- Roberto Perdisci, Andrea Lanzi, Wenke Lee:
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310 - Amirali Salehi-Abari, Julie Thorpe
, Paul C. van Oorschot
:
On Purely Automated Attacks and Click-Based Graphical Passwords. ACSAC 2008: 111-120 - O. Sami Saydjari:
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. ACSAC 2008: 3-10 - Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures. ACSAC 2008: 23-32 - Karsten Sohr
, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn
:
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. ACSAC 2008: 257-266 - Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor
:
A Survey to Guide Group Key Protocol Development. ACSAC 2008: 475-484 - Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger:
New Side Channels Targeted at Passwords. ACSAC 2008: 45-54 - Amit Vasudevan:
MalTRAK: Tracking and Eliminating Unknown Malware. ACSAC 2008: 311-321 - Xunhua Wang, Philip D. Huff, Brett C. Tjaden:
Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. ACSAC 2008: 140-149 - Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ACSAC 2008: 289-298 - Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu:
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. ACSAC 2008: 97-107 - Chuan Yue, Haining Wang:
Anti-Phishing in Offense and Defense. ACSAC 2008: 345-354 - Saman Zarandioon, Danfeng Yao
, Vinod Ganapathy:
OMOS: A Framework for Secure Communication in Mashup Applications. ACSAC 2008: 355-364 - Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue:
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. ACSAC 2008: 215-224 - Dana Zhang, Kotagiri Ramamohanarao
, Tim Ebringer, Trevor Yann:
Permission Set Mining: Discovering Practical and Useful Roles. ACSAC 2008: 247-256 - Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3447-3 [contents]