Lever and
                  Patrick Traynor},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Whitewash: outsourcing garbled circuit generation for mobile devices},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {266--275},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664255},
  doi          = {10.1145/2664243.2664255},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CarterLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DabrowskiPKMW14,
  author       = {Adrian Dabrowski and
                  Nicola Pianta and
                  Thomas Klepp and
                  Martin Mulazzani and
                  Edgar R. Weippl},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {IMSI-catch me if you can: IMSI-catcher-catchers},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {246--255},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664272},
  doi          = {10.1145/2664243.2664272},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DabrowskiPKMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DavidsonFL14,
  author       = {Drew Davidson and
                  Matt Fredrikson and
                  Benjamin Livshits},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {MoRePriv: mobile {OS} support for application personalization and
                  privacy},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {236--245},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664266},
  doi          = {10.1145/2664243.2664266},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DavidsonFL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DenningKFRGK14,
  author       = {Tamara Denning and
                  Daniel B. Kramer and
                  Batya Friedman and
                  Matthew R. Reynolds and
                  Brian T. Gill and
                  Tadayoshi Kohno},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{CPS:} beyond usability: applying value sensitive design based methods
                  to investigate domain characteristics for security for implantable
                  cardiac devices},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {426--435},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664289},
  doi          = {10.1145/2664243.2664289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DenningKFRGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DumanOURK14,
  author       = {Sevtap Duman and
                  Kaan Onarlioglu and
                  Ali Osman Ulusoy and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {TrueClick: automatically distinguishing trick banners from genuine
                  download links},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {456--465},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664279},
  doi          = {10.1145/2664243.2664279},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DumanOURK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EignerMPPK14,
  author       = {Fabienne Eigner and
                  Matteo Maffei and
                  Ivan Pryvalov and
                  Francesca Pampaloni and
                  Aniket Kate},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Differentially private data aggregation with optimal utility},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {316--325},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664263},
  doi          = {10.1145/2664243.2664263},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EignerMPPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FengPYL14,
  author       = {Qian Feng and
                  Aravind Prakash and
                  Heng Yin and
                  Zhiqiang Lin},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{MACE:} high-coverage and robust memory analysis for commodity operating
                  systems},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {196--205},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664248},
  doi          = {10.1145/2664243.2664248},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FengPYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoYBCDLC14,
  author       = {Hongyu Gao and
                  Yi Yang and
                  Kai Bu and
                  Yan Chen and
                  Doug Downey and
                  Kathy Lee and
                  Alok N. Choudhary},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Spam ain't as diverse as it seems: throttling {OSN} spam with templates
                  underneath},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {76--85},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664251},
  doi          = {10.1145/2664243.2664251},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoYBCDLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GawlikH14,
  author       = {Robert Gawlik and
                  Thorsten Holz},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Towards automated integrity protection of {C++} virtual function tables
                  in binary programs},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {396--405},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664249},
  doi          = {10.1145/2664243.2664249},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GawlikH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GervaisCKG14,
  author       = {Arthur Gervais and
                  Srdjan Capkun and
                  Ghassan O. Karame and
                  Damian Gruber},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {On the privacy provisions of Bloom filters in lightweight bitcoin
                  clients},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {326--335},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664267},
  doi          = {10.1145/2664243.2664267},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GervaisCKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GiontaAENZ14,
  author       = {Jason Gionta and
                  Ahmed M. Azab and
                  William Enck and
                  Peng Ning and
                  Xiaolan Zhang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{SEER:} practical memory virus scanning as a service},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {186--195},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664271},
  doi          = {10.1145/2664243.2664271},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GiontaAENZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GroefMP14,
  author       = {Willem De Groef and
                  Fabio Massacci and
                  Frank Piessens},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {NodeSentry: least-privilege library integration for server-side JavaScript},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {446--455},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664276},
  doi          = {10.1145/2664243.2664276},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GroefMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HadziosmanovicSZH14,
  author       = {Dina Hadziosmanovic and
                  Robin Sommer and
                  Emmanuele Zambon and
                  Pieter H. Hartel},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Through the eye of the {PLC:} semantic security monitoring for industrial
                  processes},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {126--135},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664277},
  doi          = {10.1145/2664243.2664277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HadziosmanovicSZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HanMCZ14,
  author       = {Rui Han and
                  Alejandro Mesa and
                  Mihai Christodorescu and
                  Saman A. Zonouz},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {TroGuard: context-aware protection against web-based socially engineered
                  trojans},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {66--75},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664270},
  doi          = {10.1145/2664243.2664270},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HanMCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HerzbergS14,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{DNS} authentication as a service: preventing amplification attacks},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {356--365},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664281},
  doi          = {10.1145/2664243.2664281},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HerzbergS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HerzbergSC14,
  author       = {Amir Herzberg and
                  Haya Schulmann and
                  Bruno Crispo},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Less is more: cipher-suite negotiation for {DNSSEC}},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {346--355},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664283},
  doi          = {10.1145/2664243.2664283},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HerzbergSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JingZAH14,
  author       = {Yiming Jing and
                  Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Morpheus: automatically generating heuristics to detect Android emulators},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {216--225},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664250},
  doi          = {10.1145/2664243.2664250},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JingZAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimLK14,
  author       = {Hyungsub Kim and
                  Sangho Lee and
                  Jong Kim},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Exploring and mitigating privacy threats of {HTML5} geolocation {API}},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {306--315},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664247},
  doi          = {10.1145/2664243.2664247},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KimLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KrotofilCML14,
  author       = {Marina Krotofil and
                  Alvaro A. C{\'{a}}rdenas and
                  Bradley Manning and
                  Jason Larsen},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{CPS:} driving cyber-physical systems to unsafe operating conditions
                  by timing DoS attacks on sensor signals},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {146--155},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664290},
  doi          = {10.1145/2664243.2664290},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KrotofilCML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LengyelMPWVK14,
  author       = {Tamas K. Lengyel and
                  Steve Maresca and
                  Bryan D. Payne and
                  George D. Webster and
                  Sebastian Vogl and
                  Aggelos Kiayias},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Scalability, fidelity and stealth in the {DRAKVUF} dynamic malware
                  analysis system},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {386--395},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664252},
  doi          = {10.1145/2664243.2664252},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LengyelMPWVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaoCGT14,
  author       = {Weixuan Mao and
                  Zhongmin Cai and
                  Xiaohong Guan and
                  Don Towsley},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Centrality metrics of importance in access behaviors and malware detections},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {376--385},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664286},
  doi          = {10.1145/2664243.2664286},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MaoCGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MeutznerNHK14,
  author       = {Hendrik Meutzner and
                  Viet{-}Hung Nguyen and
                  Thorsten Holz and
                  Dorothea Kolossa},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Using automatic speech recognition for attacking acoustic CAPTCHAs:
                  the trade-off between usability and security},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {276--285},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664262},
  doi          = {10.1145/2664243.2664262},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MeutznerNHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NakiblySMWE14,
  author       = {Gabi Nakibly and
                  Adi Sosnovich and
                  Eitan Menahem and
                  Ariel Waizel and
                  Yuval Elovici},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{OSPF} vulnerability to persistent poisoning attacks: a systematic
                  analysis},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {336--345},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664278},
  doi          = {10.1145/2664243.2664278},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NakiblySMWE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OliveiraRMYCZ14,
  author       = {Daniela Oliveira and
                  Marissa Rosenthal and
                  Nicole Morin and
                  Kuo{-}Chuan (Martin) Yeh and
                  Justin Cappos and
                  Yanyan Zhuang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {It's the psychology stupid: how heuristics explain software vulnerabilities
                  and how priming can illuminate developer's blind spots},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {296--305},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664254},
  doi          = {10.1145/2664243.2664254},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/OliveiraRMYCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnySBHR14,
  author       = {Jannik Pewny and
                  Felix Schuster and
                  Lukas Bernhard and
                  Thorsten Holz and
                  Christian Rossow},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Leveraging semantic signatures for bug search in binary programs},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {406--415},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664269},
  doi          = {10.1145/2664243.2664269},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnySBHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PomonisPJPK14,
  author       = {Marios Pomonis and
                  Theofilos Petsios and
                  Kangkook Jee and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {IntFlow: improving the accuracy of arithmetic error detection using
                  information flow tracking},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {416--425},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664282},
  doi          = {10.1145/2664243.2664282},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PomonisPJPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RafiqueCHJ14,
  author       = {M. Zubair Rafique and
                  Juan Caballero and
                  Christophe Huygens and
                  Wouter Joosen},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Network dialog minimization and network dialog diffing: two novel
                  primitives for network security applications},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {166--175},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664261},
  doi          = {10.1145/2664243.2664261},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RafiqueCHJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RitzdorfKC14,
  author       = {Hubert Ritzdorf and
                  Nikolaos Karapanos and
                  Srdjan Capkun},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Assisted deletion of related content},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {206--215},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664287},
  doi          = {10.1145/2664243.2664287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RitzdorfKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Rubin14,
  author       = {Aviel D. Rubin},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Taking two-factor to the next level: protecting online poker, banking,
                  healthcare and other applications},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2684461},
  doi          = {10.1145/2664243.2684461},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Rubin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShaoLQZ014,
  author       = {Yuru Shao and
                  Xiapu Luo and
                  Chenxiong Qian and
                  Pengfei Zhu and
                  Lei Zhang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Towards a scalable resource-driven approach for detecting repackaged
                  Android applications},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {56--65},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664275},
  doi          = {10.1145/2664243.2664275},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShaoLQZ014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SlankasXWX14,
  author       = {John Slankas and
                  Xusheng Xiao and
                  Laurie A. Williams and
                  Tao Xie},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Relation extraction for inferring access control rules from natural
                  language artifacts},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {366--375},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664280},
  doi          = {10.1145/2664243.2664280},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SlankasXWX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Strackx0P14,
  author       = {Raoul Strackx and
                  Bart Jacobs and
                  Frank Piessens},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{ICE:} a passive, high-speed, state-continuity scheme},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {106--115},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664259},
  doi          = {10.1145/2664243.2664259},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Strackx0P14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunZLJ14,
  author       = {Mingshen Sun and
                  Min Zheng and
                  John C. S. Lui and
                  Xuxian Jiang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Design and implementation of an Android host-based intrusion prevention
                  system},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {226--235},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664245},
  doi          = {10.1145/2664243.2664245},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunZLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TanBG14,
  author       = {Samuel Junjie Tan and
                  Sergey Bratus and
                  Travis Goodspeed},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring
                  embedded systems firmware},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {116--125},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664268},
  doi          = {10.1145/2664243.2664268},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TanBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TangWLHJ14,
  author       = {Yuzhe Richard Tang and
                  Ting Wang and
                  Ling Liu and
                  Xin Hu and
                  Jiyong Jang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Lightweight authentication of freshness in outsourced key-value stores},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {176--185},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664244},
  doi          = {10.1145/2664243.2664244},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TangWLHJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VanhoefP14,
  author       = {Mathy Vanhoef and
                  Frank Piessens},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Advanced Wi-Fi attacks using commodity hardware},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {256--265},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664260},
  doi          = {10.1145/2664243.2664260},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/VanhoefP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZG14,
  author       = {Chao Yang and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {A taste of tweets: reverse engineering Twitter spammers},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664258},
  doi          = {10.1145/2664243.2664258},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangL14,
  author       = {Tianwei Zhang and
                  Ruby B. Lee},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {New models of cache architectures characterizing information leakage
                  from cache side channels},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {96--105},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664273},
  doi          = {10.1145/2664243.2664273},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2014,
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2664243},
  isbn         = {978-1-4503-3005-3},
  timestamp    = {Sat, 06 Dec 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AkpulatBC13,
  author       = {Murat Akpulat and
                  Kemal Bicakci and
                  Ugur Cil},
  editor       = {Charles N. Payne Jr.},
  title        = {Revisiting graphical passwords for augmenting, not replacing, text
                  passwords},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523672},
  doi          = {10.1145/2523649.2523672},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AkpulatBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AmannSVH13,
  author       = {B. Amann and
                  Robin Sommer and
                  Matthias Vallentin and
                  Seth Hall},
  editor       = {Charles N. Payne Jr.},
  title        = {No attack necessary: the surprising dynamics of {SSL} trust relationships},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523665},
  doi          = {10.1145/2523649.2523665},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AmannSVH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BoggsWMCP13,
  author       = {Nathaniel Boggs and
                  Wei Wang and
                  Suhas Mathur and
                  Baris Coskun and
                  Carol Pincock},
  editor       = {Charles N. Payne Jr.},
  title        = {Discovery of emergent malicious campaigns in cellular networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523657},
  doi          = {10.1145/2523649.2523657},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BoggsWMCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BonettiVFMZ13,
  author       = {Gabriele Bonetti and
                  Marco Viglione and
                  Alessandro Frossi and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Charles N. Payne Jr.},
  title        = {A comprehensive black-box methodology for testing the forensic characteristics
                  of solid-state drives},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {269--278},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523660},
  doi          = {10.1145/2523649.2523660},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BonettiVFMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DengZX13,
  author       = {Zhui Deng and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Charles N. Payne Jr.},
  title        = {{SPIDER:} stealthy binary program instrumentation and debugging via
                  hardware virtualization},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {289--298},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523675},
  doi          = {10.1145/2523649.2523675},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DengZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FuLH13,
  author       = {Yangchun Fu and
                  Zhiqiang Lin and
                  Kevin W. Hamlen},
  editor       = {Charles N. Payne Jr.},
  title        = {Subverting system authentication with context-aware, reactive virtual
                  machine introspection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523664},
  doi          = {10.1145/2523649.2523664},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FuLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GarmanyM13,
  author       = {Behrad Garmany and
                  Tilo M{\"{u}}ller},
  editor       = {Charles N. Payne Jr.},
  title        = {{PRIME:} private {RSA} infrastructure for memory-less encryption},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523656},
  doi          = {10.1145/2523649.2523656},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GarmanyM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GauthierLM13,
  author       = {Fran{\c{c}}ois Gauthier and
                  Thierry Lavoie and
                  Ettore Merlo},
  editor       = {Charles N. Payne Jr.},
  title        = {Uncovering access control weaknesses and flaws with security-discordant
                  software clones},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {209--218},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523650},
  doi          = {10.1145/2523649.2523650},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GauthierLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GerdesWH13,
  author       = {Ryan M. Gerdes and
                  Chris Winstead and
                  Kevin P. Heaslip},
  editor       = {Charles N. Payne Jr.},
  title        = {{CPS:} an efficiency-motivated attack against autonomous vehicular
                  transportation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523658},
  doi          = {10.1145/2523649.2523658},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GerdesWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HerzbergS13,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  editor       = {Charles N. Payne Jr.},
  title        = {Socket overloading for fun and cache-poisoning},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {189--198},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523662},
  doi          = {10.1145/2523649.2523662},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HerzbergS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuS13,
  author       = {Xin Hu and
                  Kang G. Shin},
  editor       = {Charles N. Payne Jr.},
  title        = {{DUET:} integration of dynamic and static analyses for malware clustering
                  with cluster ensembles},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523677},
  doi          = {10.1145/2523649.2523677},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HustedMSG13,
  author       = {Nathaniel Husted and
                  Steven A. Myers and
                  Abhi Shelat and
                  Paul Grubbs},
  editor       = {Charles N. Payne Jr.},
  title        = {{GPU} and {CPU} parallelization of honest-but-curious secure two-party
                  computation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523681},
  doi          = {10.1145/2523649.2523681},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HustedMSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InvernizziKV13,
  author       = {Luca Invernizzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Charles N. Payne Jr.},
  title        = {Message in a bottle: sailing past censorship},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523654},
  doi          = {10.1145/2523649.2523654},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiratNVM13,
  author       = {Dhilung Kirat and
                  Lakshmanan Nataraj and
                  Giovanni Vigna and
                  B. S. Manjunath},
  editor       = {Charles N. Payne Jr.},
  title        = {SigMal: a static signal processing based malware triage},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523682},
  doi          = {10.1145/2523649.2523682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiratNVM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Landwehr13,
  author       = {Carl E. Landwehr},
  editor       = {Charles N. Payne Jr.},
  title        = {A building code for building code: putting what we know works to work},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {139--147},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2530278},
  doi          = {10.1145/2523649.2530278},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Landwehr13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LangeL13,
  author       = {Matthias Lange and
                  Steffen Liebergeld},
  editor       = {Charles N. Payne Jr.},
  title        = {Crossover: secure and usable user interface for mobile devices with
                  multiple isolated {OS} personalities},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {249--257},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523667},
  doi          = {10.1145/2523649.2523667},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LangeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiZBYL13,
  author       = {Min Li and
                  Wanyu Zang and
                  Kun Bai and
                  Meng Yu and
                  Peng Liu},
  editor       = {Charles N. Payne Jr.},
  title        = {MyCloud: supporting user-configured privacy protection in cloud computing},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523680},
  doi          = {10.1145/2523649.2523680},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiZBYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McLaughlin13,
  author       = {Stephen E. McLaughlin},
  editor       = {Charles N. Payne Jr.},
  title        = {{CPS:} stateful policy enforcement for control system device usage},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523673},
  doi          = {10.1145/2523649.2523673},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McLaughlin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerORK13,
  author       = {Collin Mulliner and
                  Jon Oberheide and
                  William K. Robertson and
                  Engin Kirda},
  editor       = {Charles N. Payne Jr.},
  title        = {PatchDroid: scalable third-party security patches for Android devices},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523679},
  doi          = {10.1145/2523649.2523679},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MullinerORK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MundadaRF13,
  author       = {Yogesh Mundada and
                  Anirudh Ramachandran and
                  Nick Feamster},
  editor       = {Charles N. Payne Jr.},
  title        = {SilverLine: preventing data leaks from compromised web applications},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {329--338},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523663},
  doi          = {10.1145/2523649.2523663},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MundadaRF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NagyCDAS13,
  author       = {Marcin Nagy and
                  Emiliano De Cristofaro and
                  Alexandra Dmitrienko and
                  N. Asokan and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Charles N. Payne Jr.},
  title        = {Do {I} know you?: efficient and privacy-preserving common friend-finder
                  protocols and applications},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {159--168},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523668},
  doi          = {10.1145/2523649.2523668},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NagyCDAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PalahanBCK13,
  author       = {Sirinda Palahan and
                  Domagoj Babic and
                  Swarat Chaudhuri and
                  Daniel Kifer},
  editor       = {Charles N. Payne Jr.},
  title        = {Extraction of statistically significant malware behaviors},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523659},
  doi          = {10.1145/2523649.2523659},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PalahanBCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PapadopoulosPPZHM13,
  author       = {Panagiotis Papadopoulos and
                  Antonis Papadogiannakis and
                  Michalis Polychronakis and
                  Apostolis Zarras and
                  Thorsten Holz and
                  Evangelos P. Markatos},
  editor       = {Charles N. Payne Jr.},
  title        = {k-subscription: privacy-preserving microblogging browsing through
                  obfuscation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523671},
  doi          = {10.1145/2523649.2523671},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PapadopoulosPPZHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyH13,
  author       = {Jannik Pewny and
                  Thorsten Holz},
  editor       = {Charles N. Payne Jr.},
  title        = {Control-flow restrictor: compiler-based {CFI} for iOS},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {309--318},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523674},
  doi          = {10.1145/2523649.2523674},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PolakisVAM13,
  author       = {Iasonas Polakis and
                  Stamatis Volanis and
                  Elias Athanasopoulos and
                  Evangelos P. Markatos},
  editor       = {Charles N. Payne Jr.},
  title        = {The man who \emph{was} there: validating check-ins in location-based
                  services},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523653},
  doi          = {10.1145/2523649.2523653},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PolakisVAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RahmanTC13,
  author       = {Mahmudur Rahman and
                  Umut Topkara and
                  Bogdan Carbunar},
  editor       = {Charles N. Payne Jr.},
  title        = {Seeing is not believing: visual verifications through liveness analysis
                  using mobile devices},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523666},
  doi          = {10.1145/2523649.2523666},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RahmanTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RohrerZCZ13,
  author       = {Felix Rohrer and
                  Yuting Zhang and
                  Lou Chitkushev and
                  Tanya Zlateva},
  editor       = {Charles N. Payne Jr.},
  title        = {{DR} {BACA:} dynamic role based access control for Android},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {299--308},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523676},
  doi          = {10.1145/2523649.2523676},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RohrerZCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RusselloJNM13,
  author       = {Giovanni Russello and
                  Arturo Blas Jimenez and
                  Habib Naderi and
                  Wannes van der Mark},
  editor       = {Charles N. Payne Jr.},
  title        = {FireDroid: hardening security in almost-stock Android},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {319--328},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523678},
  doi          = {10.1145/2523649.2523678},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RusselloJNM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchmidtJ13,
  author       = {David Schmidt and
                  Trent Jaeger},
  editor       = {Charles N. Payne Jr.},
  title        = {Pitfalls in the automated strengthening of passwords},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523651},
  doi          = {10.1145/2523649.2523651},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchmidtJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SzeS13,
  author       = {Wai{-}Kit Sze and
                  R. Sekar},
  editor       = {Charles N. Payne Jr.},
  title        = {A portable user-level approach for system-wide integrity protection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {219--228},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523655},
  doi          = {10.1145/2523649.2523655},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SzeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WilberdingYSZ13,
  author       = {Jordan Wilberding and
                  Andrew Yates and
                  Micah Sherr and
                  Wenchao Zhou},
  editor       = {Charles N. Payne Jr.},
  title        = {Validating web content with senser},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {339--348},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523669},
  doi          = {10.1145/2523649.2523669},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WilberdingYSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YenOOLRJK13,
  author       = {Ting{-}Fang Yen and
                  Alina Oprea and
                  Kaan Onarlioglu and
                  Todd Leetham and
                  William K. Robertson and
                  Ari Juels and
                  Engin Kirda},
  editor       = {Charles N. Payne Jr.},
  title        = {Beehive: large-scale log analysis for detecting suspicious activity
                  in enterprise networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {199--208},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523670},
  doi          = {10.1145/2523649.2523670},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YenOOLRJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YoungL13,
  author       = {William Young and
                  Nancy G. Leveson},
  editor       = {Charles N. Payne Jr.},
  title        = {Systems thinking for safety and security},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2530277},
  doi          = {10.1145/2523649.2530277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YoungL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZaddachKBBFGGK13,
  author       = {Jonas Zaddach and
                  Anil Kurmus and
                  Davide Balzarotti and
                  Erik{-}Oliver Blass and
                  Aur{\'{e}}lien Francillon and
                  Travis Goodspeed and
                  Moitrayee Gupta and
                  Ioannis Koltsidas},
  editor       = {Charles N. Payne Jr.},
  title        = {Implementation and implications of a stealth hard-drive backdoor},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {279--288},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523661},
  doi          = {10.1145/2523649.2523661},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZaddachKBBFGGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangAD13,
  author       = {Xiao Zhang and
                  Amit Ahlawat and
                  Wenliang Du},
  editor       = {Charles N. Payne Jr.},
  title        = {AFrame: isolating advertisements from mobile applications in Android},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523652},
  doi          = {10.1145/2523649.2523652},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangAD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZohrevandiB13,
  author       = {Mohsen Zohrevandi and
                  Rida A. Bazzi},
  editor       = {Charles N. Payne Jr.},
  title        = {Auto-FBI: a user-friendly approach for secure access to sensitive
                  content on the web},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {349--358},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523683},
  doi          = {10.1145/2523649.2523683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZohrevandiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2013,
  editor       = {Charles N. Payne Jr.},
  title        = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2523649},
  isbn         = {978-1-4503-2015-3},
  timestamp    = {Wed, 08 Jan 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AgtenABPDP12,
  author       = {Pieter Agten and
                  Steven {Van Acker} and
                  Yoran Brondsema and
                  Phu H. Phung and
                  Lieven Desmet and
                  Frank Piessens},
  editor       = {Robert H'obbes' Zakon},
  title        = {JSand: complete client-side sandboxing of third-party JavaScript without
                  browser modifications},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420952},
  doi          = {10.1145/2420950.2420952},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AgtenABPDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Alexander12,
  author       = {Susan D. Alexander},
  editor       = {Robert H'obbes' Zakon},
  title        = {Trust engineering: rejecting the tyranny of the weakest link},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {145--148},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420973},
  doi          = {10.1145/2420950.2420973},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Alexander12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlrwaisGDSGO12,
  author       = {Sumayah A. Alrwais and
                  Alexandre Gerber and
                  Christopher W. Dunn and
                  Oliver Spatscheck and
                  Minaxi Gupta and
                  Eric Osterweil},
  editor       = {Robert H'obbes' Zakon},
  title        = {Dissecting ghost clicks: ad fraud via misdirected human clicks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420954},
  doi          = {10.1145/2420950.2420954},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlrwaisGDSGO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Anderson12,
  author       = {Ross J. Anderson},
  editor       = {Robert H'obbes' Zakon},
  title        = {Security economics: a personal perspective},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420971},
  doi          = {10.1145/2420950.2420971},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Anderson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivSBS12,
  author       = {Adam J. Aviv and
                  Benjamin Sapp and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Robert H'obbes' Zakon},
  title        = {Practicality of accelerometer side channels on smartphones},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420957},
  doi          = {10.1145/2420950.2420957},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BilgeBRKK12,
  author       = {Leyla Bilge and
                  Davide Balzarotti and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon},
  title        = {Disclosure: detecting botnet command and control servers through large-scale
                  NetFlow analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420969},
  doi          = {10.1145/2420950.2420969},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BilgeBRKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BlassR12,
  author       = {Erik{-}Oliver Blass and
                  William Robertson},
  editor       = {Robert H'obbes' Zakon},
  title        = {{TRESOR-HUNT:} attacking CPU-bound encryption},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {71--78},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420961},
  doi          = {10.1145/2420950.2420961},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BlassR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CollbergMMN12,
  author       = {Christian S. Collberg and
                  Sam Martin and
                  Jonathan Myers and
                  Jasvir Nagra},
  editor       = {Robert H'obbes' Zakon},
  title        = {Distributed application tamper detection via continuous software updates},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {319--328},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420997},
  doi          = {10.1145/2420950.2420997},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CollbergMMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DangZGCQX12,
  author       = {Yingnong Dang and
                  Dongmei Zhang and
                  Song Ge and
                  Chengyun Chu and
                  Yingjun Qiu and
                  Tao Xie},
  editor       = {Robert H'obbes' Zakon},
  title        = {{XIAO:} tuning code clones at hands of engineers in practice},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {369--378},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421004},
  doi          = {10.1145/2420950.2421004},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DangZGCQX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DiesburgMSMMGWK12,
  author       = {Sarah M. Diesburg and
                  Christopher R. Meyers and
                  Mark J. Stanovich and
                  Michael Mitchell and
                  Justin Marshall and
                  Julia Gould and
                  An{-}I Andy Wang and
                  Geoff Kuenning},
  editor       = {Robert H'obbes' Zakon},
  title        = {TrueErase: per-file secure deletion for the storage data path},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {439--448},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421013},
  doi          = {10.1145/2420950.2421013},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DiesburgMSMMGWK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DunphyO12,
  author       = {Paul Dunphy and
                  Patrick Olivier},
  editor       = {Robert H'obbes' Zakon},
  title        = {On automated image choice for secure and usable graphical passwords},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420965},
  doi          = {10.1145/2420950.2420965},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DunphyO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnevJBRK12,
  author       = {Miro Enev and
                  Jaeyeon Jung and
                  Liefeng Bo and
                  Xiaofeng Ren and
                  Tadayoshi Kohno},
  editor       = {Robert H'obbes' Zakon},
  title        = {SensorSift: balancing sensor data privacy and utility in automated
                  face understanding},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420975},
  doi          = {10.1145/2420950.2420975},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GatesLCP12,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Jing Chen and
                  Robert W. Proctor},
  editor       = {Robert H'obbes' Zakon},
  title        = {CodeShield: towards personalized application whitelisting},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {279--288},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420992},
  doi          = {10.1145/2420950.2420992},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GatesLCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GrazianoLB12,
  author       = {Mariano Graziano and
                  Corrado Leita and
                  Davide Balzarotti},
  editor       = {Robert H'obbes' Zakon},
  title        = {Towards network containment in malware analysis systems},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {339--348},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421000},
  doi          = {10.1145/2420950.2421000},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GrazianoLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HeelanG12,
  author       = {Sean Heelan and
                  Agustin Gianni},
  editor       = {Robert H'obbes' Zakon},
  title        = {Augmenting vulnerability analysis of binary code},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {199--208},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420981},
  doi          = {10.1145/2420950.2420981},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HeelanG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HoushmandA12,
  author       = {Shiva Houshmand and
                  Sudhir Aggarwal},
  editor       = {Robert H'obbes' Zakon},
  title        = {Building better passwords using probabilistic techniques},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420966},
  doi          = {10.1145/2420950.2420966},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HoushmandA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JarabekBA12,
  author       = {Chris Jarabek and
                  David Barrera and
                  John Aycock},
  editor       = {Robert H'obbes' Zakon},
  title        = {ThinAV: truly lightweight mobile cloud-based anti-malware},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {209--218},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420983},
  doi          = {10.1145/2420950.2420983},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JarabekBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsLBF12,
  author       = {Martin Johns and
                  Sebastian Lekies and
                  Bastian Braun and
                  Benjamin Flesch},
  editor       = {Robert H'obbes' Zakon},
  title        = {BetterAuth: web authentication revisited},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420977},
  doi          = {10.1145/2420950.2420977},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsLBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Kumar12,
  author       = {Apurva Kumar},
  editor       = {Robert H'obbes' Zakon},
  title        = {Using automated model analysis for reasoning about security of web
                  protocols},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {289--298},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420993},
  doi          = {10.1145/2420950.2420993},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Kumar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LevillainEMD12,
  author       = {Olivier Levillain and
                  Arnaud {\'{E}}balard and
                  Benjamin Morin and
                  Herv{\'{e}} Debar},
  editor       = {Robert H'obbes' Zakon},
  title        = {One year of {SSL} internet measurement},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420953},
  doi          = {10.1145/2420950.2420953},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LevillainEMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12,
  author       = {Martina Lindorfer and
                  Alessandro Di Federico and
                  Federico Maggi and
                  Paolo Milani Comparetti and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {Lines of malicious code: insights into the malicious software industry},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {349--358},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421001},
  doi          = {10.1145/2420950.2421001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MarforioRFC12,
  author       = {Claudio Marforio and
                  Hubert Ritzdorf and
                  Aur{\'{e}}lien Francillon and
                  Srdjan Capkun},
  editor       = {Robert H'obbes' Zakon},
  title        = {Analysis of the communication between colluding applications on modern
                  smartphones},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420958},
  doi          = {10.1145/2420950.2420958},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MarforioRFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MastiMRFC12,
  author       = {Ramya Jayaram Masti and
                  Claudio Marforio and
                  Aanjhan Ranganathan and
                  Aur{\'{e}}lien Francillon and
                  Srdjan Capkun},
  editor       = {Robert H'obbes' Zakon},
  title        = {Enabling trusted scheduling in embedded systems},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420960},
  doi          = {10.1145/2420950.2420960},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MastiMRFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McCarneyBCCO12,
  author       = {Daniel McCarney and
                  David Barrera and
                  Jeremy Clark and
                  Sonia Chiasson and
                  Paul C. van Oorschot},
  editor       = {Robert H'obbes' Zakon},
  title        = {Tapas: design, implementation, and usability evaluation of a password
                  manager},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420964},
  doi          = {10.1145/2420950.2420964},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/McCarneyBCCO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottMLKK12,
  author       = {John P. McDermott and
                  Bruce E. Montrose and
                  Margery Li and
                  James Kirby and
                  Myong H. Kang},
  editor       = {Robert H'obbes' Zakon},
  title        = {Separation virtual machine monitors},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {419--428},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421011},
  doi          = {10.1145/2420950.2421011},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottMLKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuthukumaranRTVTJ12,
  author       = {Divya Muthukumaran and
                  Sandra Julieta Rueda and
                  Nirupama Talele and
                  Hayawardh Vijayakumar and
                  Jason Teutsch and
                  Trent Jaeger},
  editor       = {Robert H'obbes' Zakon},
  title        = {Transforming commodity security policies to enforce Clark-Wilson integrity},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {269--278},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420991},
  doi          = {10.1145/2420950.2420991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuthukumaranRTVTJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PerdisciU12,
  author       = {Roberto Perdisci and
                  Man Chon U},
  editor       = {Robert H'obbes' Zakon},
  title        = {{VAMO:} towards a fully automated malware clustering validity analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {329--338},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420999},
  doi          = {10.1145/2420950.2420999},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PerdisciU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PohlyMMB12,
  author       = {Devin J. Pohly and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel and
                  Kevin R. B. Butler},
  editor       = {Robert H'obbes' Zakon},
  title        = {Hi-Fi: collecting high-fidelity whole-system provenance},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420989},
  doi          = {10.1145/2420950.2420989},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PohlyMMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12,
  author       = {Iasonas Polakis and
                  Marco Lancini and
                  Georgios Kontaxis and
                  Federico Maggi and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {All your face are belong to us: breaking Facebook's social authentication},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421008},
  doi          = {10.1145/2420950.2421008},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ReinaFPCB12,
  author       = {Alessandro Reina and
                  Aristide Fattori and
                  Fabio Pagani and
                  Lorenzo Cavallaro and
                  Danilo Bruschi},
  editor       = {Robert H'obbes' Zakon},
  title        = {When hardware meets software: a bulletproof solution to forensic memory
                  acquisition},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420962},
  doi          = {10.1145/2420950.2420962},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ReinaFPCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12,
  author       = {Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon},
  title        = {Jarhead analysis and detection of malicious Java applets},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {249--257},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420988},
  doi          = {10.1145/2420950.2420988},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShiojiKIH12,
  author       = {Eitaro Shioji and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Takeo Hariu},
  editor       = {Robert H'obbes' Zakon},
  title        = {Code shredding: byte-granular randomization of program layout for
                  detecting code-reuse attacks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {309--318},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420996},
  doi          = {10.1145/2420950.2420996},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShiojiKIH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SinghBMKA12,
  author       = {Indrajeet Singh and
                  Michael Butkiewicz and
                  Harsha V. Madhyastha and
                  Srikanth V. Krishnamurthy and
                  Sateesh Addepalli},
  editor       = {Robert H'obbes' Zakon},
  title        = {Enabling private conversations on Twitter},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {409--418},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421009},
  doi          = {10.1145/2420950.2421009},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SinghBMKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SmutzS12,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  editor       = {Robert H'obbes' Zakon},
  title        = {Malicious {PDF} detection using metadata and structural features},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420987},
  doi          = {10.1145/2420950.2420987},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SmutzS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SridharanSG12,
  author       = {Vasumathi Sridharan and
                  Vaibhav Shankar and
                  Minaxi Gupta},
  editor       = {Robert H'obbes' Zakon},
  title        = {Twitter games: how successful spammers pick targets},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {389--398},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421007},
  doi          = {10.1145/2420950.2421007},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SridharanSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SrivastavaG12,
  author       = {Abhinav Srivastava and
                  Jonathon T. Giffin},
  editor       = {Robert H'obbes' Zakon},
  title        = {Efficient protection of kernel data structures via object partitioning},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {429--438},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421012},
  doi          = {10.1145/2420950.2421012},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SrivastavaG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StefanovDJO12,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea},
  editor       = {Robert H'obbes' Zakon},
  title        = {Iris: a scalable cloud file system with efficient integrity checks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420985},
  doi          = {10.1145/2420950.2420985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TendulkarSPBSE12,
  author       = {Vasant Tendulkar and
                  Ryan Snyder and
                  Joe Pletcher and
                  Kevin R. B. Butler and
                  Ashwin Shashidharan and
                  William Enck},
  editor       = {Robert H'obbes' Zakon},
  title        = {Abusing cloud-based browsers for fun and profit},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {219--228},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420984},
  doi          = {10.1145/2420950.2420984},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TendulkarSPBSE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TrewinSKMSB12,
  author       = {Shari Trewin and
                  Calvin Swart and
                  Larry Koved and
                  Jacquelyn Martino and
                  Kapil Singh and
                  Shay Ben{-}David},
  editor       = {Robert H'obbes' Zakon},
  title        = {Biometric authentication on a mobile device: a study of user effort,
                  error and task disruption},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {159--168},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420976},
  doi          = {10.1145/2420950.2420976},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TrewinSKMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WartellMHL12,
  author       = {Richard Wartell and
                  Vishwath Mohan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  editor       = {Robert H'obbes' Zakon},
  title        = {Securing untrusted code via compiler-agnostic binary rewriting},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {299--308},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420995},
  doi          = {10.1145/2420950.2420995},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WartellMHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiGNF12,
  author       = {Xuetao Wei and
                  Lorenzo Gomez and
                  Iulian Neamtiu and
                  Michalis Faloutsos},
  editor       = {Robert H'obbes' Zakon},
  title        = {Permission evolution in the Android ecosystem},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420956},
  doi          = {10.1145/2420950.2420956},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiGNF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsFH12,
  author       = {Carsten Willems and
                  Felix C. Freiling and
                  Thorsten Holz},
  editor       = {Robert H'obbes' Zakon},
  title        = {Using memory management to detect and extract illegitimate code for
                  malware analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420979},
  doi          = {10.1145/2420950.2420979},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12,
  author       = {Carsten Willems and
                  Ralf Hund and
                  Andreas Fobian and
                  Dennis Felsch and
                  Thorsten Holz and
                  Amit Vasudevan},
  editor       = {Robert H'obbes' Zakon},
  title        = {Down to the bare metal: using processor features for binary analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {189--198},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420980},
  doi          = {10.1145/2420950.2420980},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YamaguchiLR12,
  author       = {Fabian Yamaguchi and
                  Markus Lottmann and
                  Konrad Rieck},
  editor       = {Robert H'obbes' Zakon},
  title        = {Generalized vulnerability extrapolation using abstract syntax trees},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {359--368},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421003},
  doi          = {10.1145/2420950.2421003},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YamaguchiLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZavouPK12,
  author       = {Angeliki Zavou and
                  Georgios Portokalidis and
                  Angelos D. Keromytis},
  editor       = {Robert H'obbes' Zakon},
  title        = {Self-healing multitier architectures using cascading rescue points},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {379--388},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421005},
  doi          = {10.1145/2420950.2421005},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZavouPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaoLLGMT12,
  author       = {Shuang Zhao and
                  Patrick P. C. Lee and
                  John C. S. Lui and
                  Xiaohong Guan and
                  Xiaobo Ma and
                  Jing Tao},
  editor       = {Robert H'obbes' Zakon},
  title        = {Cloud-based push-styled mobile botnets: a case study of exploiting
                  the cloud to device messaging service},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420968},
  doi          = {10.1145/2420950.2420968},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhaoLLGMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2012,
  editor       = {Robert H'obbes' Zakon},
  title        = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2420950},
  isbn         = {978-1-4503-1312-4},
  timestamp    = {Thu, 20 Dec 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AckerRDPJ11,
  author       = {Steven {Van Acker} and
                  Philippe De Ryck and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {WebJail: least-privilege integration of third-party components in
                  web mashups},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {307--316},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076775},
  doi          = {10.1145/2076732.2076775},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AckerRDPJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AhmedT11,
  author       = {Ahmed Awad E. Ahmed and
                  Issa Traor{\'{e}}},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Dynamic sample size detection in continuous authentication using sequential
                  sampling},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {169--176},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076756},
  doi          = {10.1145/2076732.2076756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AhmedT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Benzel11,
  author       = {Terry Benzel},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {The science of cyber security experimentation: the {DETER} project},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {137--148},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076752},
  doi          = {10.1145/2076732.2076752},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Benzel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Blaze11,
  author       = {Matt Blaze},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Key escrow from a safe distance: looking back at the Clipper Chip},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {317--321},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076777},
  doi          = {10.1145/2076732.2076777},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Blaze11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BletschJF11,
  author       = {Tyler K. Bletsch and
                  Xuxian Jiang and
                  Vincent W. Freeh},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Mitigating code-reuse attacks with control-flow locking},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {353--362},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076783},
  doi          = {10.1145/2076732.2076783},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BletschJF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BoshmafMBR11,
  author       = {Yazan Boshmaf and
                  Ildar Muslukhov and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {The socialbot network: when bots socialize for fame and money},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076746},
  doi          = {10.1145/2076732.2076746},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BoshmafMBR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CiprianoZHKV11,
  author       = {Casey Cipriano and
                  Ali Zand and
                  Amir Houmansadr and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Nexat: a history-based approach to predict attacker actions},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {383--392},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076787},
  doi          = {10.1145/2076732.2076787},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CiprianoZHKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CuiKS11,
  author       = {Ang Cui and
                  Jatin Kataria and
                  Salvatore J. Stolfo},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {From prey to hunter: transforming legacy embedded devices into exploitation
                  sensor grids},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {393--402},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076788},
  doi          = {10.1145/2076732.2076788},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CuiKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DanevMKC11,
  author       = {Boris Danev and
                  Ramya Jayaram Masti and
                  Ghassan Karame and
                  Srdjan Capkun},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Enabling secure VM-vTPM migration in private clouds},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {187--196},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076759},
  doi          = {10.1145/2076732.2076759},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DanevMKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DongTLJ11,
  author       = {Xinshu Dong and
                  Minh Tran and
                  Zhenkai Liang and
                  Xuxian Jiang},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {AdSentry: comprehensive and flexible confinement of JavaScript-based
                  advertisements},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {297--306},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076774},
  doi          = {10.1145/2076732.2076774},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DongTLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoupeECSYZCV11,
  author       = {Adam Doup{\'{e}} and
                  Manuel Egele and
                  Benjamin Caillat and
                  Gianluca Stringhini and
                  Gorkem Yakin and
                  Ali Zand and
                  Ludovico Cavedon and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Hit 'em where it hurts: a live security exercise on cyber situational
                  awareness},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076740},
  doi          = {10.1145/2076732.2076740},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DoupeECSYZCV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FatemiehLG11,
  author       = {Omid Fatemieh and
                  Michael LeMay and
                  Carl A. Gunter},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Reliable telemetry in white spaces using remote attestation},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {323--332},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076779},
  doi          = {10.1145/2076732.2076779},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FatemiehLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HartCHTJ11,
  author       = {Michael Hart and
                  Claude Castille and
                  Manoj Harpalani and
                  Jonathan Toohill and
                  Rob Johnson},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {PhorceField: a phish-proof password ceremony},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {159--168},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076755},
  doi          = {10.1145/2076732.2076755},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HartCHTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HizverC11,
  author       = {Jennia Hizver and
                  Tzi{-}cker Chiueh},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Tracking payment card data flow using virtual machine state introspection},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {277--285},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076771},
  doi          = {10.1145/2076732.2076771},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HizverC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HlywaBP11,
  author       = {Max Hlywa and
                  Robert Biddle and
                  Andrew S. Patrick},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Facing the facts about image type in recognition-based graphical passwords},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076754},
  doi          = {10.1145/2076732.2076754},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HlywaBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuAJ11,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jan Jorgensen},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Detecting and resolving privacy conflicts for collaborative data sharing
                  in online social networks},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {103--112},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076747},
  doi          = {10.1145/2076732.2076747},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HuAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuangZOPS11,
  author       = {Heqing Huang and
                  Su Zhang and
                  Xinming Ou and
                  Atul Prakash and
                  Karem A. Sakallah},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Distilling critical attack graph surface iteratively through minimum-cost
                  {SAT} solving},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076738},
  doi          = {10.1145/2076732.2076738},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HuangZOPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuberMLSWW11,
  author       = {Markus Huber and
                  Martin Mulazzani and
                  Manuel Leithner and
                  Sebastian Schrittwieser and
                  Gilbert Wondracek and
                  Edgar R. Weippl},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Social snapshots: digital forensics for online social networks},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076748},
  doi          = {10.1145/2076732.2076748},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HuberMLSWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JawurekJR11,
  author       = {Marek Jawurek and
                  Martin Johns and
                  Konrad Rieck},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Smart metering de-pseudonymization},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {227--236},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076764},
  doi          = {10.1145/2076732.2076764},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JawurekJR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KhurshidKC11,
  author       = {Ahmed Khurshid and
                  Firat Kiyak and
                  Matthew Caesar},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Improving robustness of {DNS} to software vulnerabilities},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {177--186},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076758},
  doi          = {10.1145/2076732.2076758},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KhurshidKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiratVK11,
  author       = {Dhilung Kirat and
                  Giovanni Vigna and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {BareBox: efficient malware analysis on bare-metal},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {403--412},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076790},
  doi          = {10.1145/2076732.2076790},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiratVK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LaskovS11,
  author       = {Pavel Laskov and
                  Nedim Srndic},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Static detection of malicious JavaScript-bearing {PDF} documents},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {373--382},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076785},
  doi          = {10.1145/2076732.2076785},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LaskovS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiX11,
  author       = {Xiaowei Li and
                  Yuan Xue},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{BLOCK:} a black-box approach for detection of state violation attacks
                  towards web applications},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {247--256},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076767},
  doi          = {10.1145/2076732.2076767},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiXDW11,
  author       = {Chenglong Li and
                  Yibo Xue and
                  Yingfei Dong and
                  Dongsheng Wang},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {"Super nodes" in Tor: existence and security implication},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {217--226},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076763},
  doi          = {10.1145/2076732.2076763},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiXDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuZWG11,
  author       = {Kangjie Lu and
                  Dabi Zou and
                  Weiping Wen and
                  Debin Gao},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {deRop: removing return-oriented programming from malware},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {363--372},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076784},
  doi          = {10.1145/2076732.2076784},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuZWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuoHDWY11,
  author       = {Tongbo Luo and
                  Hao Hao and
                  Wenliang Du and
                  Yifei Wang and
                  Heng Yin},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Attacks on WebView in the Android system},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {343--352},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076781},
  doi          = {10.1145/2076732.2076781},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuoHDWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuoZZPLC11,
  author       = {Xiapu Luo and
                  Peng Zhou and
                  Junjie Zhang and
                  Roberto Perdisci and
                  Wenke Lee and
                  Rocky K. C. Chang},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Exposing invisible timing-based traffic watermarks with {BACKLIT}},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {197--206},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076760},
  doi          = {10.1145/2076732.2076760},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LuoZZPLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MooreWS11,
  author       = {W. Brad Moore and
                  Chris Wacek and
                  Micah Sherr},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Exploring the potential benefits of expanded rate limiting in Tor:
                  slow and steady wins the race with Tortoise},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {207--216},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076762},
  doi          = {10.1145/2076732.2076762},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MooreWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NadjiAPL11,
  author       = {Yacin Nadji and
                  Manos Antonakakis and
                  Roberto Perdisci and
                  Wenke Lee},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Understanding the prevalence and use of alternative plans in malware
                  with network games},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076734},
  doi          = {10.1145/2076732.2076734},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NadjiAPL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NadjiGT11,
  author       = {Yacin Nadji and
                  Jonathon T. Giffin and
                  Patrick Traynor},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Automated remote repair for mobile malware},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {413--422},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076791},
  doi          = {10.1145/2076732.2076791},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NadjiGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NeugschwandtnerCJK11,
  author       = {Matthias Neugschwandtner and
                  Paolo Milani Comparetti and
                  Gr{\'{e}}goire Jacob and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{FORECAST:} skimming off the malware cream},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076735},
  doi          = {10.1145/2076732.2076735},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NeugschwandtnerCJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NeugschwandtnerCP11,
  author       = {Matthias Neugschwandtner and
                  Paolo Milani Comparetti and
                  Christian Platzer},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Detecting malware's failover C{\&}C strategies with squeeze},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076736},
  doi          = {10.1145/2076732.2076736},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NeugschwandtnerCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NipaneDT11,
  author       = {Nilesh Nipane and
                  Italo Dacosta and
                  Patrick Traynor},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {"Mix-in-Place" anonymous networking using secure function evaluation},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076742},
  doi          = {10.1145/2076732.2076742},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NipaneDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PappasRVBM11,
  author       = {Vasilis Pappas and
                  Mariana Raykova and
                  Binh Vo and
                  Steven M. Bellovin and
                  Tal Malkin},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Private search in the real world},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076744},
  doi          = {10.1145/2076732.2076744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PappasRVBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PelizziS11,
  author       = {Riccardo Pelizzi and
                  R. Sekar},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {A server- and browser-transparent {CSRF} defense for web 2.0 applications},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076768},
  doi          = {10.1145/2076732.2076768},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PelizziS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShinL11,
  author       = {Dongwan Shin and
                  Rodrigo Lopes},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {An empirical study of visual security cues to prevent the SSLstripping
                  attack},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {287--296},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076773},
  doi          = {10.1145/2076732.2076773},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ShinL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Simmons11,
  author       = {Patrick Simmons},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Security through amnesia: a software-based solution to the cold boot
                  attack on disk encryption},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076743},
  doi          = {10.1145/2076732.2076743},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Simmons11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StuderPB11,
  author       = {Ahren Studer and
                  Timothy Passaro and
                  Lujo Bauer},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Don't Bump, Shake on It: the exploitation of a popular accelerometer-based
                  smart phone exchange and its secure replacement},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {333--342},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076780},
  doi          = {10.1145/2076732.2076780},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StuderPB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Syverson11,
  author       = {Paul F. Syverson},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {A peel of onion},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {123--137},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076750},
  doi          = {10.1145/2076732.2076750},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Syverson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VikramFG11,
  author       = {Shardul Vikram and
                  Yinan Fan and
                  Guofei Gu},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{SEMAGE:} a new image-based two-factor {CAPTCHA}},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {237--246},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076766},
  doi          = {10.1145/2076732.2076766},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VikramFG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WilanderNYKJ11,
  author       = {John Wilander and
                  Nick Nikiforakis and
                  Yves Younan and
                  Mariam Kamkar and
                  Wouter Joosen},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{RIPE:} runtime intrusion prevention evaluator},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076739},
  doi          = {10.1145/2076732.2076739},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WilanderNYKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieCLM11,
  author       = {Jing Xie and
                  Bill Chu and
                  Heather Richter Lipford and
                  John T. Melton},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {{ASIDE:} {IDE} support for web application security},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {267--276},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076770},
  doi          = {10.1145/2076732.2076770},
  timestamp    = {Sat, 08 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieCLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2011,
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732},
  doi          = {10.1145/2076732},
  isbn         = {978-1-4503-0672-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ButlerMM10,
  author       = {Kevin R. B. Butler and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Kells: a protection framework for portable data},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920296},
  doi          = {10.1145/1920261.1920296},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ButlerMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CalvetDFMSGBS10,
  author       = {Joan Calvet and
                  Carlton R. Davis and
                  Jos{\'{e}} M. Fernandez and
                  Jean{-}Yves Marion and
                  Pier{-}Luc St{-}Onge and
                  Wadie Guizani and
                  Pierre{-}Marc Bureau and
                  Anil Somayaji},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {The case for in-the-lab botnet experimentation: creating and taking
                  down a 3000-node botnet},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {141--150},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920284},
  doi          = {10.1145/1920261.1920284},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CalvetDFMSGBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChanVDCC10,
  author       = {Ellick Chan and
                  Shivaram Venkataraman and
                  Francis M. David and
                  Amey Chaugule and
                  Roy H. Campbell},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Forenscope: a framework for live forensics},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {307--316},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920307},
  doi          = {10.1145/1920261.1920307},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChanVDCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Cheswick10,
  author       = {William R. Cheswick},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Back to Berferd},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {281--286},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920303},
  doi          = {10.1145/1920261.1920303},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Cheswick10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChuGWJ10,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang and
                  Sushil Jajodia},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Who is tweeting on Twitter: human, bot, or cyborg?},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920265},
  doi          = {10.1145/1920261.1920265},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChuGWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ClarkFBS10,
  author       = {Sandy Clark and
                  Stefan Frei and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Familiarity breeds contempt: the honeymoon effect and the role of
                  legacy code in zero-day vulnerabilities},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {251--260},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920299},
  doi          = {10.1145/1920261.1920299},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ClarkFBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CoskunDM10,
  author       = {Baris Coskun and
                  Sven Dietrich and
                  Nasir D. Memon},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Friends of an enemy: identifying local members of peer-to-peer botnets
                  using mutual contacts},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920283},
  doi          = {10.1145/1920261.1920283},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CoskunDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CuiS10,
  author       = {Ang Cui and
                  Salvatore J. Stolfo},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {A quantitative analysis of the insecurity of embedded network devices:
                  results of a wide-area scan},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {97--106},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920276},
  doi          = {10.1145/1920261.1920276},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CuiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Two methodologies for physical penetration testing using social engineering},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920319},
  doi          = {10.1145/1920261.1920319},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DingWWLZ10,
  author       = {Yu Ding and
                  Tao Wei and
                  Tielei Wang and
                  Zhenkai Liang and
                  Wei Zou},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Heap Taichi: exploiting memory allocation granularity in heap-spraying
                  attacks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {327--336},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920310},
  doi          = {10.1145/1920261.1920310},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DingWWLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DwoskinGCL10,
  author       = {Jeffrey S. Dwoskin and
                  Mahadevan Gomathisankaran and
                  Yu{-}Yuan Chen and
                  Ruby B. Lee},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {A framework for testing hardware-software security architectures},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {387--397},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920318},
  doi          = {10.1145/1920261.1920318},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DwoskinGCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FangC10,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Securing interactive sessions using mobile device through visual channel
                  and visual inspection},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920272},
  doi          = {10.1145/1920261.1920272},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GalloKDALA10,
  author       = {Roberto Gallo and
                  Henrique Kawakami and
                  Ricardo Dahab and
                  Rafael Azevedo and
                  Saulo Lima and
                  Guido Araujo},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {{T-DRE:} a hardware trusted computing base for direct recording electronic
                  vote machines},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {191--198},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920291},
  doi          = {10.1145/1920261.1920291},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GalloKDALA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuGRSM10,
  author       = {Liang Gu and
                  Yao Guo and
                  Anbang Ruan and
                  Qingni Shen and
                  Hong Mei},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {{SCOBA:} source code based attestation on custom software},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {337--346},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920311},
  doi          = {10.1145/1920261.1920311},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuGRSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HanPGP10,
  author       = {Jin Han and
                  Meng Pan and
                  Debin Gao and
                  HweeHwa Pang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {A multi-user steganographic file system on untrusted shared storage},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {317--326},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920309},
  doi          = {10.1145/1920261.1920309},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HanPGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HeusserM10,
  author       = {Jonathan Heusser and
                  Pasquale Malacaria},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Quantifying information leaks in software},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {261--269},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920300},
  doi          = {10.1145/1920261.1920300},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HeusserM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiSKKSS10,
  author       = {Shujun Li and
                  S. Amier Haider Shah and
                  M. Asad Usman Khan and
                  Syed Ali Khayam and
                  Ahmad{-}Reza Sadeghi and
                  Roland Schmitz},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Breaking e-banking CAPTCHAs},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {171--180},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920288},
  doi          = {10.1145/1920261.1920288},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiSKKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiW10,
  author       = {Zhou Li and
                  XiaoFeng Wang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {{FIRM:} capability-based inline mediation of Flash behaviors},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {181--190},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920289},
  doi          = {10.1145/1920261.1920289},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiakhGJ10,
  author       = {Siarhei Liakh and
                  Michael C. Grace and
                  Xuxian Jiang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Analyzing and improving Linux kernel memory protection: a model checking
                  approach},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {271--280},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920301},
  doi          = {10.1145/1920261.1920301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiakhGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuNDLW10,
  author       = {An Liu and
                  Peng Ning and
                  Huaiyu Dai and
                  Yao Liu and
                  Cliff Wang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Defending DSSS-based broadcast communication against insider jammers
                  via delayed seed-disclosure},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {367--376},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920315},
  doi          = {10.1145/1920261.1920315},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuNDLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LongstaffBM10,
  author       = {Tom Longstaff and
                  David M. Balenson and
                  Mark Matties},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Barriers to science in security},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {127--129},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920281},
  doi          = {10.1145/1920261.1920281},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LongstaffBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McLaughlinPMDM10,
  author       = {Stephen E. McLaughlin and
                  Dmitry Podkuiko and
                  Sergei Miadzvezhanka and
                  Adam Delozier and
                  Patrick D. McDaniel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Multi-vendor penetration testing in the advanced metering infrastructure},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920277},
  doi          = {10.1145/1920261.1920277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McLaughlinPMDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OnarliogluBLBK10,
  author       = {Kaan Onarlioglu and
                  Leyla Bilge and
                  Andrea Lanzi and
                  Davide Balzarotti and
                  Engin Kirda},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {G-Free: defeating return-oriented programming through gadget-less
                  binaries},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920269},
  doi          = {10.1145/1920261.1920269},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OnarliogluBLBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OngtangBM10,
  author       = {Machigar Ongtang and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Porscha: policy oriented secure content handling in Android},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {221--230},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920295},
  doi          = {10.1145/1920261.1920295},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/OngtangBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PolychronakisAM10,
  author       = {Michalis Polychronakis and
                  Kostas G. Anagnostakis and
                  Evangelos P. Markatos},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Comprehensive shellcode detection using runtime heuristics},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {287--296},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920305},
  doi          = {10.1145/1920261.1920305},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PolychronakisAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PopperBCC10,
  author       = {Christina P{\"{o}}pper and
                  David A. Basin and
                  Srdjan Capkun and
                  Cas Cremers},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Keeping data secret under full compromise using porter devices},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {241--250},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920297},
  doi          = {10.1145/1920261.1920297},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PopperBCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PortokalidisHAB10,
  author       = {Georgios Portokalidis and
                  Philip Homburg and
                  Kostas Anagnostakis and
                  Herbert Bos},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Paranoid Android: versatile protection for smartphones},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {347--356},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920313},
  doi          = {10.1145/1920261.1920313},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PortokalidisHAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PortokalidisK10,
  author       = {Georgios Portokalidis and
                  Angelos D. Keromytis},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Fast and practical instruction-set randomization for commodity systems},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920268},
  doi          = {10.1145/1920261.1920268},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PortokalidisK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RieckKD10,
  author       = {Konrad Rieck and
                  Tammo Krueger and
                  Andreas Dewald},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Cujo: efficient detection and prevention of drive-by-download attacks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {31--39},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920267},
  doi          = {10.1145/1920261.1920267},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RieckKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RodesW10,
  author       = {Benjamin Rodes and
                  Xunhua Wang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Security analysis of a fingerprint-protected {USB} drive},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {89--96},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920275},
  doi          = {10.1145/1920261.1920275},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RodesW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShinG10,
  author       = {Seungwon Shin and
                  Guofei Gu},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Conficker and beyond: a large-scale empirical study},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920285},
  doi          = {10.1145/1920261.1920285},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShinG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StobertFCOB10,
  author       = {Elizabeth Stobert and
                  Alain Forget and
                  Sonia Chiasson and
                  Paul C. van Oorschot and
                  Robert Biddle},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Exploring usability effects of increasing security in click-based
                  graphical passwords},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920273},
  doi          = {10.1145/1920261.1920273},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StobertFCOB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StringhiniKV10,
  author       = {Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Detecting spammers on social networks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920263},
  doi          = {10.1145/1920261.1920263},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StringhiniKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TillichKS10,
  author       = {Stefan Tillich and
                  Mario Kirschbaum and
                  Alexander Szekely},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {SCA-resistant embedded processors: the next generation},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920293},
  doi          = {10.1145/1920261.1920293},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TillichKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ValamehrTSKHIL10,
  author       = {Jonathan Valamehr and
                  Mohit Tiwari and
                  Timothy Sherwood and
                  Ryan Kastner and
                  Ted Huffmire and
                  Cynthia E. Irvine and
                  Timothy E. Levin},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Hardware assistance for trustworthy systems through 3-D integration},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {199--210},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920292},
  doi          = {10.1145/1920261.1920292},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ValamehrTSKHIL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Vigna10,
  author       = {Giovanni Vigna},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Network intrusion detection: dead or alive?},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920279},
  doi          = {10.1145/1920261.1920279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Vigna10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangS10,
  author       = {Zhaohui Wang and
                  Angelos Stavrou},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Exploiting smart-phone {USB} connectivity for fun and profit},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {357--366},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920314},
  doi          = {10.1145/1920261.1920314},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WestACL10,
  author       = {Andrew G. West and
                  Adam J. Aviv and
                  Jian Chang and
                  Insup Lee},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Spam mitigation using spatio-temporal reputations from blacklist history},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920287},
  doi          = {10.1145/1920261.1920287},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WestACL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuZZ10,
  author       = {Wei Xu and
                  Fangfang Zhang and
                  Sencun Zhu},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Toward worm detection in online social networks},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920264},
  doi          = {10.1145/1920261.1920264},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB10,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Jun Wen Wong and
                  Feng Bao},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Towards practical anonymous password authentication},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920271},
  doi          = {10.1145/1920261.1920271},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangJLJ10,
  author       = {Shengzhi Zhang and
                  Xiaoqi Jia and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Cross-layer comprehensive intrusion harm analysis for production workload
                  server systems},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {297--306},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920306},
  doi          = {10.1145/1920261.1920306},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangJLJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhouNZAWB10,
  author       = {Wu Zhou and
                  Peng Ning and
                  Xiaolan Zhang and
                  Glenn Ammons and
                  Ruowen Wang and
                  Vasanth Bala},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Always up-to-date: scalable offline patching of {VM} images in a compute
                  cloud},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {377--386},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920317},
  doi          = {10.1145/1920261.1920317},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhouNZAWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2010,
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261},
  doi          = {10.1145/1920261},
  isbn         = {978-1-4503-0133-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AblizZ09,
  author       = {Mehmud Abliz and
                  Taieb Znati},
  title        = {A Guided Tour Puzzle for Denial of Service Prevention},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {279--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.33},
  doi          = {10.1109/ACSAC.2009.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AblizZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AzabNSZ09,
  author       = {Ahmed M. Azab and
                  Peng Ning and
                  Emre Can Sezer and
                  Xiaolan Zhang},
  title        = {{HIMA:} {A} Hypervisor-Based Integrity Measurement Agent},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {461--470},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.50},
  doi          = {10.1109/ACSAC.2009.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AzabNSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Bishop09,
  author       = {Matt Bishop},
  title        = {Reflections on {UNIX} Vulnerabilities},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {161--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.25},
  doi          = {10.1109/ACSAC.2009.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Bishop09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ButtGSC09,
  author       = {Shakeel Butt and
                  Vinod Ganapathy and
                  Michael M. Swift and
                  Chih{-}Cheng Chang},
  title        = {Protecting Commodity Operating System Kernels from Vulnerable Device
                  Drivers},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {301--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.35},
  doi          = {10.1109/ACSAC.2009.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ButtGSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CoskunM09,
  author       = {Baris Coskun and
                  Nasir D. Memon},
  title        = {Online Sketching of Network Flows for Real-Time Stepping-Stone Detection},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {473--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.51},
  doi          = {10.1109/ACSAC.2009.51},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CoskunM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Davidson09,
  author       = {Mary Ann Davidson},
  title        = {The Good, the Bad, And the Ugly: Stepping on the Security Scale},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {187--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.59},
  doi          = {10.1109/ACSAC.2009.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Davidson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DhawanG09,
  author       = {Mohan Dhawan and
                  Vinod Ganapathy},
  title        = {Analyzing Information Flow in JavaScript-Based Browser Extensions},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {382--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.43},
  doi          = {10.1109/ACSAC.2009.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DhawanG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Epstein09,
  author       = {Jeremy Epstein},
  title        = {A Survey of Vendor Software Assurance Practices},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {528--537},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.56},
  doi          = {10.1109/ACSAC.2009.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Epstein09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FerreiraCFCZCA09,
  author       = {Ana Ferreira and
                  David W. Chadwick and
                  Pedro Farinha and
                  Ricardo Jo{\~{a}}o Cruz Correia and
                  Gansen Zhao and
                  Rui Chilro and
                  Luis Filipe Coelho Antunes},
  title        = {How to Securely Break into {RBAC:} The {BTG-RBAC} Model},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {23--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.12},
  doi          = {10.1109/ACSAC.2009.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FerreiraCFCZCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FordCKV09,
  author       = {Sean Ford and
                  Marco Cova and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Analyzing and Detecting Malicious Flash Advertisements},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {363--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.41},
  doi          = {10.1109/ACSAC.2009.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FordCKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Frias-MartinezSSK09,
  author       = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and
                  Joseph Sherrick and
                  Salvatore J. Stolfo and
                  Angelos D. Keromytis},
  title        = {A Network Access Control Mechanism Based on Behavior Profiles},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {3--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.10},
  doi          = {10.1109/ACSAC.2009.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Frias-MartinezSSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Gong09,
  author       = {Li Gong},
  title        = {Java Security: {A} Ten Year Retrospective},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {395--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.44},
  doi          = {10.1109/ACSAC.2009.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Gong09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuYPSL09,
  author       = {Guofei Gu and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Jennifer Stoll and
                  Wenke Lee},
  title        = {Active Botnet Probing to Identify Obscure Command and Control Channels},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {241--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.30},
  doi          = {10.1109/ACSAC.2009.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuYPSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HsiaoLSSWKPSY09,
  author       = {Hsu{-}Chun Hsiao and
                  Yue{-}Hsun Lin and
                  Ahren Studer and
                  Cassandra Studer and
                  King{-}Hang Wang and
                  Hiroaki Kikuchi and
                  Adrian Perrig and
                  Hung{-}Min Sun and
                  Bo{-}Yin Yang},
  title        = {A Study of User-Friendly Hash Comparison Schemes},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {105--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.20},
  doi          = {10.1109/ACSAC.2009.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HsiaoLSSWKPSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/IngolsCLWB09,
  author       = {Kyle Ingols and
                  Matthew Chu and
                  Richard Lippmann and
                  Seth E. Webster and
                  Stephen W. Boyer},
  title        = {Modeling Modern Network Attacks and Countermeasures Using Attack Graphs},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {117--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.21},
  doi          = {10.1109/ACSAC.2009.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/IngolsCLWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JinL09,
  author       = {Hongxia Jin and
                  Jeffrey B. Lotspiech},
  title        = {Unifying Broadcast Encryption and Traitor Tracing for Content Protection},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {139--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.23},
  doi          = {10.1109/ACSAC.2009.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JinL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KirschbaumP09,
  author       = {Mario Kirschbaum and
                  Thomas Popp},
  title        = {Evaluation of a DPA-Resistant Prototype Chip},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {43--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.14},
  doi          = {10.1109/ACSAC.2009.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KirschbaumP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KlineBMR09,
  author       = {Erik Kline and
                  Matt Beaumont{-}Gay and
                  Jelena Mirkovic and
                  Peter L. Reiher},
  title        = {{RAD:} Reflector Attack Defense Using Message Authentication Codes},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.32},
  doi          = {10.1109/ACSAC.2009.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KlineBMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiAPSSW09,
  author       = {Shujun Li and
                  Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Roland Schmitz and
                  Huaxiong Wang},
  title        = {On the Security of {PAS} (Predicate-Based Authentication Service)},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {209--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.27},
  doi          = {10.1109/ACSAC.2009.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiAPSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiJS09,
  author       = {Lixin Li and
                  James E. Just and
                  R. Sekar},
  title        = {Online Signature Generation for Windows Systems},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.34},
  doi          = {10.1109/ACSAC.2009.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MoyerBSMJ09,
  author       = {Thomas Moyer and
                  Kevin R. B. Butler and
                  Joshua Schiffman and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {Scalable Web Content Attestation},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.19},
  doi          = {10.1109/ACSAC.2009.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MoyerBSMJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Neumann09,
  author       = {Peter G. Neumann},
  title        = {Computer-Related Risk Futures},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {35--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.13},
  doi          = {10.1109/ACSAC.2009.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Neumann09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NguyenSJGKN09,
  author       = {Anh M. Nguyen and
                  Nabil Schear and
                  HeeDong Jung and
                  Apeksha Godiyal and
                  Samuel T. King and
                  Hai D. Nguyen},
  title        = {{MAVMM:} Lightweight and Purpose Built {VMM} for Malware Analysis},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {441--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.48},
  doi          = {10.1109/ACSAC.2009.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NguyenSJGKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NohlE09,
  author       = {Karsten Nohl and
                  David Evans},
  title        = {Privacy through Noise: {A} Design Space for Private Identification},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {518--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.55},
  doi          = {10.1109/ACSAC.2009.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NohlE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OkhraviN09,
  author       = {Hamed Okhravi and
                  David M. Nicol},
  title        = {TrustGraph: Trusted Graphics Subsystem for High Assurance Systems},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {254--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.31},
  doi          = {10.1109/ACSAC.2009.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OkhraviN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OliveiraW09,
  author       = {Daniela Alvim Seabra de Oliveira and
                  Shyhtsun Felix Wu},
  title        = {Protecting Kernel Code and Data with a Virtualization-Aware Collaborative
                  Operating System},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {451--460},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.49},
  doi          = {10.1109/ACSAC.2009.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OliveiraW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OngtangMEM09,
  author       = {Machigar Ongtang and
                  Stephen E. McLaughlin and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {Semantically Rich Application-Centric Security in Android},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {340--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.39},
  doi          = {10.1109/ACSAC.2009.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OngtangMEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OsterweilMZ09,
  author       = {Eric Osterweil and
                  Daniel Massey and
                  Lixia Zhang},
  title        = {Deploying and Monitoring {DNS} Security {(DNSSEC)}},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {429--438},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.47},
  doi          = {10.1109/ACSAC.2009.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OsterweilMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OuRS09,
  author       = {Xinming Ou and
                  Siva Raj Rajagopalan and
                  Sakthiyuvaraja Sakthivelmurugan},
  title        = {An Empirical Approach to Modeling Uncertainty in Intrusion Analysis},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {494--503},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.53},
  doi          = {10.1109/ACSAC.2009.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OuRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkGT09,
  author       = {Frank S. Park and
                  Chinmay Gangakhedkar and
                  Patrick Traynor},
  title        = {Leveraging Cellular Infrastructure to Improve Fraud Prevention},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {350--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.40},
  doi          = {10.1109/ACSAC.2009.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkGT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ParkR09,
  author       = {Young Hee Park and
                  Douglas S. Reeves},
  title        = {Identification of Bot Commands by Run-Time Execution Monitoring},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {321--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.37},
  doi          = {10.1109/ACSAC.2009.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ParkR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PaulT09,
  author       = {Nathanael Paul and
                  Andrew S. Tanenbaum},
  title        = {The Design of a Trustworthy Voting System},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {507--517},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.54},
  doi          = {10.1109/ACSAC.2009.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PaulT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PerdisciCDL09,
  author       = {Roberto Perdisci and
                  Igino Corona and
                  David Dagon and
                  Wenke Lee},
  title        = {Detecting Malicious Flux Service Networks through Passive Analysis
                  of Recursive {DNS} Traces},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {311--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.36},
  doi          = {10.1109/ACSAC.2009.36},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PerdisciCDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RogliaMPB09,
  author       = {Giampaolo Fresi Roglia and
                  Lorenzo Martignoni and
                  Roberto Paleari and
                  Danilo Bruschi},
  title        = {Surgically Returning to Randomized lib(c)},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {60--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.16},
  doi          = {10.1109/ACSAC.2009.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RogliaMPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchiffmanMSJM09,
  author       = {Joshua Schiffman and
                  Thomas Moyer and
                  Christopher Shal and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Justifying Integrity Using a Virtual Machine Verifier},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {83--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.18},
  doi          = {10.1109/ACSAC.2009.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchiffmanMSJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StarkHB09,
  author       = {Emily Stark and
                  Michael Hamburg and
                  Dan Boneh},
  title        = {Symmetric Cryptography in Javascript},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {373--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.42},
  doi          = {10.1109/ACSAC.2009.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StarkHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Stone-GrossKAMK09,
  author       = {Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Kevin C. Almeroth and
                  Andreas Moser and
                  Engin Kirda},
  title        = {{FIRE:} FInding Rogue nEtworks},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {231--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.29},
  doi          = {10.1109/ACSAC.2009.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Stone-GrossKAMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunHB09,
  author       = {San{-}Tsai Sun and
                  Kirstie Hawkey and
                  Konstantin Beznosov},
  title        = {Secure Web 2.0 Content Sharing Beyond Walled Gardens},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {409--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.45},
  doi          = {10.1109/ACSAC.2009.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VuABD09,
  author       = {Le{-}Hung Vu and
                  Karl Aberer and
                  Sonja Buchegger and
                  Anwitaman Datta},
  title        = {Enabling Secure Secret Sharing in Distributed Online Social Networks},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {419--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.46},
  doi          = {10.1109/ACSAC.2009.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VuABD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangGC09,
  author       = {Hua Wang and
                  Yao Guo and
                  Xiangqun Chen},
  title        = {FPValidator: Validating Type Equivalence of Function Pointers on the
                  Fly},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {51--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.15},
  doi          = {10.1109/ACSAC.2009.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJZL09,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  title        = {Detecting Software Theft via System Call Based Birthmarks},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {149--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.24},
  doi          = {10.1109/ACSAC.2009.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiDYG09,
  author       = {Wei Wei and
                  Juan Du and
                  Ting Yu and
                  Xiaohui Gu},
  title        = {SecureMR: {A} Service Integrity Assurance Framework for MapReduce},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {73--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.17},
  doi          = {10.1109/ACSAC.2009.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiDYG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieCTHC09,
  author       = {Anmin Xie and
                  Zhuhua Cai and
                  Cong Tang and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {Evaluating Network Security With Two-Layer Attack Graphs},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.22},
  doi          = {10.1109/ACSAC.2009.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieCTHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XiongJL09,
  author       = {Xi Xiong and
                  Xiaoqi Jia and
                  Peng Liu},
  title        = {{SHELF:} Preserving Business Continuity and Availability in an Intrusion
                  Recovery System},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {484--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.52},
  doi          = {10.1109/ACSAC.2009.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XiongJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB09,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Jian Weng and
                  Feng Bao},
  title        = {A New Approach for Anonymous Password Authentication},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {199--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.26},
  doi          = {10.1109/ACSAC.2009.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YavuzN09,
  author       = {Attila Altay Yavuz and
                  Peng Ning},
  title        = {{BAF:} An Efficient Publicly Verifiable Secure Audit Logging Scheme
                  for Distributed Systems},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {219--228},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.28},
  doi          = {10.1109/ACSAC.2009.28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YavuzN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangRVZ09,
  author       = {Dana Zhang and
                  Kotagiri Ramamohanarao and
                  Steven Versteeg and
                  Rui Zhang},
  title        = {RoleVAT: Visual Assessment of Practical Need for Role Based Access
                  Control},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.11},
  doi          = {10.1109/ACSAC.2009.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangRVZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZugenmaierLJ09,
  author       = {Alf Zugenmaier and
                  Sven Lachmund and
                  Dileesh Jostin},
  title        = {Transparent Encryption for External Storage Media with Key Management
                  Adapted to Mobile Use},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {333--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.38},
  doi          = {10.1109/ACSAC.2009.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZugenmaierLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2009,
  title        = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5379501/proceeding},
  isbn         = {978-0-7695-3919-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AktasG08,
  author       = {Erdem Aktas and
                  Kanad Ghose},
  title        = {{DARE:} {A} Framework for Dynamic Authentication of Remote Executions},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {453--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.49},
  doi          = {10.1109/ACSAC.2008.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AktasG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlsalehBO08,
  author       = {Mansour Alsaleh and
                  David Barrera and
                  Paul C. van Oorschot},
  title        = {Improving Security Visualization with Exposure Map Filtering},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {205--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.16},
  doi          = {10.1109/ACSAC.2008.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlsalehBO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaiGCWXM08,
  author       = {Xiaole Bai and
                  Wenjun Gu and
                  Sriram Chellappan and
                  Xun Wang and
                  Dong Xuan and
                  Bin Ma},
  title        = {{PAS:} Predicate-Based Authentication Services Against Powerful Passive
                  Adversaries},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {433--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.23},
  doi          = {10.1109/ACSAC.2008.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaiGCWXM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaligaGI08,
  author       = {Arati Baliga and
                  Vinod Ganapathy and
                  Liviu Iftode},
  title        = {Automatic Inference and Enforcement of Kernel Data Structure Invariants},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {77--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.29},
  doi          = {10.1109/ACSAC.2008.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaligaGI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BeresGSHMV08,
  author       = {Yolanta Beres and
                  Jonathan Griffin and
                  Simon Shiu and
                  Max Heitman and
                  David Markle and
                  Peter Ventura},
  title        = {Analysing the Performance of Security Solutions to Reduce Vulnerability
                  Exposure Window},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.42},
  doi          = {10.1109/ACSAC.2008.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BeresGSHMV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CapizziLVS08,
  author       = {Roberto Capizzi and
                  Antonio Longo and
                  V. N. Venkatakrishnan and
                  A. Prasad Sistla},
  title        = {Preventing Information Leaks through Shadow Executions},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {322--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.50},
  doi          = {10.1109/ACSAC.2008.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CapizziLVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CimatoGPSS08,
  author       = {Stelvio Cimato and
                  Marco Gamassi and
                  Vincenzo Piuri and
                  Roberto Sassi and
                  Fabio Scotti},
  title        = {Privacy-Aware Biometrics: Design and Implementation of a Multimodal
                  Verification System},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {130--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.13},
  doi          = {10.1109/ACSAC.2008.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CimatoGPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ColeL08,
  author       = {Robert J. Cole and
                  Peng Liu},
  title        = {Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding
                  Multi-Step Analysis},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.14},
  doi          = {10.1109/ACSAC.2008.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ColeL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckBRMS08,
  author       = {William Enck and
                  Kevin R. B. Butler and
                  Thomas Richardson and
                  Patrick D. McDaniel and
                  Adam D. Smith},
  title        = {Defending Against Attacks on Main Memory Persistence},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.45},
  doi          = {10.1109/ACSAC.2008.45},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckBRMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckMJ08,
  author       = {William Enck and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {PinUP: Pinning User Files to Known Applications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.41},
  doi          = {10.1109/ACSAC.2008.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckMJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FarrellGW08,
  author       = {Paul F. Farrell Jr. and
                  Simson L. Garfinkel and
                  Douglas White},
  title        = {Practical Applications of Bloom Filters to the {NIST} {RDS} and Hard
                  Drive Triage},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.12},
  doi          = {10.1109/ACSAC.2008.12},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FarrellGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ForrestAHS08,
  author       = {Stephanie Forrest and
                  Steven A. Hofmeyr and
                  Anil Somayaji},
  title        = {The Evolution of System-Call Monitoring},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {418--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.54},
  doi          = {10.1109/ACSAC.2008.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ForrestAHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FraserC08,
  author       = {Barbara Fraser and
                  Stephen D. Crocker},
  title        = {Epilogue for {RFC} 1281, Guidelines for the Secure Operation of the
                  Internet},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {405--417},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.57},
  doi          = {10.1109/ACSAC.2008.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FraserC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FraserEA08,
  author       = {Timothy Fraser and
                  Matthew R. Evenson and
                  William A. Arbaugh},
  title        = {{VICI} Virtual Machine Introspection for Cognitive Immunity},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {87--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.33},
  doi          = {10.1109/ACSAC.2008.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FraserEA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Frias-MartinezSK08,
  author       = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and
                  Salvatore J. Stolfo and
                  Angelos D. Keromytis},
  title        = {Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection
                  Sensors},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {367--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.30},
  doi          = {10.1109/ACSAC.2008.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Frias-MartinezSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoGCWL08,
  author       = {Haichang Gao and
                  Xuewu Guo and
                  Xiaoping Chen and
                  Liming Wang and
                  Xiyang Liu},
  title        = {{YAGP:} Yet Another Graphical Password Strategy},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {121--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.19},
  doi          = {10.1109/ACSAC.2008.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoGCWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GrilloLMI08,
  author       = {Antonio Grillo and
                  Alessandro Lentini and
                  Gianluigi Me and
                  Giuseppe F. Italiano},
  title        = {Transaction Oriented Text Messaging with Trusted-SMS},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {485--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.43},
  doi          = {10.1109/ACSAC.2008.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GrilloLMI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuoVA08,
  author       = {Qi Guo and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {237--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.38},
  doi          = {10.1109/ACSAC.2008.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuoVA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HasanWCSR08,
  author       = {Ragib Hasan and
                  Marianne Winslett and
                  Richard M. Conlan and
                  Brian Slesinsky and
                  Nandakumar Ramani},
  title        = {Please Permit Me: Stateless Delegated Authorization in Mashups},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {173--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.24},
  doi          = {10.1109/ACSAC.2008.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HasanWCSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HewettK08,
  author       = {Rattikorn Hewett and
                  Phongphun Kijsanayothin},
  title        = {Host-Centric Model Checking for Network Vulnerability Analysis},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {225--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.15},
  doi          = {10.1109/ACSAC.2008.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HewettK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HorstS08,
  author       = {Timothy W. van der Horst and
                  Kent E. Seamons},
  title        = {pwdArmor: Protecting Conventional Password-Based Authentications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {443--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.46},
  doi          = {10.1109/ACSAC.2008.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HorstS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsEP08,
  author       = {Martin Johns and
                  Bj{\"{o}}rn Engelmann and
                  Joachim Posegga},
  title        = {{XSSDS:} Server-Side Detection of Cross-Site Scripting Attacks},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {335--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.36},
  doi          = {10.1109/ACSAC.2008.36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsEP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarjothSH08,
  author       = {G{\"{u}}nter Karjoth and
                  Andreas Schade and
                  Els Van Herreweghen},
  title        = {Implementing ACL-Based Policies in {XACML}},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {183--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.31},
  doi          = {10.1109/ACSAC.2008.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KarjothSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KohlerS08,
  author       = {Mathias Kohler and
                  Andreas Schaad},
  title        = {ProActive Access Control for Business Process-Driven Environments},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {153--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.26},
  doi          = {10.1109/ACSAC.2008.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KohlerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiPGF08,
  author       = {Peng Li and
                  Hyundo Park and
                  Debin Gao and
                  Jianming Fu},
  title        = {Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly
                  Detection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {392--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.17},
  doi          = {10.1109/ACSAC.2008.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiPGF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MartinHXH08,
  author       = {Evan Martin and
                  JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu},
  title        = {Assessing Quality of Policy Properties in Verification of Access Control
                  Policies},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {163--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.48},
  doi          = {10.1109/ACSAC.2008.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MartinHXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MassicotteLB08,
  author       = {Fr{\'{e}}d{\'{e}}ric Massicotte and
                  Yvan Labiche and
                  Lionel C. Briand},
  title        = {Toward Automatic Generation of Intrusion Detection Verification Rules},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {279--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.27},
  doi          = {10.1109/ACSAC.2008.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MassicotteLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NandaC08,
  author       = {Susanta Nanda and
                  Tzi{-}cker Chiueh},
  title        = {Execution Trace-Driven Automated Attack Signature Generation},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {195--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.58},
  doi          = {10.1109/ACSAC.2008.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NandaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OConnorR08,
  author       = {Terrence O'Connor and
                  Douglas S. Reeves},
  title        = {Bluetooth Network-Based Misuse Detection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {377--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.39},
  doi          = {10.1109/ACSAC.2008.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OConnorR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OMeliaE08,
  author       = {Sean O'Melia and
                  Adam J. Elbirt},
  title        = {Instruction Set Extensions for Enhancing the Performance of Symmetric-Key
                  Cryptography},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {465--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.10},
  doi          = {10.1109/ACSAC.2008.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OMeliaE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PerdisciLL08,
  author       = {Roberto Perdisci and
                  Andrea Lanzi and
                  Wenke Lee},
  title        = {McBoost: Boosting Scalability in Malware Collection and Analysis Using
                  Statistical Classification of Executables},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {301--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.22},
  doi          = {10.1109/ACSAC.2008.22},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PerdisciLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Salehi-AbariTO08,
  author       = {Amirali Salehi{-}Abari and
                  Julie Thorpe and
                  Paul C. van Oorschot},
  title        = {On Purely Automated Attacks and Click-Based Graphical Passwords},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.18},
  doi          = {10.1109/ACSAC.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Salehi-AbariTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Saydjari08,
  author       = {O. Sami Saydjari},
  title        = {Structuring for Strategic Cyber Defense: {A} Cyber Manhattan Project
                  Blueprint},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.53},
  doi          = {10.1109/ACSAC.2008.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Saydjari08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchmerlKFMR08,
  author       = {Sebastian Schmerl and
                  Hartmut K{\"{o}}nig and
                  Ulrich Flegel and
                  Michael Meier and
                  Ren{\'{e}} Rietz},
  title        = {Systematic Signature Engineering by Re-use of Snort Signatures},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {23--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.20},
  doi          = {10.1109/ACSAC.2008.20},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SchmerlKFMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SohrMBA08,
  author       = {Karsten Sohr and
                  Tanveer Mustafa and
                  Xinyu Bao and
                  Gail{-}Joon Ahn},
  title        = {Enforcing Role-Based Access Control Policies in Web Services with
                  {UML} and {OCL}},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {257--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.35},
  doi          = {10.1109/ACSAC.2008.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SohrMBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StuderJKOC08,
  author       = {Ahren Studer and
                  Christina Johns and
                  Jaanus Kase and
                  Kyle O'Meara and
                  Lorrie Faith Cranor},
  title        = {A Survey to Guide Group Key Protocol Development},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {475--484},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.28},
  doi          = {10.1109/ACSAC.2008.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/StuderJKOC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TannousTHMJ08,
  author       = {Albert Tannous and
                  Jonathan T. Trostle and
                  Mohamed Hassan and
                  Stephen E. McLaughlin and
                  Trent Jaeger},
  title        = {New Side Channels Targeted at Passwords},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {45--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.47},
  doi          = {10.1109/ACSAC.2008.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TannousTHMJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Vasudevan08,
  author       = {Amit Vasudevan},
  title        = {MalTRAK: Tracking and Eliminating Unknown Malware},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {311--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.44},
  doi          = {10.1109/ACSAC.2008.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Vasudevan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangHT08,
  author       = {Xunhua Wang and
                  Philip D. Huff and
                  Brett C. Tjaden},
  title        = {Improving the Efficiency of Capture-Resistant Biometric Authentication
                  Based on Set Intersection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {140--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.11},
  doi          = {10.1109/ACSAC.2008.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJZL08,
  author       = {Xinran Wang and
                  Yoon{-}chan Jhi and
                  Sencun Zhu and
                  Peng Liu},
  title        = {{STILL:} Exploit Code Detection via Static Taint and Initialization
                  Analyses},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.37},
  doi          = {10.1109/ACSAC.2008.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiPGP08,
  author       = {Jinpeng Wei and
                  Bryan D. Payne and
                  Jonathon Giffin and
                  Calton Pu},
  title        = {Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {97--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.40},
  doi          = {10.1109/ACSAC.2008.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiPGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YueW08,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {Anti-Phishing in Offense and Defense},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {345--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.32},
  doi          = {10.1109/ACSAC.2008.32},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YueW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZarandioonYG08,
  author       = {Saman Zarandioon and
                  Danfeng Yao and
                  Vinod Ganapathy},
  title        = {{OMOS:} {A} Framework for Secure Communication in Mashup Applications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {355--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.25},
  doi          = {10.1109/ACSAC.2008.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZarandioonYG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangFWX08,
  author       = {Yinqian Zhang and
                  Xun Fan and
                  Yijun Wang and
                  Zhi Xue},
  title        = {Attack Grammar: {A} New Approach to Modeling and Analyzing Network
                  Attack Sequences},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.34},
  doi          = {10.1109/ACSAC.2008.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangFWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangREY08,
  author       = {Dana Zhang and
                  Kotagiri Ramamohanarao and
                  Tim Ebringer and
                  Trevor Yann},
  title        = {Permission Set Mining: Discovering Practical and Useful Roles},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {247--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.21},
  doi          = {10.1109/ACSAC.2008.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangREY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2008,
  title        = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4721525/proceeding},
  isbn         = {978-0-7695-3447-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AggarwalBDKLSZ07,
  author       = {Sudhir Aggarwal and
                  Jasbinder Bali and
                  Zhenhai Duan and
                  Leo Kermes and
                  Wayne Liu and
                  Shahank Sahai and
                  Zhenghui Zhu},
  title        = {The Design and Development of an Undercover Multipurpose Anti-spoofing
                  Kit (UnMask)},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {141--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.12},
  doi          = {10.1109/ACSAC.2007.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AggarwalBDKLSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivLPK07,
  author       = {Adam J. Aviv and
                  Michael E. Locasto and
                  Shaya Potter and
                  Angelos D. Keromytis},
  title        = {{SSARES:} Secure Searchable Automated Remote Email Storage},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {129--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.30},
  doi          = {10.1109/ACSAC.2007.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivLPK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BordersPZ07,
  author       = {Kevin Borders and
                  Atul Prakash and
                  Mark Zielinski},
  title        = {Spector: Automatically Analyzing Shell Code},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {501--514},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.11},
  doi          = {10.1109/ACSAC.2007.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BordersPZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CentonzeFP07,
  author       = {Paolina Centonze and
                  Robert J. Flynn and
                  Marco Pistoia},
  title        = {Combining Static and Dynamic Analysis for Automatic Identification
                  of Precise Access-Control Policies},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {292--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.39},
  doi          = {10.1109/ACSAC.2007.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CentonzeFP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChandraF07,
  author       = {Deepak Chandra and
                  Michael Franz},
  title        = {Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual
                  Machine},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {463--475},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.37},
  doi          = {10.1109/ACSAC.2007.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChandraF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ClairSJM07,
  author       = {Luke St. Clair and
                  Joshua Schiffman and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {Establishing and Sustaining System Integrity via Root of Trust Installation},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {19--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.25},
  doi          = {10.1109/ACSAC.2007.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ClairSJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CoskunM07,
  author       = {Baris Coskun and
                  Nasir D. Memon},
  title        = {Efficient Detection of Delay-Constrained Relay Nodes},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {353--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.29},
  doi          = {10.1109/ACSAC.2007.29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CoskunM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DagonGLL07,
  author       = {David Dagon and
                  Guofei Gu and
                  Christopher P. Lee and
                  Wenke Lee},
  title        = {A Taxonomy of Botnet Structures},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {325--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.44},
  doi          = {10.1109/ACSAC.2007.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DagonGLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DeLongNIL07,
  author       = {Rance J. DeLong and
                  Thuy D. Nguyen and
                  Cynthia E. Irvine and
                  Timothy E. Levin},
  title        = {Toward a Medium-Robustness Separation Kernel Protection Profile},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {40--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.17},
  doi          = {10.1109/ACSAC.2007.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DeLongNIL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EvansGG07,
  author       = {Nathan S. Evans and
                  Chris GauthierDickey and
                  Christian Grothoff},
  title        = {Routing in the Dark: Pitch Black},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {305--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.7},
  doi          = {10.1109/ACSAC.2007.7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/EvansGG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GehaniL07,
  author       = {Ashish Gehani and
                  Ulf Lindqvist},
  title        = {Bonsai: Balanced Lineage Authentication},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {363--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.45},
  doi          = {10.1109/ACSAC.2007.45},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GehaniL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GroveMONJBH07,
  author       = {Duncan A. Grove and
                  Toby C. Murray and
                  Chris A. Owen and
                  Chris J. North and
                  J. A. Jones and
                  Mark R. Beaumont and
                  Bradley D. Hopkins},
  title        = {An Overview of the Annex System},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {341--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.8},
  doi          = {10.1109/ACSAC.2007.8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GroveMONJBH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GundyCSV07,
  author       = {Matthew Van Gundy and
                  Hao Chen and
                  Zhendong Su and
                  Giovanni Vigna},
  title        = {Feature Omission Vulnerabilities: Thwarting Signature Generation for
                  Polymorphic Worms},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {74--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.42},
  doi          = {10.1109/ACSAC.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HellewellS07,
  author       = {Phillip L. Hellewell and
                  Kent E. Seamons},
  title        = {Extensible Pre-authentication Kerberos},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {201--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.33},
  doi          = {10.1109/ACSAC.2007.33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HellewellS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HicksMM07,
  author       = {Boniface Hicks and
                  Tim Misiak and
                  Patrick D. McDaniel},
  title        = {Channels: Runtime System Infrastructure for Security-Typed Languages},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {443--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.35},
  doi          = {10.1109/ACSAC.2007.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HicksMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/IonDC07,
  author       = {Iulia Ion and
                  Boris Dragovic and
                  Bruno Crispo},
  title        = {Extending the Java Virtual Machine to Enforce Fine-Grained Security
                  Policies in Mobile Devices},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {233--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.36},
  doi          = {10.1109/ACSAC.2007.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/IonDC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JosangAGAM07,
  author       = {Audun J{\o}sang and
                  Bander AlFayyadh and
                  Tyrone Grandison and
                  Mohammed Al Zomai and
                  Judith McNamara},
  title        = {Security Usability Principles for Vulnerability Analysis and Risk
                  Assessment},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.14},
  doi          = {10.1109/ACSAC.2007.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JosangAGAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Kemmerer07,
  author       = {Richard A. Kemmerer},
  title        = {So You Think You Can Dance?},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.49},
  doi          = {10.1109/ACSAC.2007.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Kemmerer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiayiasMRSSSD07,
  author       = {Aggelos Kiayias and
                  Laurent Michel and
                  Alexander Russell and
                  Narasimha K. Shashidhar and
                  Andrew See and
                  Alexander A. Shvartsman and
                  Seda Davtyan},
  title        = {Tampering with Special Purpose Trusted Computing Devices: {A} Case
                  Study in Optical Scan E-Voting},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {30--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.16},
  doi          = {10.1109/ACSAC.2007.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiayiasMRSSSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KilSNZ07,
  author       = {Chongkyung Kil and
                  Emre Can Sezer and
                  Peng Ning and
                  Xiaolan Zhang},
  title        = {Automated Security Debugging Using Program Structural Constraints},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {453--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.19},
  doi          = {10.1109/ACSAC.2007.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KilSNZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KillourhyM07,
  author       = {Kevin S. Killourhy and
                  Roy A. Maxion},
  title        = {Toward Realistic and Artifact-Free Insider-Threat Data},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {87--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.31},
  doi          = {10.1109/ACSAC.2007.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KillourhyM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KosugaKHHT07,
  author       = {Yuji Kosuga and
                  Kenji Kono and
                  Miyuki Hanaoka and
                  Miho Hishiyama and
                  Yu Takahama},
  title        = {Sania: Syntactic and Semantic Analysis for Automated Testing against
                  {SQL} Injection},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {107--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.20},
  doi          = {10.1109/ACSAC.2007.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KosugaKHHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KruegelBRV07,
  author       = {Christopher Kruegel and
                  Davide Balzarotti and
                  William K. Robertson and
                  Giovanni Vigna},
  title        = {Improving Signature Testing through Dynamic Data Flow Analysis},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {53--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.40},
  doi          = {10.1109/ACSAC.2007.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KruegelBRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiC07,
  author       = {Wei Li and
                  Tzi{-}cker Chiueh},
  title        = {Automated Format String Attack Prevention for Win32/X86 Binaries},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {398--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.23},
  doi          = {10.1109/ACSAC.2007.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MartignoniCJ07,
  author       = {Lorenzo Martignoni and
                  Mihai Christodorescu and
                  Somesh Jha},
  title        = {OmniUnpack: Fast, Generic, and Safe Unpacking of Malware},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {431--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.15},
  doi          = {10.1109/ACSAC.2007.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MartignoniCJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MeierFS07,
  author       = {Michael Meier and
                  Ulrich Flegel and
                  Sebastian Schmerl},
  title        = {Efficiency Issues of Rete-Based Expert Systems for Misuse Detection},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {151--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.22},
  doi          = {10.1109/ACSAC.2007.22},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MeierFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MelchorDI07,
  author       = {Carlos Aguilar Melchor and
                  Yves Deswarte and
                  Julien Iguchi{-}Cartigny},
  title        = {Closed-Circuit Unobservable Voice over {IP}},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {119--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.34},
  doi          = {10.1109/ACSAC.2007.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MelchorDI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MoserKK07,
  author       = {Andreas Moser and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Limits of Static Analysis for Malware Detection},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {421--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.21},
  doi          = {10.1109/ACSAC.2007.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MoserKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PayneL07,
  author       = {Bryan D. Payne and
                  Wenke Lee},
  title        = {Secure and Flexible Monitoring of Virtual Machines},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {385--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.10},
  doi          = {10.1109/ACSAC.2007.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PayneL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RadhakrishnanS07,
  author       = {Manigandan Radhakrishnan and
                  Jon A. Solworth},
  title        = {Quarantining Untrusted Entities: Dynamic Sandboxing Using {LEAP}},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {211--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.46},
  doi          = {10.1109/ACSAC.2007.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RadhakrishnanS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RandellR07,
  author       = {Brian Randell and
                  John M. Rushby},
  title        = {Distributed Secure Systems: Then and Now},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {177--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.48},
  doi          = {10.1109/ACSAC.2007.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RandellR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SlowinskaB07,
  author       = {Asia Slowinska and
                  Herbert Bos},
  title        = {The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows
                  on Heap or Stack},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {487--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.32},
  doi          = {10.1109/ACSAC.2007.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SlowinskaB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SparksECZ07,
  author       = {Sherri Sparks and
                  Shawn Embleton and
                  Ryan Cunningham and
                  Cliff Changchun Zou},
  title        = {Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary
                  Input Crafting},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {477--486},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.27},
  doi          = {10.1109/ACSAC.2007.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SparksECZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SterneLGRMK07,
  author       = {Daniel Sterne and
                  Geoffrey Lawler and
                  Richard Gopaul and
                  Brian Rivera and
                  Kelvin Marcus and
                  Peter Kruus},
  title        = {Countering False Accusations and Collusion in the Detection of In-Band
                  Wormholes},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {243--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.41},
  doi          = {10.1109/ACSAC.2007.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SterneLGRMK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SzydlowskiKK07,
  author       = {Martin Szydlowski and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Secure Input for Web Applications},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {375--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.28},
  doi          = {10.1109/ACSAC.2007.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SzydlowskiKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TsybulnikHT07,
  author       = {Nathalie Tsybulnik and
                  Kevin W. Hamlen and
                  Bhavani Thuraisingham},
  title        = {Centralized Security Labels in Decentralized {P2P} Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {315--324},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.13},
  doi          = {10.1109/ACSAC.2007.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TsybulnikHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ValdezSP07,
  author       = {Enriquillo Valdez and
                  Reiner Sailer and
                  Ronald Perez},
  title        = {Retrofitting the {IBM} {POWER} Hypervisor to Support Mandatory Access
                  Control},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {221--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.43},
  doi          = {10.1109/ACSAC.2007.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ValdezSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Weitzner07,
  author       = {Daniel J. Weitzner},
  title        = {Personal Privacy without Computational Obscurity: Rethinking Privacy
                  Protection Strategies for Open Information Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {173--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.50},
  doi          = {10.1109/ACSAC.2007.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Weitzner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WhyteOK07,
  author       = {David Whyte and
                  Paul C. van Oorschot and
                  Evangelos Kranakis},
  title        = {Tracking Darkports for Network Defense},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {161--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.38},
  doi          = {10.1109/ACSAC.2007.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WhyteOK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieWW07,
  author       = {Mengjun Xie and
                  Zhenyu Wu and
                  Haining Wang},
  title        = {HoneyIM: Fast Detection and Suppression of Instant Messaging Malware
                  in Enterprise-Like Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {64--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.24},
  doi          = {10.1109/ACSAC.2007.24},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/XieWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanA07,
  author       = {Jeff Yan and
                  Ahmad Salah El Ahmad},
  title        = {Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {279--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.47},
  doi          = {10.1109/ACSAC.2007.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YanA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YuZL07,
  author       = {Meng Yu and
                  Wanyu Zang and
                  Peng Liu},
  title        = {Database Isolation and Filtering against Data Corruption Attacks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {97--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.18},
  doi          = {10.1109/ACSAC.2007.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YuZL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangR07,
  author       = {Qinghua Zhang and
                  Douglas S. Reeves},
  title        = {MetaAware: Identifying Metamorphic Malware},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {411--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.9},
  doi          = {10.1109/ACSAC.2007.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhuASJR07,
  author       = {Bo Zhu and
                  Venkata Gopala Krishna Addada and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Sankardas Roy},
  title        = {Efficient Distributed Detection of Node Replication Attacks in Sensor
                  Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {257--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.26},
  doi          = {10.1109/ACSAC.2007.26},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhuASJR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2007,
  title        = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4412959/proceeding},
  isbn         = {0-7695-3060-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BaiL06,
  author       = {Kun Bai and
                  Peng Liu},
  title        = {Towards Database Firewall: Mining the Damage Spreading Patterns},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {449--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.52},
  doi          = {10.1109/ACSAC.2006.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BaiL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Baker06,
  author       = {Dixie B. Baker},
  title        = {Privacy and Security in Public Health: Maintaining the Delicate Balance
                  between Personal Privacy and Population Safety},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {3--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.41},
  doi          = {10.1109/ACSAC.2006.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Baker06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BobbaFKGK06,
  author       = {Rakeshbabu Bobba and
                  Omid Fatemieh and
                  Fariba Khan and
                  Carl A. Gunter and
                  Himanshu Khurana},
  title        = {Using Attribute-Based Access Control to Enable Attribute-Based Messaging},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {403--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.53},
  doi          = {10.1109/ACSAC.2006.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BobbaFKGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenLCJ06,
  author       = {Shiping Chen and
                  Dongyu Liu and
                  Songqing Chen and
                  Sushil Jajodia},
  title        = {{V-COPS:} {A} Vulnerability-Based Cooperative Alert Distribution System},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {43--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.54},
  doi          = {10.1109/ACSAC.2006.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenLCJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CovaFBV06,
  author       = {Marco Cova and
                  Viktoria Felmetsger and
                  Greg Banks and
                  Giovanni Vigna},
  title        = {Static Detection of Vulnerabilities in x86 Executables},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {269--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.50},
  doi          = {10.1109/ACSAC.2006.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CovaFBV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DucK06,
  author       = {Guillaume Duc and
                  Ronan Keryell},
  title        = {CryptoPage: An Efficient Secure Architecture with Memory Encryption,
                  Integrity and Information Leakage Protection},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {483--492},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.21},
  doi          = {10.1109/ACSAC.2006.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DucK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Epstein06,
  author       = {Jeremy Epstein},
  title        = {Fifteen Years after {TX:} {A} Look Back at High Assurance Multi-Level
                  Secure Windowing},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {301--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.28},
  doi          = {10.1109/ACSAC.2006.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Epstein06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FlorencioH06,
  author       = {Dinei A. F. Flor{\^{e}}ncio and
                  Cormac Herley},
  title        = {{KLASSP:} Entering Passwords on a Spyware Infected Machine Using a
                  Shared-Secret Proxy},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {67--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.32},
  doi          = {10.1109/ACSAC.2006.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FlorencioH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FongO06,
  author       = {Philip W. L. Fong and
                  Simon A. Orr},
  title        = {A Module System for Isolating Untrusted Software Extensions},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {203--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.7},
  doi          = {10.1109/ACSAC.2006.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FongO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GehaniC06,
  author       = {Ashish Gehani and
                  Surendar Chandra},
  title        = {{PAST:} Probabilistic Authentication of Sensor Timestamps},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {439--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.37},
  doi          = {10.1109/ACSAC.2006.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GehaniC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GillSC06,
  author       = {Rupinder Gill and
                  Jason Smith and
                  Andrew J. Clark},
  title        = {Specification-Based Intrusion Detection in WLANs},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {141--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.48},
  doi          = {10.1109/ACSAC.2006.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GillSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HicksAM06,
  author       = {Boniface Hicks and
                  Kiyan Ahmadizadeh and
                  Patrick D. McDaniel},
  title        = {From Languages to Systems: Understanding Practical Application Development
                  in Security-typed Languages},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {153--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.30},
  doi          = {10.1109/ACSAC.2006.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HicksAM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HortonS06,
  author       = {Jeffrey Horton and
                  Reihaneh Safavi{-}Naini},
  title        = {Detecting Policy Violations through Traffic Analysis},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {109--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.24},
  doi          = {10.1109/ACSAC.2006.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HortonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HsuCRLS06,
  author       = {Francis Hsu and
                  Hao Chen and
                  Thomas Ristenpart and
                  Jason Li and
                  Zhendong Su},
  title        = {Back to the Future: {A} Framework for Automatic Malware Removal and
                  System Repair},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {257--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.16},
  doi          = {10.1109/ACSAC.2006.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HsuCRLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/IngolsLP06,
  author       = {Kyle Ingols and
                  Richard Lippmann and
                  Keith Piwowarski},
  title        = {Practical Attack Graph Generation for Network Defense},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {121--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.39},
  doi          = {10.1109/ACSAC.2006.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/IngolsLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JacobB06,
  author       = {Nigel Jacob and
                  Carla E. Brodley},
  title        = {Offloading {IDS} Computation to the {GPU}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {371--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.35},
  doi          = {10.1109/ACSAC.2006.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JacobB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JammalamadakaHMSV06,
  author       = {Ravi Chandra Jammalamadaka and
                  Timothy W. van der Horst and
                  Sharad Mehrotra and
                  Kent E. Seamons and
                  Nalini Venkatasubramanian},
  title        = {Delegate: {A} Proxy Based Architecture for Secure Website Access from
                  an Untrusted Machine},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {57--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.23},
  doi          = {10.1109/ACSAC.2006.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JammalamadakaHMSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KhatiwalaSV06,
  author       = {Tejas Khatiwala and
                  Raj Swaminathan and
                  V. N. Venkatakrishnan},
  title        = {Data Sandboxing: {A} Technique for Enforcing Confidentiality Policies},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {223--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.22},
  doi          = {10.1109/ACSAC.2006.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KhatiwalaSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KiayiasKW06,
  author       = {Aggelos Kiayias and
                  Michael Korman and
                  David Walluck},
  title        = {An Internet Voting System Supporting User Privacy},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {165--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.12},
  doi          = {10.1109/ACSAC.2006.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KiayiasKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KilJBXN06,
  author       = {Chongkyung Kil and
                  Jinsuk Jun and
                  Christopher Bookholt and
                  Jun Xu and
                  Peng Ning},
  title        = {Address Space Layout Permutation {(ASLP):} Towards Fine-Grained Randomization
                  of Commodity Software},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {339--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.9},
  doi          = {10.1109/ACSAC.2006.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KilJBXN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LamC06,
  author       = {Lap{-}Chung Lam and
                  Tzi{-}cker Chiueh},
  title        = {A General Dynamic Information Flow Tracking Framework for Security
                  Applications},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {463--472},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.6},
  doi          = {10.1109/ACSAC.2006.6},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LamC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiJS06,
  author       = {Lixin Li and
                  James E. Just and
                  R. Sekar},
  title        = {Address-Space Randomization for Windows Systems},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {329--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.10},
  doi          = {10.1109/ACSAC.2006.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiJS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiLC06,
  author       = {Wei Li and
                  Lap{-}Chung Lam and
                  Tzi{-}cker Chiueh},
  title        = {How to Automatically and Accurately Sandbox Microsoft {IIS}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {213--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.31},
  doi          = {10.1109/ACSAC.2006.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MassicotteGLBC06,
  author       = {Fr{\'{e}}d{\'{e}}ric Massicotte and
                  Fran{\c{c}}ois Gagnon and
                  Yvan Labiche and
                  Lionel C. Briand and
                  Mathieu Couture},
  title        = {Automatic Evaluation of Intrusion Detection Systems},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {361--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.15},
  doi          = {10.1109/ACSAC.2006.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MassicotteGLBC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McCuneJBCS06,
  author       = {Jonathan M. McCune and
                  Trent Jaeger and
                  Stefan Berger and
                  Ram{\'{o}}n C{\'{a}}ceres and
                  Reiner Sailer},
  title        = {Shamon: {A} System for Distributed Mandatory Access Control},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {23--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.47},
  doi          = {10.1109/ACSAC.2006.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McCuneJBCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerV06,
  author       = {Collin Mulliner and
                  Giovanni Vigna},
  title        = {Vulnerability Analysis of {MMS} User Agents},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {77--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.55},
  doi          = {10.1109/ACSAC.2006.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MullinerV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NandaLLC06,
  author       = {Susanta Nanda and
                  Wei Li and
                  Lap{-}Chung Lam and
                  Tzi{-}cker Chiueh},
  title        = {Foreign Code Detection on the Windows/X86 Platform},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {279--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.29},
  doi          = {10.1109/ACSAC.2006.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NandaLLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Neumann06,
  author       = {Peter G. Neumann},
  title        = {Risks of Untrustworthiness},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {321--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.45},
  doi          = {10.1109/ACSAC.2006.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Neumann06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OikonomouMRR06,
  author       = {George C. Oikonomou and
                  Jelena Mirkovic and
                  Peter L. Reiher and
                  Max Robinson},
  title        = {A Framework for a Collaborative DDoS Defense},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.5},
  doi          = {10.1109/ACSAC.2006.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OikonomouMRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PanD06,
  author       = {Ying Pan and
                  Xuhua Ding},
  title        = {Anomaly Based Web Phishing Page Detection},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {381--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.13},
  doi          = {10.1109/ACSAC.2006.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PanD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RostadE06,
  author       = {Lillian R{\o}stad and
                  Ole Edsberg},
  title        = {A Study of Access Control Requirements for Healthcare Systems Based
                  on Audit Trails from Access Logs},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {175--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.8},
  doi          = {10.1109/ACSAC.2006.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RostadE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RoyalHDEL06,
  author       = {Paul Royal and
                  Mitch Halpin and
                  David Dagon and
                  Robert Edmonds and
                  Wenke Lee},
  title        = {PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing
                  Malware},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {289--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.38},
  doi          = {10.1109/ACSAC.2006.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RoyalHDEL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SmithEJ06,
  author       = {Randy Smith and
                  Cristian Estan and
                  Somesh Jha},
  title        = {Backtracking Algorithmic Complexity Attacks against a {NIDS}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {89--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.17},
  doi          = {10.1109/ACSAC.2006.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SmithEJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunPNW06,
  author       = {Kun Sun and
                  Pai Peng and
                  Peng Ning and
                  Cliff Wang},
  title        = {Secure Distributed Cluster Formation in Wireless Sensor Networks},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.46},
  doi          = {10.1109/ACSAC.2006.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunPNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJG06,
  author       = {Hao Wang and
                  Somesh Jha and
                  Vinod Ganapathy},
  title        = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {99--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.34},
  doi          = {10.1109/ACSAC.2006.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangL06,
  author       = {Zhenghong Wang and
                  Ruby B. Lee},
  title        = {Covert and Side Channels Due to Processor Architecture},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {473--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.20},
  doi          = {10.1109/ACSAC.2006.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeissB06,
  author       = {Yoav Weiss and
                  Elena Gabriela Barrantes},
  title        = {Known/Chosen Key Attacks against Software Instruction Set Randomization},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {349--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.33},
  doi          = {10.1109/ACSAC.2006.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeissB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WhyteOK06,
  author       = {David Whyte and
                  Paul C. van Oorschot and
                  Evangelos Kranakis},
  title        = {Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {393--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.11},
  doi          = {10.1109/ACSAC.2006.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WhyteOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Witten06,
  author       = {Brian Witten},
  title        = {Engineering Sufficiently Secure Computing},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {187--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.25},
  doi          = {10.1109/ACSAC.2006.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Witten06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieRO06,
  author       = {Yinglian Xie and
                  Michael K. Reiter and
                  David R. O'Hallaron},
  title        = {Protecting Privacy in Key-Value Search Systems},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {493--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.43},
  doi          = {10.1109/ACSAC.2006.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieRO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanC06,
  author       = {Jeff Yan and
                  Pook Leong Cho},
  title        = {Enhancing Collaborative Spam Detection with Bloom Filters},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {414--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.26},
  doi          = {10.1109/ACSAC.2006.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YanC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanE06,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {Bluetooth Worms: Models, Dynamics, and Defense Implications},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {245--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.18},
  doi          = {10.1109/ACSAC.2006.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YanE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YounanPPJ06,
  author       = {Yves Younan and
                  Davide Pozza and
                  Frank Piessens and
                  Wouter Joosen},
  title        = {Extended Protection against Stack Smashing Attacks without Performance
                  Loss},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {429--438},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.27},
  doi          = {10.1109/ACSAC.2006.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YounanPPJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YuWCXZ06,
  author       = {Wei Yu and
                  Xun Wang and
                  Prasad Calyam and
                  Dong Xuan and
                  Wei Zhao},
  title        = {On Detecting Camouflaging Worm},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {235--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.36},
  doi          = {10.1109/ACSAC.2006.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YuWCXZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2006,
  title        = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4041138/proceeding},
  isbn         = {0-7695-2716-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AmmannPSR05,
  author       = {Paul Ammann and
                  Joseph Pamula and
                  Julie A. Street and
                  Ronald W. Ritchey},
  title        = {A Host-Based Approach to Network Attack Chaining Analysis},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {72--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.6},
  doi          = {10.1109/CSAC.2005.6},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AmmannPSR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AnderssonCMSZ05,
  author       = {Stig Andersson and
                  Andrew J. Clark and
                  George M. Mohay and
                  Bradley L. Schatz and
                  Jacob Zimmermann},
  title        = {A Framework for Detecting Network-based Code Injection Attacks Targeting
                  Windows and {UNIX}},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {49--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.5},
  doi          = {10.1109/CSAC.2005.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AnderssonCMSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Bell05,
  author       = {David Elliott Bell},
  title        = {Looking Back at the Bell-La Padula Model},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {337--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.37},
  doi          = {10.1109/CSAC.2005.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Bell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BertinoKTV05,
  author       = {Elisa Bertino and
                  Ashish Kamra and
                  Evimaria Terzi and
                  Athena Vakali},
  title        = {Intrusion Detection in RBAC-administered Databases},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {170--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.33},
  doi          = {10.1109/CSAC.2005.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BertinoKTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BlackCG05,
  author       = {John Black and
                  Martin Cochran and
                  Ryan W. Gardner},
  title        = {Lessons Learned: {A} Security Analysis of the Internet Chess Club},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {245--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.36},
  doi          = {10.1109/CSAC.2005.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BlackCG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BruschiCLM05,
  author       = {Danilo Bruschi and
                  Lorenzo Cavallaro and
                  Andrea Lanzi and
                  Mattia Monga},
  title        = {Replay Attack in {TCG} Specification and Solution},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {127--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.47},
  doi          = {10.1109/CSAC.2005.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BruschiCLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChandramouliR05,
  author       = {Ramaswamy Chandramouli and
                  Scott Rose},
  title        = {An Integrity Verification Scheme for {DNS} Zone file based on Security
                  Impact Analysis},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {312--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.9},
  doi          = {10.1109/CSAC.2005.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChandramouliR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChongPARW05,
  author       = {Jennifer Chong and
                  Partha P. Pal and
                  Michael Atighetchi and
                  Paul Rubel and
                  Franklin Webber},
  title        = {Survivability Architecture of a Mission Critical System: The {DPASA}
                  Example},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {495--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.54},
  doi          = {10.1109/CSAC.2005.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChongPARW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Collier05,
  author       = {Marla Collier},
  title        = {How to Develop a Career in Information Assurance and How to Advance
                  in this Field},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {333},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.31},
  doi          = {10.1109/CSAC.2005.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Collier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CuiKT05,
  author       = {Weidong Cui and
                  Randy H. Katz and
                  Wai{-}tian Tan},
  title        = {Design and Implementation of an Extrusion-based Break-In Detector
                  for Personal Computers},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {361--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.19},
  doi          = {10.1109/CSAC.2005.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CuiKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DebbabiSTZ05,
  author       = {Mourad Debbabi and
                  Mohamed Mostafa Saleh and
                  Chamseddine Talhi and
                  Sami Zhioua},
  title        = {Java for Mobile Devices: {A} Security Study},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {235--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.34},
  doi          = {10.1109/CSAC.2005.34},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DebbabiSTZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FeskeH05,
  author       = {Norman Feske and
                  Christian Helmuth},
  title        = {A Nitpicker's guide to a minimal-complexity secure {GUI}},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.7},
  doi          = {10.1109/CSAC.2005.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FeskeH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FoleySLSKMTOSFBB05,
  author       = {Simon N. Foley and
                  Abe Singer and
                  Michael E. Locasto and
                  Stelios Sidiroglou and
                  Angelos D. Keromytis and
                  John P. McDermott and
                  Julie Thorpe and
                  Paul C. van Oorschot and
                  Anil Somayaji and
                  Richard Ford and
                  Mark Bush and
                  Alex Boulatov},
  title        = {Highlights from the 2005 New Security Paradigms Workshop},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {393--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.29},
  doi          = {10.1109/CSAC.2005.29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FoleySLSKMTOSFBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GiffinCK05,
  author       = {Jonathon T. Giffin and
                  Mihai Christodorescu and
                  Louis Kruger},
  title        = {Strengthening Software Self-Checksumming via Self-Modifying Code},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {23--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.53},
  doi          = {10.1109/CSAC.2005.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GiffinCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuoYC05,
  author       = {Fanglu Guo and
                  Yang Yu and
                  Tzi{-}cker Chiueh},
  title        = {Automated and Safe Vulnerability Assessment},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {150--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.11},
  doi          = {10.1109/CSAC.2005.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuoYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HaldarCF05,
  author       = {Vivek Haldar and
                  Deepak Chandra and
                  Michael Franz},
  title        = {Dynamic Taint Propagation for Java},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {303--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.21},
  doi          = {10.1109/CSAC.2005.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HaldarCF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JeyaramanT05,
  author       = {Sundararaman Jeyaraman and
                  Umut Topkara},
  title        = {Have the cake and eat it too - Infusing usability into text-password
                  based authentication systems},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {473--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.28},
  doi          = {10.1109/CSAC.2005.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JeyaramanT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JonesBR05,
  author       = {John P. Jones and
                  Daniel F. Berger and
                  Chinya V. Ravishankar},
  title        = {Layering Public Key Distribution Over Secure {DNS} using Authenticated
                  Delegation},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {409--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.35},
  doi          = {10.1109/CSAC.2005.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JonesBR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jurjens05,
  author       = {Jan J{\"{u}}rjens},
  title        = {Code Security Analysis of a Biometric Authentication System Using
                  Automated Theorem Provers},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {138--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.15},
  doi          = {10.1109/CSAC.2005.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jurjens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KalamD05,
  author       = {Anas Abou El Kalam and
                  Yves Deswarte},
  title        = {Privacy Requirements Implemented with a JavaCard},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {527--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.44},
  doi          = {10.1109/CSAC.2005.44},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KalamD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KangMC05,
  author       = {Myong H. Kang and
                  Ira S. Moskowitz and
                  Stanley Chincheck},
  title        = {The Pump: {A} Decade of Covert Fun},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {352--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.56},
  doi          = {10.1109/CSAC.2005.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KangMC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Karger05,
  author       = {Paul A. Karger},
  title        = {Multi-Level Security Requirements for Hypervisors},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {267--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.41},
  doi          = {10.1109/CSAC.2005.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Karger05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KayacykZH05,
  author       = {Hilmi G{\"{u}}nes Kayacik and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood},
  title        = {Evolving Successful Stack Overflow Attacks for Vulnerability Testing},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {225--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.23},
  doi          = {10.1109/CSAC.2005.23},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KayacykZH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KcK05,
  author       = {Gaurav S. Kc and
                  Angelos D. Keromytis},
  title        = {e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via
                  System-Call Policing},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {286--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.22},
  doi          = {10.1109/CSAC.2005.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KcK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KumarSJZ05,
  author       = {Sandeep Kumar and
                  Terence Sim and
                  Rajkumar Janakiraman and
                  Sheng Zhang},
  title        = {Using Continuous Biometric Verification to Protect Interactive Login
                  Sessions},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {441--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.61},
  doi          = {10.1109/CSAC.2005.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KumarSJZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeitaMD05,
  author       = {Corrado Leita and
                  Ken Mermoud and
                  Marc Dacier},
  title        = {ScriptGen: an automated script generation tool for honeyd},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {203--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.49},
  doi          = {10.1109/CSAC.2005.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeitaMD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiK05,
  author       = {Jun Li and
                  Xun Kang},
  title        = {mSSL: Extending {SSL} to Support Data Sharing Among Collaborative
                  Clients},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {397--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.40},
  doi          = {10.1109/CSAC.2005.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiS05,
  author       = {Yiru Li and
                  Anil Somayaji},
  title        = {Securing Email Archives through User Modeling},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {547--556},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.50},
  doi          = {10.1109/CSAC.2005.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiangS05,
  author       = {Zhenkai Liang and
                  R. Sekar},
  title        = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach
                  Based on Program Behavior Models},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.12},
  doi          = {10.1109/CSAC.2005.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiangS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LootahEM05,
  author       = {Wesam Lootah and
                  William Enck and
                  Patrick D. McDaniel},
  title        = {{TARP:} Ticket-based Address Resolution Protocol},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {106--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.55},
  doi          = {10.1109/CSAC.2005.55},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LootahEM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NoelJ05,
  author       = {Steven Noel and
                  Sushil Jajodia},
  title        = {Understanding Complex Network Attack Graphs through Clustered Adjacency
                  Matrices},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {160--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.58},
  doi          = {10.1109/CSAC.2005.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NoelJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RubelIHP05,
  author       = {Paul Rubel and
                  Michael Ihde and
                  Steven A. Harp and
                  Charles N. Payne},
  title        = {Generating Policies for Defense in Depth},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {505--514},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.26},
  doi          = {10.1109/CSAC.2005.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RubelIHP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SailerJVCPBGD05,
  author       = {Reiner Sailer and
                  Trent Jaeger and
                  Enriquillo Valdez and
                  Ram{\'{o}}n C{\'{a}}ceres and
                  Ronald Perez and
                  Stefan Berger and
                  John Linwood Griffin and
                  Leendert van Doorn},
  title        = {Building a MAC-Based Security Architecture for the Xen Open-Source
                  Hypervisor},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {276--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.13},
  doi          = {10.1109/CSAC.2005.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SailerJVCPBGD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchwarzCWLTMW05,
  author       = {Benjamin Schwarz and
                  Hao Chen and
                  David A. Wagner and
                  Jeremy Lin and
                  Wei Tu and
                  Geoff Morrison and
                  Jacob West},
  title        = {Model Checking An Entire Linux Distribution for Security Violations},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.39},
  doi          = {10.1109/CSAC.2005.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchwarzCWLTMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SinclairS05,
  author       = {Sara Sinclair and
                  Sean W. Smith},
  title        = {PorKI: Making User {PKI} Safe on Machines of Heterogeneous Trustworthiness},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {419--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.43},
  doi          = {10.1109/CSAC.2005.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SinclairS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Snow05,
  author       = {Brian D. Snow},
  title        = {We Need Assurance!},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.63},
  doi          = {10.1109/CSAC.2005.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Snow05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SommerP05,
  author       = {Robin Sommer and
                  Vern Paxson},
  title        = {Exploiting Independent State For Network Intrusion Detection},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {59--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.24},
  doi          = {10.1109/CSAC.2005.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SommerP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SuoZO05,
  author       = {Xiaoyuan Suo and
                  Ying Zhu and
                  G. Scott Owen},
  title        = {Graphical Passwords: {A} Survey},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {463--472},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.27},
  doi          = {10.1109/CSAC.2005.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SuoZO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VasudevanY05,
  author       = {Amit Vasudevan and
                  Ramesh Yerraballi},
  title        = {Stealth Breakpoints},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {381--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.52},
  doi          = {10.1109/CSAC.2005.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VasudevanY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VerhannemanPWJ05,
  author       = {Tine Verhanneman and
                  Frank Piessens and
                  Bart De Win and
                  Wouter Joosen},
  title        = {Uniform Application-level Access Control Enforcement of Organizationwide
                  Policies},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {431--440},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.59},
  doi          = {10.1109/CSAC.2005.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VerhannemanPWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WaddleW05,
  author       = {Jason Waddle and
                  David A. Wagner},
  title        = {Fault Attacks on Dual-Rail Encoded Systems},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {483--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.25},
  doi          = {10.1109/CSAC.2005.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WaddleW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangD05,
  author       = {Wei Wang and
                  Thomas E. Daniels},
  title        = {Building Evidence Graphs for Network Forensics Analysis},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {254--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.14},
  doi          = {10.1109/CSAC.2005.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}