


default search action
ACM Transactions on Privacy and Security, Volume 22
Volume 22, Number 1, January 2019
- Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi

:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. 1:1-1:35 - Bradley Reaves, Luis Vargas, Nolen Scaife

, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler
:
Characterizing the Security of the SMS Ecosystem with Public Gateways. 2:1-2:31 - Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson:

KIST: Kernel-Informed Socket Transport for Tor. 3:1-3:37 - Ivo Sluganovic

, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication. 4:1-4:30 - Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis

, Vasileios P. Kemerlis
:
Kernel Protection Against Just-In-Time Code Reuse. 5:1-5:28 - Xabier Ugarte-Pedrero, Mariano Graziano, Davide Balzarotti:

A Close Look at a Daily Dataset of Malware Samples. 6:1-6:30 - Sebastian Mödersheim

, Luca Viganò
:
Alpha-Beta Privacy. 7:1-7:35
Volume 22, Number 2, April 2019
- Diego Kreutz

, Jiangshan Yu
, Fernando M. V. Ramos
, Paulo Jorge Esteves Veríssimo:
ANCHOR: Logically Centralized Security for Software-Defined Networks. 8:1-8:36 - Fabio Pagani

, Oleksii Fedorov, Davide Balzarotti:
Introducing the Temporal Dimension to Memory Forensics. 9:1-9:21 - Donghyun Kwon, Hayoon Yi, Yeongpil Cho

, Yunheung Paek:
Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation. 10:1-10:30 - Simon S. Woo

, Ron Artstein, Elsi Kaiser
, Xiao Le, Jelena Mirkovic:
Using Episodic Memory for User Authentication. 11:1-11:34 - Juhwan Noh

, Yujin Kwon, Yunmok Son, Hocheol Shin
, Dohyun Kim, Jaeyeong Choi, Yongdae Kim
:
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. 12:1-12:26 - Scott Ruoti, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'Neill, Ken Reese, Brad Spendlove, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons

:
A Usability Study of Four Secure Email Tools Using Paired Participants. 13:1-13:33 - Lucky Onwuzurike, Enrico Mariconti

, Panagiotis Andriotis
, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini:
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). 14:1-14:34
Volume 22, Number 3, July 2019
- Fang-Yu Rao, Jianneng Cao, Elisa Bertino, Murat Kantarcioglu:

Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records. 15:1-15:36 - Mahmood Sharif

, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. 16:1-16:30 - Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka

, Daniel Fabbri
, Bradley A. Malin
:
Database Audit Workload Prioritization via Game Theory. 17:1-17:21 - Alexander V. Outkin

, Brandon K. Eames, Meghan A. Galiardi, Sarah Walsh, Eric D. Vugrin, Byron Heersink, Jacob A. Hobbs, Gregory D. Wyss:
GPLADD: Quantifying Trust in Government and Commercial Systems A Game-Theoretic Approach. 18:1-18:27 - Samuel Wedaj

, Kolin Paul, Vinay J. Ribeiro:
DADS: Decentralized Attestation for Device Swarms. 19:1-19:29
Volume 22, Number 4, December 2019
- Gokcan Cantali, Orhan Ermis, Mehmet Ufuk Çaglayan, Cem Ersoy

:
Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems. 20:1-20:36 - Hongyu Jin

, Panos Papadimitratos
:
Resilient Privacy Protection for Location-Based Services through Decentralization. 21:1-21:36 - Brian A. Powell:

Malicious Overtones: Hunting Data Theft in the Frequency Domain with One-class Learning. 22:1-22:34 - Awanthika Senarath, Marthie Grobler

, Nalin Asanka Gamagedara Arachchilage:
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies. 23:1-23:30 - Stefano Cecconello

, Alberto Compagno, Mauro Conti
, Daniele Lain, Gene Tsudik:
Skype & Type: Keyboard Eavesdropping in Voice-over-IP. 24:1-24:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














