Search dblp for Publications

export results for "toc:db/conf/acsac/acsac2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/AbbasiHZE17,
  author       = {Ali Abbasi and
                  Thorsten Holz and
                  Emmanuele Zambon and
                  Sandro Etalle},
  title        = {{ECFI:} Asynchronous Control Flow Integrity for Programmable Logic
                  Controllers},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {437--448},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134618},
  doi          = {10.1145/3134600.3134618},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AbbasiHZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivDWK17,
  author       = {Adam J. Aviv and
                  John T. Davin and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Towards Baselines for Shoulder Surfing on Mobile Authentication},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {486--498},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134609},
  doi          = {10.1145/3134600.3134609},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivDWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AzimpourkiviTC17,
  author       = {Mozhgan Azimpourkivi and
                  Umut Topkara and
                  Bogdan Carbunar},
  title        = {A Secure Mobile Authentication Alternative to Biometrics},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {28--41},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134619},
  doi          = {10.1145/3134600.3134619},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AzimpourkiviTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BarronN17,
  author       = {Timothy Barron and
                  Nick Nikiforakis},
  title        = {Picky Attackers: Quantifying the Role of System Properties on Intruder
                  Behavior},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {387--398},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134614},
  doi          = {10.1145/3134600.3134614},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BarronN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BellafqiraCBQC17,
  author       = {Reda Bellafqira and
                  Gouenou Coatrieux and
                  Dalel Bouslimi and
                  Gwenol{\'{e}} Quellec and
                  Michel Cozic},
  title        = {Proxy Re-Encryption Based on Homomorphic Encryption},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {154--161},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134616},
  doi          = {10.1145/3134600.3134616},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BellafqiraCBQC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BianchiGFKV17,
  author       = {Antonio Bianchi and
                  Eric Gustafson and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public
                  Information},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {16--27},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134615},
  doi          = {10.1145/3134600.3134615},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BortolameottiEC17,
  author       = {Riccardo Bortolameotti and
                  Thijs van Ede and
                  Marco Caselli and
                  Maarten H. Everts and
                  Pieter H. Hartel and
                  Rick Hofstede and
                  Willem Jonker and
                  Andreas Peter},
  title        = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive
                  Application Fingerprinting},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {373--386},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134605},
  doi          = {10.1145/3134600.3134605},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BulckMP17,
  author       = {Jo Van Bulck and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens},
  title        = {VulCAN: Efficient Component Authentication and Software Isolation
                  for Automotive Control Networks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {225--237},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134623},
  doi          = {10.1145/3134600.3134623},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BulckMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoG17,
  author       = {Xiaoyu Cao and
                  Neil Zhenqiang Gong},
  title        = {Mitigating Evasion Attacks to Deep Neural Networks via Region-based
                  Classification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {278--287},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134606},
  doi          = {10.1145/3134600.3134606},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenDBJC17,
  author       = {Binbin Chen and
                  Xinshu Dong and
                  Guangdong Bai and
                  Sumeet Jauhar and
                  Yueqiang Cheng},
  title        = {Secure and Efficient Software-based Attestation for Industrial Control
                  Devices with {ARM} Processors},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {425--436},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134621},
  doi          = {10.1145/3134600.3134621},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenDBJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenHCGHR17,
  author       = {Shang{-}Tse Chen and
                  Yufei Han and
                  Duen Horng Chau and
                  Christopher S. Gates and
                  Michael Hart and
                  Kevin A. Roundy},
  title        = {Predicting Cyber Threats with Virtual Security Products},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {189--199},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134617},
  doi          = {10.1145/3134600.3134617},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenHCGHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenHY17,
  author       = {Lingwei Chen and
                  Shifu Hou and
                  Yanfang Ye},
  title        = {SecureDroid: Enhancing Security of Machine Learning-based Detection
                  against Adversarial Android Malware Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {362--372},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134636},
  doi          = {10.1145/3134600.3134636},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenLEAZ17,
  author       = {Haining Chen and
                  Ninghui Li and
                  William Enck and
                  Yousra Aafer and
                  Xiangyu Zhang},
  title        = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {553--565},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134638},
  doi          = {10.1145/3134600.3134638},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenLEAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChengTY17,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng (Daphne) Yao},
  title        = {Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against
                  Data-Oriented Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {315--326},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134640},
  doi          = {10.1145/3134600.3134640},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChengTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChevalierVPH17,
  author       = {Ronny Chevalier and
                  Maugan Villatel and
                  David Plaquin and
                  Guillaume Hiet},
  title        = {Co-processor-based Behavior Monitoring: Application to the Detection
                  of Attacks Against the System Management Mode},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {399--411},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134622},
  doi          = {10.1145/3134600.3134622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChevalierVPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DabrowskiUW17,
  author       = {Adrian Dabrowski and
                  Johanna Ullrich and
                  Edgar R. Weippl},
  title        = {Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The
                  Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {303--314},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134639},
  doi          = {10.1145/3134600.3134639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DabrowskiUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DellAmicoBKEV17,
  author       = {Matteo Dell'Amico and
                  Leyla Bilge and
                  Ashwin Kumar Kayyoor and
                  Petros Efstathopoulos and
                  Pierre{-}Antoine Vervier},
  title        = {Lean On Me: Mining Internet Service Dependencies From Large-Scale
                  {DNS} Data},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {449--460},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134637},
  doi          = {10.1145/3134600.3134637},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DellAmicoBKEV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DengM17,
  author       = {Xiyue Deng and
                  Jelena Mirkovic},
  title        = {Commoner Privacy And {A} Study On Network Traces},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {566--576},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134602},
  doi          = {10.1145/3134600.3134602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DengM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GosainACA17,
  author       = {Devashish Gosain and
                  Anshika Agarwal and
                  Sambuddho Chakravarty and
                  Hrishikesh B. Acharya},
  title        = {The Devil's in The Details: Placing Decoy Routers in the Internet},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {577--589},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134608},
  doi          = {10.1145/3134600.3134608},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GosainACA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuanJCZLLLXX17,
  author       = {Le Guan and
                  Shijie Jia and
                  Bo Chen and
                  Fengwei Zhang and
                  Bo Luo and
                  Jingqiang Lin and
                  Peng Liu and
                  Xinyu Xing and
                  Luning Xia},
  title        = {Supporting Transparent Snapshot for Bare-metal Malware Analysis on
                  Mobile Devices},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {339--349},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134647},
  doi          = {10.1145/3134600.3134647},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GuanJCZLLLXX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HusariAACN17,
  author       = {Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Mohiuddin Ahmed and
                  Bill Chu and
                  Xi Niu},
  title        = {TTPDrill: Automatic and Accurate Extraction of Threat Actions from
                  Unstructured Text of {CTI} Sources},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {103--115},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134646},
  doi          = {10.1145/3134600.3134646},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HusariAACN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jang0J17,
  author       = {Uyeong Jang and
                  Xi Wu and
                  Somesh Jha},
  title        = {Objective Metrics and Gradient Descent Algorithms for Adversarial
                  Examples in Machine Learning},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {262--277},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134635},
  doi          = {10.1145/3134600.3134635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jang0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JiangZAWCLG17,
  author       = {Jianyu Jiang and
                  Shixiong Zhao and
                  Danish Alsayed and
                  Yuexuan Wang and
                  Heming Cui and
                  Feng Liang and
                  Zhaoquan Gu},
  title        = {Kakute: {A} Precise, Unified Information Flow Analysis System for
                  Big-data Security},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134607},
  doi          = {10.1145/3134600.3134607},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JiangZAWCLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JohnsonBS17,
  author       = {Peter C. Johnson and
                  Sergey Bratus and
                  Sean W. Smith},
  title        = {Protecting Against Malicious Bits On the Wire: Automatically Generating
                  a {USB} Protocol Parser for a Production Kernel},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {528--541},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134630},
  doi          = {10.1145/3134600.3134630},
  timestamp    = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JohnsonBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimHHJ17,
  author       = {Jun Young Kim and
                  Ralph Holz and
                  Wen Hu and
                  Sanjay Jha},
  title        = {Automated Analysis of Secure Internet of Things Protocols},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {238--249},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134624},
  doi          = {10.1145/3134600.3134624},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KimHHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimKCKSZX17,
  author       = {Taegyu Kim and
                  Chung Hwan Kim and
                  Hongjun Choi and
                  Yonghwi Kwon and
                  Brendan Saltaformaggio and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {RevARM: {A} Platform-Agnostic {ARM} Binary Rewriter for Security Applications},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {412--424},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134627},
  doi          = {10.1145/3134600.3134627},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KimKCKSZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeeKK17,
  author       = {Hoyeon Lee and
                  Seungyeon Kim and
                  Taekyoung Kwon},
  title        = {Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent
                  Fingerprints and Smudges Remaining on Smartphones},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {512--527},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134643},
  doi          = {10.1145/3134600.3134643},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeeKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MirkovicKR17,
  author       = {Jelena Mirkovic and
                  Erik Kline and
                  Peter L. Reiher},
  title        = {{RESECT:} Self-Learning Traffic Filters for {IP} Spoofing Defense},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {474--485},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134644},
  doi          = {10.1145/3134600.3134644},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MirkovicKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NemecKSSM17,
  author       = {Mat{\'{u}}s Nemec and
                  Dusan Klinec and
                  Petr Svenda and
                  Peter Sekan and
                  Vashek Matyas},
  title        = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {162--175},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134612},
  doi          = {10.1145/3134600.3134612},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NemecKSSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OgasawaraK17,
  author       = {Junya Ogasawara and
                  Kenji Kono},
  title        = {Nioh: Hardening The Hypervisor by Filtering Illegal {I/O} Requests
                  to Virtual Devices},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {542--552},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134648},
  doi          = {10.1145/3134600.3134648},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OgasawaraK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PeetersHMGHH17,
  author       = {Roel Peeters and
                  Jens Hermans and
                  Pieter Maene and
                  Katri Grenman and
                  Kimmo Halunen and
                  Juha H{\"{a}}iki{\"{o}}},
  title        = {n-Auth: Mobile Authentication Done Right},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134613},
  doi          = {10.1145/3134600.3134613},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PeetersHMGHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PewnyKDH17,
  author       = {Jannik Pewny and
                  Philipp Koppe and
                  Lucas Davi and
                  Thorsten Holz},
  title        = {Breaking and Fixing Destructive Code Read Defenses},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {55--67},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134626},
  doi          = {10.1145/3134600.3134626},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PewnyKDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/QuachCP17,
  author       = {Anh Quach and
                  Matthew Cole and
                  Aravind Prakash},
  title        = {Supplementing Modern Software Defenses with Stack-Pointer Sanity},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {116--127},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134641},
  doi          = {10.1145/3134600.3134641},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/QuachCP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RoundyTSHKDS17,
  author       = {Kevin A. Roundy and
                  Acar Tamersoy and
                  Michael Spertus and
                  Michael Hart and
                  Daniel Kats and
                  Matteo Dell'Amico and
                  Robert Scott},
  title        = {Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {200--211},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134645},
  doi          = {10.1145/3134600.3134645},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RoundyTSHKDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SallsSSKV17,
  author       = {Christopher Salls and
                  Yan Shoshitaishvili and
                  Nick Stephens and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Piston: Uncooperative Remote Runtime Patching},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {141--153},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134611},
  doi          = {10.1145/3134600.3134611},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianSG17,
  author       = {Maliheh Shirvanian and
                  Nitesh Saxena and
                  Jesvin James George},
  title        = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study
                  of Remote Key-Fingerprint Verification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {499--511},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134610},
  doi          = {10.1145/3134600.3134610},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SkowyraGBLO17,
  author       = {Richard Skowyra and
                  Steven R. Gomez and
                  David Bigelow and
                  James Landry and
                  Hamed Okhravi},
  title        = {{QUASAR:} Quantitative Attack Space Analysis and Reasoning},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {68--78},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134633},
  doi          = {10.1145/3134600.3134633},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SkowyraGBLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SluganovicSDM17,
  author       = {Ivo Sluganovic and
                  Matej Serbec and
                  Ante Derek and
                  Ivan Martinovic},
  title        = {HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {250--261},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134625},
  doi          = {10.1145/3134600.3134625},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SluganovicSDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StoneCG17,
  author       = {Chris McMahon Stone and
                  Tom Chothia and
                  Flavio D. Garcia},
  title        = {Spinner: Semi-Automatic Detection of Pinning without Hostname Verification},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {176--188},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134628},
  doi          = {10.1145/3134600.3134628},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StoneCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StringhiniSHZ17,
  author       = {Gianluca Stringhini and
                  Yun Shen and
                  Yufei Han and
                  Xiangliang Zhang},
  title        = {Marmite: Spreading Malicious File Reputation Through Download Graphs},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134604},
  doi          = {10.1145/3134600.3134604},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StringhiniSHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ThomasOCR17,
  author       = {Richard J. Thomas and
                  Mihai Ordean and
                  Tom Chothia and
                  Joeri de Ruiter},
  title        = {{TRAKS:} {A} Universal Key Management Scheme for {ERTMS}},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {327--338},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134631},
  doi          = {10.1145/3134600.3134631},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ThomasOCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangZZY17,
  author       = {Xiaolei Wang and
                  Sencun Zhu and
                  Dehua Zhou and
                  Yuexiang Yang},
  title        = {Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated
                  Dynamic Analysis of Android Malware},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {350--361},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134601},
  doi          = {10.1145/3134600.3134601},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangZZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeidmanG17,
  author       = {Jake Weidman and
                  Jens Grossklags},
  title        = {I Like It, but {I} Hate It: Employee Perceptions Towards an Institutional
                  Transition to {BYOD} Second-Factor Authentication},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {212--224},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134629},
  doi          = {10.1145/3134600.3134629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeidmanG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeissbacherMSSR17,
  author       = {Michael Weissbacher and
                  Enrico Mariconti and
                  Guillermo Suarez{-}Tangil and
                  Gianluca Stringhini and
                  William K. Robertson and
                  Engin Kirda},
  title        = {Ex-Ray: Detection of History-Leaking Browser Extensions},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {590--602},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134632},
  doi          = {10.1145/3134600.3134632},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WeissbacherMSSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanSCX17,
  author       = {Hua Yan and
                  Yulei Sui and
                  Shiping Chen and
                  Jingling Xue},
  title        = {Machine-Learning-Guided Typestate Analysis for Static Use-After-Free
                  Detection},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {42--54},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134620},
  doi          = {10.1145/3134600.3134620},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YanSCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangK0G17,
  author       = {Wei Yang and
                  Deguang Kong and
                  Tao Xie and
                  Carl A. Gunter},
  title        = {Malware Detection in Adversarial Settings: Exploiting Feature Evolutions
                  and Confusions in Android Apps},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {288--302},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134642},
  doi          = {10.1145/3134600.3134642},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangK0G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YoonSPYKFOV17,
  author       = {Changhoon Yoon and
                  Seungwon Shin and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Heedo Kang and
                  Martin W. Fong and
                  Brian O'Connor and
                  Thomas Vachuska},
  title        = {A Security-Mode for Carrier-Grade {SDN} Controllers},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {461--473},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134603},
  doi          = {10.1145/3134600.3134603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YoonSPYKFOV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangPS17,
  author       = {Mingwei Zhang and
                  Michalis Polychronakis and
                  R. Sekar},
  title        = {Protecting {COTS} Binaries from Disclosure-guided Code Reuse Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {128--140},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134634},
  doi          = {10.1145/3134600.3134634},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2017,
  title        = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600},
  doi          = {10.1145/3134600},
  isbn         = {978-1-4503-5345-8},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics