Annual Computer Security Applications Conference 2013 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


29. ACSAC 2013: New Orleans, LA, USA

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Charles N. Payne Jr.:
Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013. ACM 2013, ISBN 978-1-4503-2015-3
Distinguished practitioner

William Young, Nancy G. Leveson:
Systems thinking for safety and security. 1-8
Mobile networks and apps

Xiao Zhang, Amit Ahlawat, Wenliang Du:
AFrame: isolating advertisements from mobile applications in Android. 9-18

Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos:
The man who was there: validating check-ins in location-based services. 19-28

Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock:
Discovery of emergent malicious campaigns in cellular networks. 29-38
Privacy and privacy preserving technologies

Luca Invernizzi, Christopher Kruegel, Giovanni Vigna:
Message in a bottle: sailing past censorship. 39-48

Panagiotis Papadopoulos
, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras
, Thorsten Holz
, Evangelos P. Markatos:
k-subscription: privacy-preserving microblogging browsing through obfuscation. 49-58

Min Li, Wanyu Zang, Kun Bai, Meng Yu
, Peng Liu:
MyCloud: supporting user-configured privacy protection in cloud computing. 59-68
Malware

Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer:
Extraction of statistically significant malware behaviors. 69-78

Xin Hu, Kang G. Shin:
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. 79-88

Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath:
SigMal: a static signal processing based malware triage. 89-98
Cyberphysical systems (CPS) security

Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip
:
CPS: an efficiency-motivated attack against autonomous vehicular transportation. 99-108

Stephen E. McLaughlin:
CPS: stateful policy enforcement for control system device usage. 109-118
Passwords and authentication

Murat Akpulat, Kemal Bicakci
, Ugur Cil:
Revisiting graphical passwords for augmenting, not replacing, text passwords. 119-128

David Schmidt, Trent Jaeger:
Pitfalls in the automated strengthening of passwords. 129-138
Invited essayist

Carl E. Landwehr:
A building code for building code: putting what we know works to work. 139-147
Applying/applied cryptography

Behrad Garmany, Tilo Müller:
PRIME: private RSA infrastructure for memory-less encryption. 149-158

Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan
, Ahmad-Reza Sadeghi:
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. 159-168

Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs:
GPU and CPU parallelization of honest-but-curious secure two-party computation. 169-178
Network security

B. Amann, Robin Sommer, Matthias Vallentin, Seth Hall:
No attack necessary: the surprising dynamics of SSL trust relationships. 179-188

Amir Herzberg
, Haya Schulmann:
Socket overloading for fun and cache-poisoning. 189-198

Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson
, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. 199-208
Systems security

François Gauthier, Thierry Lavoie, Ettore Merlo:
Uncovering access control weaknesses and flaws with security-discordant software clones. 209-218

Wai-Kit Sze, R. Sekar:
A portable user-level approach for system-wide integrity protection. 219-228

Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen:
Subverting system authentication with context-aware, reactive virtual machine introspection. 229-238
Mobile systems security 1

Mahmudur Rahman, Umut Topkara, Bogdan Carbunar:
Seeing is not believing: visual verifications through liveness analysis using mobile devices. 239-248

Matthias Lange, Steffen Liebergeld:
Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities. 249-257

Collin Mulliner, Jon Oberheide, William K. Robertson
, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. 259-268
Hardware and virtualization security

Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi
, Stefano Zanero
:
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. 269-278

Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon
, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas:
Implementation and implications of a stealth hard-drive backdoor. 279-288

Zhui Deng, Xiangyu Zhang, Dongyan Xu:
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. 289-298
Mobile systems security 2

Felix Rohrer, Yuting Zhang, Lou Chitkushev
, Tanya Zlateva:
DR BACA: dynamic role based access control for Android. 299-308

Jannik Pewny, Thorsten Holz
:
Control-flow restrictor: compiler-based CFI for iOS. 309-318

Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark:
FireDroid: hardening security in almost-stock Android. 319-328
Web and cloud security

Yogesh Mundada, Anirudh Ramachandran, Nick Feamster:
SilverLine: preventing data leaks from compromised web applications. 329-338

Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou:
Validating web content with senser. 339-348

Mohsen Zohrevandi, Rida A. Bazzi:
Auto-FBI: a user-friendly approach for secure access to sensitive content on the web. 349-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






