


default search action
24. ACSAC 2008: Anaheim, California, USA
- Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3447-3

Invited Talk
- O. Sami Saydjari

:
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. 3-10
Forensics and Security Management
- Paul F. Farrell Jr., Simson L. Garfinkel

, Douglas White:
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. 13-22 - Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier

, René Rietz:
Systematic Signature Engineering by Re-use of Snort Signatures. 23-32 - Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura:

Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. 33-42
Operating Systems and Memory Security
- Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger:

New Side Channels Targeted at Passwords. 45-54 - William Enck, Patrick D. McDaniel, Trent Jaeger:

PinUP: Pinning User Files to Known Applications. 55-64 - William Enck, Kevin R. B. Butler

, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith:
Defending Against Attacks on Main Memory Persistence. 65-74
Kernel-Level Defensive Techniques
- Arati Baliga, Vinod Ganapathy, Liviu Iftode:

Automatic Inference and Enforcement of Kernel Data Structure Invariants. 77-86 - Timothy Fraser, Matthew R. Evenson, William A. Arbaugh:

VICI Virtual Machine Introspection for Cognitive Immunity. 87-96 - Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu:

Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. 97-107
Graphical Passwords and Biometrics
- Amirali Salehi-Abari, Julie Thorpe

, Paul C. van Oorschot
:
On Purely Automated Attacks and Click-Based Graphical Passwords. 111-120 - Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu:

YAGP: Yet Another Graphical Password Strategy. 121-129 - Stelvio Cimato

, Marco Gamassi, Vincenzo Piuri, Roberto Sassi
, Fabio Scotti
:
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. 130-139 - Xunhua Wang, Philip D. Huff, Brett C. Tjaden:

Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. 140-149
Access Control
- Mathias Kohler, Andreas Schaad:

ProActive Access Control for Business Process-Driven Environments. 153-162 - Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu

:
Assessing Quality of Policy Properties in Verification of Access Control Policies. 163-172 - Ragib Hasan

, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani:
Please Permit Me: Stateless Delegated Authorization in Mashups. 173-182 - Günter Karjoth, Andreas Schade, Els Van Herreweghen:

Implementing ACL-Based Policies in XACML. 183-192
Network Security
- Susanta Nanda, Tzi-cker Chiueh:

Execution Trace-Driven Automated Attack Signature Generation. 195-204 - Mansour Alsaleh, David Barrera, Paul C. van Oorschot

:
Improving Security Visualization with Exposure Map Filtering. 205-214 - Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue:

Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. 215-224 - Rattikorn Hewett, Phongphun Kijsanayothin:

Host-Centric Model Checking for Network Vulnerability Analysis. 225-234
Role-Based Access Control
- Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri

:
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. 237-246 - Dana Zhang, Kotagiri Ramamohanarao

, Tim Ebringer, Trevor Yann:
Permission Set Mining: Discovering Practical and Useful Roles. 247-256 - Karsten Sohr

, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn
:
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. 257-266
Intrusion Detection
- Robert J. Cole, Peng Liu:

Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. 269-278 - Frédéric Massicotte, Yvan Labiche

, Lionel C. Briand:
Toward Automatic Generation of Intrusion Detection Verification Rules. 279-288 - Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:

STILL: Exploit Code Detection via Static Taint and Initialization Analyses. 289-298
Malware and Data Protection
- Roberto Perdisci

, Andrea Lanzi, Wenke Lee:
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. 301-310 - Amit Vasudevan:

MalTRAK: Tracking and Eliminating Unknown Malware. 311-321 - Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla:

Preventing Information Leaks through Shadow Executions. 322-331
Web-Based Applications Security
- Martin Johns

, Björn Engelmann, Joachim Posegga:
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. 335-344 - Chuan Yue, Haining Wang:

Anti-Phishing in Offense and Defense. 345-354 - Saman Zarandioon, Danfeng Yao

, Vinod Ganapathy:
OMOS: A Framework for Secure Communication in Mashup Applications. 355-364
Anomaly and Misuse Detection
- Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:

Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. 367-376 - Terrence O'Connor, Douglas S. Reeves:

Bluetooth Network-Based Misuse Detection. 377-391 - Peng Li, Hyundo Park, Debin Gao

, Jianming Fu:
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. 392-401
Classic Papers
- Barbara Fraser, Stephen D. Crocker:

Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet. 405-417 - Stephanie Forrest

, Steven A. Hofmeyr, Anil Somayaji:
The Evolution of System-Call Monitoring. 418-430
Authentication
- Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma:

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. 433-442 - Timothy W. van der Horst, Kent E. Seamons

:
pwdArmor: Protecting Conventional Password-Based Authentications. 443-452 - Erdem Aktas, Kanad Ghose:

DARE: A Framework for Dynamic Authentication of Remote Executions. 453-462
Applied Cryptography
- Sean O'Melia, Adam J. Elbirt:

Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. 465-474 - Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor

:
A Survey to Guide Group Key Protocol Development. 475-484 - Antonio Grillo, Alessandro Lentini, Gianluigi Me

, Giuseppe F. Italiano
:
Transaction Oriented Text Messaging with Trusted-SMS. 485-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














