


default search action
31. ACSAC 2015: Los Angeles, CA, USA
- Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015. ACM 2015, ISBN 978-1-4503-3682-6

Human Factors
- Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues

, Joshua Sunshine:
Evaluating the Flexibility of the Java Sandbox. 1-10 - Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:

Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. 11-20 - Maliheh Shirvanian, Nitesh Saxena:

On the Security and Usability of Crypto Phones. 21-30
Network Security
- Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani:

Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. 31-40 - Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:

Know Your Achilles' Heel: Automatic Detection of Network Critical Services. 41-50 - Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim

:
Proactive Security Analysis of Changes in Virtualized Infrastructures. 51-60
Apps
- Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu:

Vulnerability Assessment of OAuth Implementations in Android Applications. 61-70 - Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:

BareDroid: Large-Scale Analysis of Android Apps on Real Devices. 71-80 - Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon

, Doina Caragea
, Xinming Ou, Venkatesh Prasad Ranganath
, Hongmin Li, Nicolais Guevara:
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. 81-90
Control Flow (Part 1)
- Mingwei Zhang, R. Sekar:

Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. 91-100 - Rui Qiao, Mingwei Zhang, R. Sekar:

A Principled Approach for ROP Defense. 101-110 - Aravind Prakash, Heng Yin

:
Defeating ROP Through Denial of Stack Pivot. 111-120
Securing the Internet of Things
- Konrad-Felix Krentz, Christoph Meinel:

Handling Reboots and Mobility in 802.15.4 Security. 121-130 - Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick

:
Using Channel State Information for Tamper Detection in the Internet of Things. 131-140 - Junia Valente, Alvaro A. Cárdenas:

Using Visual Challenges to Verify the Integrity of Security Cameras. 141-150
Web Security
- Tung Tran, Riccardo Pelizzi, R. Sekar:

JaTE: Transparent and Efficient JavaScript Confinement. 151-160 - Nethanel Gelernter, Yoel Grinstein, Amir Herzberg:

Cross-Site Framing Attacks. 161-170 - Nick Pantic, Mohammad Iftekhar Husain:

Covert Botnet Command and Control Using Twitter. 171-180
Mobile (Part 1)
- Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli:

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. 181-190 - Thomas Hupperich

, Davide Maiorca
, Marc Kührer, Thorsten Holz
, Giorgio Giacinto
:
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? 191-200 - Luca Falsina, Yanick Fratantonio, Stefano Zanero

, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. 201-210
Potpourri (Part 1)
- Wai-Kit Sze, R. Sekar:

Provenance-based Integrity Protection for Windows. 211-220 - Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim:

MOSE: Live Migration Based On-the-Fly Software Emulation. 221-230 - Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan

:
Privacy-preserving Virtual Machine. 231-240
Embedded Devices & Computer Subsystems
- Johannes Götzfried, Tilo Müller, Ruan de Clercq

, Pieter Maene
, Felix C. Freiling, Ingrid Verbauwhede
:
Soteria: Offline Software Protection within Low-cost Embedded Devices. 241-250 - Lucian Cojocar

, Jonas Zaddach, Roel Verdult, Herbert Bos
, Aurélien Francillon
, Davide Balzarotti:
PIE: Parser Identification in Embedded Systems. 251-260 - Jing (Dave) Tian, Adam Bates

, Kevin R. B. Butler
:
Defending Against Malicious USB Firmware with GoodUSB. 261-270
Access Control
- Aanjhan Ranganathan

, Boris Danev, Srdjan Capkun:
Proximity Verification for Contactless Access Control and Authentication Systems. 271-280 - Maarten Decat, Bert Lagaisse

, Wouter Joosen:
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. 281-290 - Jasper Bogaerts, Maarten Decat, Bert Lagaisse

, Wouter Joosen:
Entity-Based Access Control: supporting more expressive access control policies. 291-300
Pa$$w0rdz
- Adam J. Aviv

, Devon Budzitowski, Ravi Kuber
:
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. 301-310 - Mohammed H. Almeshekah, Christopher N. Gutierrez

, Mikhail J. Atallah, Eugene H. Spafford
:
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. 311-320 - Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah

:
PARS: A Uniform and Open-source Password Analysis and Research System. 321-330
Control Flow (Part 2)
- Minghua Wang

, Heng Yin
, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. 331-340 - István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis

, Herbert Bos
:
ShrinkWrap: VTable Protection without Loose Ends. 341-350 - Theofilos Petsios, Vasileios P. Kemerlis

, Michalis Polychronakis, Angelos D. Keromytis:
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. 351-360
Mobile (Part 2)
- Chen Cao, Neng Gao, Peng Liu, Ji Xiang:

Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. 361-370 - Pietro Ferrara

, Omer Tripp, Marco Pistoia:
MorphDroid: Fine-grained Privacy Verification. 371-380 - Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang:

MobiPluto: File System Friendly Deniable Storage for Mobile Devices. 381-390
Potpourri (Part 2)
- Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest

, Michel van Eeten
:
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. 391-400 - Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim

, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. 401-410 - Simone Mutti, Enrico Bacis

, Stefano Paraboschi:
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases. 411-420
Applied Crypto
- Martin Pettai, Peeter Laud

:
Combining Differential Privacy and Secure Multiparty Computation. 421-430 - Peter Mayer

, Melanie Volkamer:
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. 431-440
Hardware & Reverse Engineering
- Andriana Gkaniatsou, Fiona McNeill

, Alan Bundy, Graham Steel, Riccardo Focardi
, Claudio Bozzato:
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit. 441-450 - Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente

, Srdjan Capkun:
Logical Partitions on Many-Core Platforms. 451-460 - Letitia W. Li, Guillaume Duc, Renaud Pacalet:

Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics. 461-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














