default search action
30. ACSAC 2014: New Orleans, LA, USA
- Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr:
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014. ACM 2014, ISBN 978-1-4503-3005-3
Invited essayist
- Aviel D. Rubin:
Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications. 1-5
Secure builds and configuration
- Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hot-hardening: getting more out of your security settings. 6-15 - Sören Bleikertz, Carsten Vogel, Thomas Groß:
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. 26-35
Mobile systems security I
- Michael Backes, Sven Bugiel, Sebastian Gerling:
Scippa: system-centric IPC provenance on Android. 36-45 - Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky:
Android security framework: extensible multi-layered access control on Android. 46-55 - Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, Lei Zhang:
Towards a scalable resource-driven approach for detecting repackaged Android applications. 56-65
Social computing and networks
- Rui Han, Alejandro Mesa, Mihai Christodorescu, Saman A. Zonouz:
TroGuard: context-aware protection against web-based socially engineered trojans. 66-75 - Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath. 76-85 - Chao Yang, Jialong Zhang, Guofei Gu:
A taste of tweets: reverse engineering Twitter spammers. 86-95
Systems security
- Tianwei Zhang, Ruby B. Lee:
New models of cache architectures characterizing information leakage from cache side channels. 96-105 - Raoul Strackx, Bart Jacobs, Frank Piessens:
ICE: a passive, high-speed, state-continuity scheme. 106-115 - Samuel Junjie Tan, Sergey Bratus, Travis Goodspeed:
Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware. 116-125
Cyber physical systems I
- Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel:
Through the eye of the PLC: semantic security monitoring for industrial processes. 126-135 - Carlos A. Barreto, Alvaro A. Cárdenas, Nicanor Quijano, Eduardo Mojica-Nava:
CPS: market analysis of attacks against demand response in the smart grid. 136-145 - Marina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen:
CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. 146-155
Secure distributed systems
- Lance Alt, Robert Beverly, Alberto Dainotti:
Uncovering network tarpits with degreaser. 156-165 - M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen:
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. 166-175 - Yuzhe Richard Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang:
Lightweight authentication of freshness in outsourced key-value stores. 176-185
Securing memory and storage
- Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
SEER: practical memory virus scanning as a service. 186-195 - Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. 196-205 - Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun:
Assisted deletion of related content. 206-215
Mobile systems security II
- Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. 216-225 - Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang:
Design and implementation of an Android host-based intrusion prevention system. 226-235 - Drew Davidson, Matt Fredrikson, Benjamin Livshits:
MoRePriv: mobile OS support for application personalization and privacy. 236-245
Secure communications
- Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl:
IMSI-catch me if you can: IMSI-catcher-catchers. 246-255 - Mathy Vanhoef, Frank Piessens:
Advanced Wi-Fi attacks using commodity hardware. 256-265 - Henry Carter, Charles Lever, Patrick Traynor:
Whitewash: outsourcing garbled circuit generation for mobile devices. 266-275
Usable security
- Hendrik Meutzner, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa:
Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security. 276-285 - Adam J. Aviv, Dane Fichter:
Understanding visual perceptions of usability and security of Android's graphical password pattern. 286-295 - Daniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan (Martin) Yeh, Justin Cappos, Yanyan Zhuang:
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. 296-305
Privacy
- Hyungsub Kim, Sangho Lee, Jong Kim:
Exploring and mitigating privacy threats of HTML5 geolocation API. 306-315 - Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:
Differentially private data aggregation with optimal utility. 316-325 - Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber:
On the privacy provisions of Bloom filters in lightweight bitcoin clients. 326-335
Network infrastructure security
- Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici:
OSPF vulnerability to persistent poisoning attacks: a systematic analysis. 336-345 - Amir Herzberg, Haya Schulmann, Bruno Crispo:
Less is more: cipher-suite negotiation for DNSSEC. 346-355 - Amir Herzberg, Haya Schulmann:
DNS authentication as a service: preventing amplification attacks. 356-365
Access control and malware
- John Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie:
Relation extraction for inferring access control rules from natural language artifacts. 366-375 - Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley:
Centrality metrics of importance in access behaviors and malware detections. 376-385 - Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias:
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. 386-395
Software security
- Robert Gawlik, Thorsten Holz:
Towards automated integrity protection of C++ virtual function tables in binary programs. 396-405 - Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow:
Leveraging semantic signatures for bug search in binary programs. 406-415 - Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis:
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. 416-425
Cyber physical systems II
- Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno:
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. 426-435 - Marco Balduzzi, Alessandro Pasta, Kyle Wilhoit:
A security evaluation of AIS automated identification system. 436-445
Web security
- Willem De Groef, Fabio Massacci, Frank Piessens:
NodeSentry: least-privilege library integration for server-side JavaScript. 446-455 - Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. 456-465 - Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge:
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. 466-475
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.