


default search action
17th CCS 2010: Chicago, Illinois, USA
- Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov:

Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6
Security analysis
- Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp:

Security analysis of India's electronic voting machines. 1-14 - Nicolas Christin

, Sally S. Yanagihara, Keisuke Kamataki:
Dissecting one click frauds. 15-26 - Chris Grier, Kurt Thomas, Vern Paxson, Chao Michael Zhang:

@spam: the underground on 140 characters or less. 27-37
System security
- Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:

HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. 38-49 - Srinivas Krishnan, Kevin Z. Snow, Fabian Monrose:

Trail of bytes: efficient support for forensic analysis. 50-60 - Justin Samuel, Nick Mathewson, Justin Cappos, Roger Dingledine:

Survivable key compromise in software update systems. 61-72
Wireless and phone security
- David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot

, Anil Somayaji:
A methodology for empirical analysis of permission-based security models and its application to android. 73-84 - Nathaniel Husted, Steven A. Myers:

Mobile location tracking in metro areas: malnets and others. 85-96 - Tzipora Halevi, Nitesh Saxena:

On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. 97-108 - Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor:

PinDr0p: using single-ended audio features to determine call provenance. 109-120
Applied cryptography I
- Sanjam Garg

, Abishek Kumarasubramanian, Amit Sahai, Brent Waters:
Building efficient fully collusion-resilient traitor tracing and revocation schemes. 121-130 - Dan Boneh, Hart William Montgomery, Ananth Raghunathan:

Algebraic pseudorandom functions with improved efficiency from the augmented cascade. 131-140 - Yu Yu, François-Xavier Standaert

, Olivier Pereira, Moti Yung:
Practical leakage-resilient pseudorandom generators. 141-151 - Sherman S. M. Chow

, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters:
Practical leakage-resilient identity-based encryption from simple assumptions. 152-161
Passwords and CAPTCHAs
- Matt Weir, Sudhir Aggarwal, Michael P. Collins, Henry Stern:

Testing metrics for password creation policies by attacking large sets of revealed passwords. 162-175 - Yinqian Zhang, Fabian Monrose, Michael K. Reiter:

The security of modern password expiration: an algorithmic framework and empirical analysis. 176-186 - Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai:

Attacks and design of image recognition CAPTCHAs. 187-200
Sandboxing
- Joseph Siefers, Gang Tan

, Greg Morrisett:
Robusta: taming the native beast of the JVM. 201-211 - Justin Cappos, Armon Dadgar, Jeff Rasley, Justin Samuel, Ivan Beschastnikh, Cosmin Barsan, Arvind Krishnamurthy, Thomas E. Anderson:

Retaining sandbox containment despite bugs in privileged memory-safe code. 212-223 - Glenn Wurster, Paul C. van Oorschot

:
A control point for reducing root abuse of file-system privileges. 224-236
Attacks on secure hardware
- Ulrich Rührmair, Frank Sehnke, Jan Sölter

, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber:
Modeling attacks on physical unclonable functions. 237-249 - Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur:

Dismantling SecureMemory, CryptoMemory and CryptoRF. 250-259 - Matteo Bortolozzo, Matteo Centenaro, Riccardo Focardi

, Graham Steel:
Attacking and fixing PKCS#11 security tokens. 260-269
Information flow
- Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham:

An empirical study of privacy-violating information flows in JavaScript web applications. 270-283 - William R. Harris, Somesh Jha, Thomas W. Reps:

DIFC programs by automatic instrumentation. 284-296 - Aslan Askarov, Danfeng Zhang

, Andrew C. Myers:
Predictive black-box mitigation of timing channels. 297-307
Anonymity networks
- Qiyan Wang, Prateek Mittal, Nikita Borisov

:
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems. 308-318 - Rob Jansen, Nicholas Hopper, Yongdae Kim

:
Recruiting new tor relays with BRAIDS. 319-328 - Can Tang, Ian Goldberg:

An improved algorithm for tor circuit scheduling. 329-339 - Henry Corrigan-Gibbs, Bryan Ford

:
Dissent: accountable anonymous group messaging. 340-350
Formal methods
- Sebastian Mödersheim

:
Abstraction by set-membership: verifying security protocols and web services with databases. 351-360 - Christoph Sprenger

, David A. Basin:
Developing security protocols by refinement. 361-374 - Gilles Barthe

, Marion Daubignard, Bruce M. Kapron
, Yassine Lakhnech:
Computational indistinguishability logic. 375-386 - Michael Backes, Matteo Maffei, Dominique Unruh

:
Computationally sound verification of source code. 387-398
Malware
- Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:

AccessMiner: using system-centric models for malware protection. 399-412 - Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song:

Input generation via decomposition and re-stitching: finding bugs in Malware. 413-425 - Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song:

Inference and analysis of formal models of botnet command and control protocols. 426-439 - Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:

BLADE: an attack-agnostic approach for preventing drive-by malware infections. 440-450
Applied cryptography II
- Wilko Henecka

, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider
, Immo Wehrenberg:
TASTY: tool for automating secure two-party computations. 451-462 - Amit Sahai, Hakan Seyalioglu:

Worry-free encryption: functional encryption with public keys. 463-472 - Jae Hyun Ahn, Matthew Green, Susan Hohenberger:

Synchronized aggregate signatures: new definitions, constructions and applications. 473-484 - Jonathan Katz, Lior Malka:

Secure text processing with applications to private DNA matching. 485-492
Cryptographic protocols
- Jean Paul Degabriele, Kenneth G. Paterson:

On the (in)security of IPsec in MAC-then-encrypt configurations. 493-504 - Ueli Maurer, Björn Tackmann:

On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption. 505-515 - Adam Groce, Jonathan Katz:

A new framework for efficient password-based authenticated key exchange. 516-525 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:

Accountability: definition and relationship to verifiability. 526-535
Memory safety and binary code
- Zhenyu Wu, Steven Gianvecchio, Mengjun Xie

, Haining Wang:
Mimimorphism: a new approach to binary code obfuscation. 536-546 - Sang Kil Cha, Brian Pak, David Brumley

, Richard Jay Lipton:
Platform-independent programs. 547-558 - Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy:

Return-oriented programming without returns. 559-572 - Gene Novark, Emery D. Berger

:
DieHarder: securing the heap. 573-584
Web security
- Avik Chaudhuri, Jeffrey S. Foster:

Symbolic security analysis of ruby-on-rails web applications. 585-594 - Kehuan Zhang, Zhou Li

, Rui Wang, XiaoFeng Wang, Shuo Chen:
Sidebuster: automated detection and quantification of side-channel leaks in web application development. 595-606 - Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan:

NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications. 607-618 - Lin-Shung Huang, Zack Weinberg

, Chris Evans, Collin Jackson:
Protecting browsers from cross-origin CSS attacks. 619-629
Demo presentations
- Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami:

A privacy recommendation wizard for users of social networking sites. 630-632 - Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaopu Ma, Kai Li:

SecTag: a multi-policy supported secure web tag framework. 633-635 - Georgia Sakellari

, Erol Gelenbe:
Demonstrating cognitive packet network resilience to worm attacks. 636-638 - Patrick Stewin, Jean-Pierre Seifert:

In God we trust all others we monitor. 639-641
Poster presentations
- Walid Bechkit, Abdelmadjid Bouabdallah, Yacine Challal

:
Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining. 642-644 - Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan:

TAPS: automatically preparing safe SQL queries. 645-647 - Bernard Butler, Brendan Jennings

, Dmitri Botvich:
XACML policy performance evaluation using a flexible load testing framework. 648-650 - Kevin R. B. Butler

, Stephen E. McLaughlin, Patrick D. McDaniel:
Protecting portable storage with host validation. 651-653 - Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:

Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. 654-656 - David W. Chadwick

, George Inman, Paul Coxwell:
CardSpace in the cloud. 657-659 - Eric Chan-Tin, Nicholas Hopper:

Secure latency estimation with treeple. 660-662 - Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi:

TEE: a virtual DRTM based execution environment for secure cloud-end computing. 663-665 - Trajce Dimkov, Wolter Pieters, Pieter H. Hartel

:
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations. 666-668 - Shlomi Dolev

, Niv Gilboa
, Marina Kopeetsky, Giuseppe Persiano, Paul G. Spirakis:
Information security for sensors by overwhelming random sequences and permutations. 669-671 - Juan Du, Xiaohui Gu, Ting Yu:

On verifying stateful dataflow processing services in large-scale cloud systems. 672-674 - Achille Fokoue, Mudhakar Srivatsa, Robert Young:

Assessing trust in uncertain information using Bayesian description logic. 675-677 - Denis Foo Kune, Yongdae Kim

:
Timing attacks on PIN input devices. 678-680 - Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao:

Detecting and characterizing social spam campaigns. 681-683 - Xun Gong, Negar Kiyavash, Nikita Borisov

:
Fingerprinting websites using remote traffic analysis. 684-686 - Kyusuk Han

, Jangseong Kim, Kwangjo Kim, Taeshik Shon:
Efficient sensor node authentication via 3GPP mobile communication networks. 687-689 - Ofer Hermoni, Niv Gilboa

, Eyal Felstaine, Yuval Elovici, Shlomi Dolev
:
Rendezvous tunnel for anonymous publishing. 690-692 - Markus Huber

, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch
:
Exploiting social networking sites for spam. 693-695 - Mihaela Ion, Giovanni Russello, Bruno Crispo:

An implementation of event and filter confidentiality in pub/sub systems and its application to e-health. 696-698 - Marian Kamal Iskander, Adam J. Lee

, Daniel Mossé:
Privacy and robustness for data aggregation in wireless sensor networks. 699-701 - Sachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam:

Designing router scheduling policies: a privacy perspective. 702-704 - Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar:

CRAFT: a new secure congestion control architecture. 705-707 - Tobias Limmer, Falko Dressler

:
Dialog-based payload aggregation for intrusion detection. 708-710 - Kazuhiro Minami, Nikita Borisov

:
Protecting location privacy against inference attacks. 711-713 - Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim

:
Designs to account for trust in social network-based sybil defenses. 714-716 - Abedelaziz Mohaisen, Eugene Y. Vasserman

, Max Schuchard, Denis Foo Kune, Yongdae Kim
:
Secure encounter-based social networks: requirements, challenges, and designs. 717-719 - Yanlin Peng, Wenji Chen, J. Morris Chang, Yong Guan:

Secure online banking on untrusted computers. 720-722 - Rahul Potharaju, Bogdan Carbunar, Cristina Nita-Rotaru:

iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks. 723-725 - Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim

, Eugene Y. Vasserman
:
Losing control of the internet: using the data plane to attack the control plane. 726-728 - Abdul Serwadda, Vir V. Phoha

, Idris A. Rai:
Size-based scheduling: a recipe for DDOS? 729-731 - Qiang Tang

:
User-friendly matching protocol for online social networks. 732-734 - Guojun Wang, Qin Liu, Jie Wu:

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. 735-737 - Tao Wei, Tielei Wang, Lei Duan, Jing Luo:

Secure dynamic code generation against spraying. 738-740 - Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer

:
Ad hoc broadcast encryption. 741-743 - Lan Yao, Zhiliang Yu, Tie Zhang, Fuxiang Gao:

Dynamic window based multihop authentication for WSN. 744-746 - Xiaowei Ying, Xintao Wu

, Daniel Barbará:
Spectrum based fraud detection in social networks. 747-749 - Dawei Zhang, Zhen Han, Guangwen Yan:

A portable TPM based on USB key. 750-752 - Zhibin Zhou, Dijiang Huang

:
On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. 753-755 - Yan Zhu

, Huaixi Wang, Zexing Hu, Gail-Joon Ahn
, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. 756-758 - Peng Zou, Chaokun Wang, Zhang Liu, Jianmin Wang

, Jia-Guang Sun:
A cloud based SIM DRM scheme for the mobile internet. 759-761

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














