Search dblp for Publications

export results for "toc:db/conf/acsac/acsac2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/AgtenABPDP12,
  author       = {Pieter Agten and
                  Steven {Van Acker} and
                  Yoran Brondsema and
                  Phu H. Phung and
                  Lieven Desmet and
                  Frank Piessens},
  editor       = {Robert H'obbes' Zakon},
  title        = {JSand: complete client-side sandboxing of third-party JavaScript without
                  browser modifications},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420952},
  doi          = {10.1145/2420950.2420952},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AgtenABPDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Alexander12,
  author       = {Susan D. Alexander},
  editor       = {Robert H'obbes' Zakon},
  title        = {Trust engineering: rejecting the tyranny of the weakest link},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {145--148},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420973},
  doi          = {10.1145/2420950.2420973},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Alexander12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlrwaisGDSGO12,
  author       = {Sumayah A. Alrwais and
                  Alexandre Gerber and
                  Christopher W. Dunn and
                  Oliver Spatscheck and
                  Minaxi Gupta and
                  Eric Osterweil},
  editor       = {Robert H'obbes' Zakon},
  title        = {Dissecting ghost clicks: ad fraud via misdirected human clicks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420954},
  doi          = {10.1145/2420950.2420954},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AlrwaisGDSGO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Anderson12,
  author       = {Ross J. Anderson},
  editor       = {Robert H'obbes' Zakon},
  title        = {Security economics: a personal perspective},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420971},
  doi          = {10.1145/2420950.2420971},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Anderson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivSBS12,
  author       = {Adam J. Aviv and
                  Benjamin Sapp and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Robert H'obbes' Zakon},
  title        = {Practicality of accelerometer side channels on smartphones},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420957},
  doi          = {10.1145/2420950.2420957},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BilgeBRKK12,
  author       = {Leyla Bilge and
                  Davide Balzarotti and
                  William K. Robertson and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Robert H'obbes' Zakon},
  title        = {Disclosure: detecting botnet command and control servers through large-scale
                  NetFlow analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420969},
  doi          = {10.1145/2420950.2420969},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BilgeBRKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BlassR12,
  author       = {Erik{-}Oliver Blass and
                  William Robertson},
  editor       = {Robert H'obbes' Zakon},
  title        = {{TRESOR-HUNT:} attacking CPU-bound encryption},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {71--78},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420961},
  doi          = {10.1145/2420950.2420961},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BlassR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CollbergMMN12,
  author       = {Christian S. Collberg and
                  Sam Martin and
                  Jonathan Myers and
                  Jasvir Nagra},
  editor       = {Robert H'obbes' Zakon},
  title        = {Distributed application tamper detection via continuous software updates},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {319--328},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420997},
  doi          = {10.1145/2420950.2420997},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CollbergMMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DangZGCQX12,
  author       = {Yingnong Dang and
                  Dongmei Zhang and
                  Song Ge and
                  Chengyun Chu and
                  Yingjun Qiu and
                  Tao Xie},
  editor       = {Robert H'obbes' Zakon},
  title        = {{XIAO:} tuning code clones at hands of engineers in practice},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {369--378},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421004},
  doi          = {10.1145/2420950.2421004},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DangZGCQX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DiesburgMSMMGWK12,
  author       = {Sarah M. Diesburg and
                  Christopher R. Meyers and
                  Mark J. Stanovich and
                  Michael Mitchell and
                  Justin Marshall and
                  Julia Gould and
                  An{-}I Andy Wang and
                  Geoff Kuenning},
  editor       = {Robert H'obbes' Zakon},
  title        = {TrueErase: per-file secure deletion for the storage data path},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {439--448},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421013},
  doi          = {10.1145/2420950.2421013},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DiesburgMSMMGWK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DunphyO12,
  author       = {Paul Dunphy and
                  Patrick Olivier},
  editor       = {Robert H'obbes' Zakon},
  title        = {On automated image choice for secure and usable graphical passwords},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420965},
  doi          = {10.1145/2420950.2420965},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DunphyO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnevJBRK12,
  author       = {Miro Enev and
                  Jaeyeon Jung and
                  Liefeng Bo and
                  Xiaofeng Ren and
                  Tadayoshi Kohno},
  editor       = {Robert H'obbes' Zakon},
  title        = {SensorSift: balancing sensor data privacy and utility in automated
                  face understanding},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420975},
  doi          = {10.1145/2420950.2420975},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GatesLCP12,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Jing Chen and
                  Robert W. Proctor},
  editor       = {Robert H'obbes' Zakon},
  title        = {CodeShield: towards personalized application whitelisting},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {279--288},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420992},
  doi          = {10.1145/2420950.2420992},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GatesLCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GrazianoLB12,
  author       = {Mariano Graziano and
                  Corrado Leita and
                  Davide Balzarotti},
  editor       = {Robert H'obbes' Zakon},
  title        = {Towards network containment in malware analysis systems},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {339--348},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421000},
  doi          = {10.1145/2420950.2421000},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GrazianoLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HeelanG12,
  author       = {Sean Heelan and
                  Agustin Gianni},
  editor       = {Robert H'obbes' Zakon},
  title        = {Augmenting vulnerability analysis of binary code},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {199--208},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420981},
  doi          = {10.1145/2420950.2420981},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HeelanG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HoushmandA12,
  author       = {Shiva Houshmand and
                  Sudhir Aggarwal},
  editor       = {Robert H'obbes' Zakon},
  title        = {Building better passwords using probabilistic techniques},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420966},
  doi          = {10.1145/2420950.2420966},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HoushmandA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JarabekBA12,
  author       = {Chris Jarabek and
                  David Barrera and
                  John Aycock},
  editor       = {Robert H'obbes' Zakon},
  title        = {ThinAV: truly lightweight mobile cloud-based anti-malware},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {209--218},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420983},
  doi          = {10.1145/2420950.2420983},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JarabekBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsLBF12,
  author       = {Martin Johns and
                  Sebastian Lekies and
                  Bastian Braun and
                  Benjamin Flesch},
  editor       = {Robert H'obbes' Zakon},
  title        = {BetterAuth: web authentication revisited},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420977},
  doi          = {10.1145/2420950.2420977},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsLBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Kumar12,
  author       = {Apurva Kumar},
  editor       = {Robert H'obbes' Zakon},
  title        = {Using automated model analysis for reasoning about security of web
                  protocols},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {289--298},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420993},
  doi          = {10.1145/2420950.2420993},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Kumar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LevillainEMD12,
  author       = {Olivier Levillain and
                  Arnaud {\'{E}}balard and
                  Benjamin Morin and
                  Herv{\'{e}} Debar},
  editor       = {Robert H'obbes' Zakon},
  title        = {One year of {SSL} internet measurement},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420953},
  doi          = {10.1145/2420950.2420953},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LevillainEMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12,
  author       = {Martina Lindorfer and
                  Alessandro Di Federico and
                  Federico Maggi and
                  Paolo Milani Comparetti and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {Lines of malicious code: insights into the malicious software industry},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {349--358},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421001},
  doi          = {10.1145/2420950.2421001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MarforioRFC12,
  author       = {Claudio Marforio and
                  Hubert Ritzdorf and
                  Aur{\'{e}}lien Francillon and
                  Srdjan Capkun},
  editor       = {Robert H'obbes' Zakon},
  title        = {Analysis of the communication between colluding applications on modern
                  smartphones},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420958},
  doi          = {10.1145/2420950.2420958},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MarforioRFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MastiMRFC12,
  author       = {Ramya Jayaram Masti and
                  Claudio Marforio and
                  Aanjhan Ranganathan and
                  Aur{\'{e}}lien Francillon and
                  Srdjan Capkun},
  editor       = {Robert H'obbes' Zakon},
  title        = {Enabling trusted scheduling in embedded systems},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420960},
  doi          = {10.1145/2420950.2420960},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MastiMRFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McCarneyBCCO12,
  author       = {Daniel McCarney and
                  David Barrera and
                  Jeremy Clark and
                  Sonia Chiasson and
                  Paul C. van Oorschot},
  editor       = {Robert H'obbes' Zakon},
  title        = {Tapas: design, implementation, and usability evaluation of a password
                  manager},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420964},
  doi          = {10.1145/2420950.2420964},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/McCarneyBCCO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottMLKK12,
  author       = {John P. McDermott and
                  Bruce E. Montrose and
                  Margery Li and
                  James Kirby and
                  Myong H. Kang},
  editor       = {Robert H'obbes' Zakon},
  title        = {Separation virtual machine monitors},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {419--428},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421011},
  doi          = {10.1145/2420950.2421011},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottMLKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuthukumaranRTVTJ12,
  author       = {Divya Muthukumaran and
                  Sandra Julieta Rueda and
                  Nirupama Talele and
                  Hayawardh Vijayakumar and
                  Jason Teutsch and
                  Trent Jaeger},
  editor       = {Robert H'obbes' Zakon},
  title        = {Transforming commodity security policies to enforce Clark-Wilson integrity},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {269--278},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420991},
  doi          = {10.1145/2420950.2420991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuthukumaranRTVTJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PerdisciU12,
  author       = {Roberto Perdisci and
                  Man Chon U},
  editor       = {Robert H'obbes' Zakon},
  title        = {{VAMO:} towards a fully automated malware clustering validity analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {329--338},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420999},
  doi          = {10.1145/2420950.2420999},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PerdisciU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PohlyMMB12,
  author       = {Devin J. Pohly and
                  Stephen E. McLaughlin and
                  Patrick D. McDaniel and
                  Kevin R. B. Butler},
  editor       = {Robert H'obbes' Zakon},
  title        = {Hi-Fi: collecting high-fidelity whole-system provenance},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {259--268},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420989},
  doi          = {10.1145/2420950.2420989},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PohlyMMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12,
  author       = {Iasonas Polakis and
                  Marco Lancini and
                  Georgios Kontaxis and
                  Federico Maggi and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {All your face are belong to us: breaking Facebook's social authentication},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421008},
  doi          = {10.1145/2420950.2421008},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ReinaFPCB12,
  author       = {Alessandro Reina and
                  Aristide Fattori and
                  Fabio Pagani and
                  Lorenzo Cavallaro and
                  Danilo Bruschi},
  editor       = {Robert H'obbes' Zakon},
  title        = {When hardware meets software: a bulletproof solution to forensic memory
                  acquisition},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420962},
  doi          = {10.1145/2420950.2420962},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ReinaFPCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12,
  author       = {Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robert H'obbes' Zakon},
  title        = {Jarhead analysis and detection of malicious Java applets},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {249--257},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420988},
  doi          = {10.1145/2420950.2420988},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShiojiKIH12,
  author       = {Eitaro Shioji and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Takeo Hariu},
  editor       = {Robert H'obbes' Zakon},
  title        = {Code shredding: byte-granular randomization of program layout for
                  detecting code-reuse attacks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {309--318},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420996},
  doi          = {10.1145/2420950.2420996},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShiojiKIH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SinghBMKA12,
  author       = {Indrajeet Singh and
                  Michael Butkiewicz and
                  Harsha V. Madhyastha and
                  Srikanth V. Krishnamurthy and
                  Sateesh Addepalli},
  editor       = {Robert H'obbes' Zakon},
  title        = {Enabling private conversations on Twitter},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {409--418},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421009},
  doi          = {10.1145/2420950.2421009},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SinghBMKA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SmutzS12,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  editor       = {Robert H'obbes' Zakon},
  title        = {Malicious {PDF} detection using metadata and structural features},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420987},
  doi          = {10.1145/2420950.2420987},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SmutzS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SridharanSG12,
  author       = {Vasumathi Sridharan and
                  Vaibhav Shankar and
                  Minaxi Gupta},
  editor       = {Robert H'obbes' Zakon},
  title        = {Twitter games: how successful spammers pick targets},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {389--398},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421007},
  doi          = {10.1145/2420950.2421007},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SridharanSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SrivastavaG12,
  author       = {Abhinav Srivastava and
                  Jonathon T. Giffin},
  editor       = {Robert H'obbes' Zakon},
  title        = {Efficient protection of kernel data structures via object partitioning},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {429--438},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421012},
  doi          = {10.1145/2420950.2421012},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SrivastavaG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StefanovDJO12,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea},
  editor       = {Robert H'obbes' Zakon},
  title        = {Iris: a scalable cloud file system with efficient integrity checks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420985},
  doi          = {10.1145/2420950.2420985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TendulkarSPBSE12,
  author       = {Vasant Tendulkar and
                  Ryan Snyder and
                  Joe Pletcher and
                  Kevin R. B. Butler and
                  Ashwin Shashidharan and
                  William Enck},
  editor       = {Robert H'obbes' Zakon},
  title        = {Abusing cloud-based browsers for fun and profit},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {219--228},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420984},
  doi          = {10.1145/2420950.2420984},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TendulkarSPBSE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TrewinSKMSB12,
  author       = {Shari Trewin and
                  Calvin Swart and
                  Larry Koved and
                  Jacquelyn Martino and
                  Kapil Singh and
                  Shay Ben{-}David},
  editor       = {Robert H'obbes' Zakon},
  title        = {Biometric authentication on a mobile device: a study of user effort,
                  error and task disruption},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {159--168},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420976},
  doi          = {10.1145/2420950.2420976},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/TrewinSKMSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WartellMHL12,
  author       = {Richard Wartell and
                  Vishwath Mohan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  editor       = {Robert H'obbes' Zakon},
  title        = {Securing untrusted code via compiler-agnostic binary rewriting},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {299--308},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420995},
  doi          = {10.1145/2420950.2420995},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WartellMHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeiGNF12,
  author       = {Xuetao Wei and
                  Lorenzo Gomez and
                  Iulian Neamtiu and
                  Michalis Faloutsos},
  editor       = {Robert H'obbes' Zakon},
  title        = {Permission evolution in the Android ecosystem},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420956},
  doi          = {10.1145/2420950.2420956},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WeiGNF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsFH12,
  author       = {Carsten Willems and
                  Felix C. Freiling and
                  Thorsten Holz},
  editor       = {Robert H'obbes' Zakon},
  title        = {Using memory management to detect and extract illegitimate code for
                  malware analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420979},
  doi          = {10.1145/2420950.2420979},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12,
  author       = {Carsten Willems and
                  Ralf Hund and
                  Andreas Fobian and
                  Dennis Felsch and
                  Thorsten Holz and
                  Amit Vasudevan},
  editor       = {Robert H'obbes' Zakon},
  title        = {Down to the bare metal: using processor features for binary analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {189--198},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420980},
  doi          = {10.1145/2420950.2420980},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YamaguchiLR12,
  author       = {Fabian Yamaguchi and
                  Markus Lottmann and
                  Konrad Rieck},
  editor       = {Robert H'obbes' Zakon},
  title        = {Generalized vulnerability extrapolation using abstract syntax trees},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {359--368},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421003},
  doi          = {10.1145/2420950.2421003},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YamaguchiLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZavouPK12,
  author       = {Angeliki Zavou and
                  Georgios Portokalidis and
                  Angelos D. Keromytis},
  editor       = {Robert H'obbes' Zakon},
  title        = {Self-healing multitier architectures using cascading rescue points},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {379--388},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421005},
  doi          = {10.1145/2420950.2421005},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZavouPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaoLLGMT12,
  author       = {Shuang Zhao and
                  Patrick P. C. Lee and
                  John C. S. Lui and
                  Xiaohong Guan and
                  Xiaobo Ma and
                  Jing Tao},
  editor       = {Robert H'obbes' Zakon},
  title        = {Cloud-based push-styled mobile botnets: a case study of exploiting
                  the cloud to device messaging service},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420968},
  doi          = {10.1145/2420950.2420968},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhaoLLGMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2012,
  editor       = {Robert H'obbes' Zakon},
  title        = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2420950},
  isbn         = {978-1-4503-1312-4},
  timestamp    = {Thu, 20 Dec 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics