Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac2017.bht:"
@inproceedings{DBLP:conf/acsac/AbbasiHZE17, author = {Ali Abbasi and Thorsten Holz and Emmanuele Zambon and Sandro Etalle}, title = {{ECFI:} Asynchronous Control Flow Integrity for Programmable Logic Controllers}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {437--448}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134618}, doi = {10.1145/3134600.3134618}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AbbasiHZE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivDWK17, author = {Adam J. Aviv and John T. Davin and Flynn Wolf and Ravi Kuber}, title = {Towards Baselines for Shoulder Surfing on Mobile Authentication}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {486--498}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134609}, doi = {10.1145/3134600.3134609}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivDWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AzimpourkiviTC17, author = {Mozhgan Azimpourkivi and Umut Topkara and Bogdan Carbunar}, title = {A Secure Mobile Authentication Alternative to Biometrics}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {28--41}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134619}, doi = {10.1145/3134600.3134619}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AzimpourkiviTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BarronN17, author = {Timothy Barron and Nick Nikiforakis}, title = {Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {387--398}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134614}, doi = {10.1145/3134600.3134614}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BarronN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BellafqiraCBQC17, author = {Reda Bellafqira and Gouenou Coatrieux and Dalel Bouslimi and Gwenol{\'{e}} Quellec and Michel Cozic}, title = {Proxy Re-Encryption Based on Homomorphic Encryption}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {154--161}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134616}, doi = {10.1145/3134600.3134616}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BellafqiraCBQC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BianchiGFKV17, author = {Antonio Bianchi and Eric Gustafson and Yanick Fratantonio and Christopher Kruegel and Giovanni Vigna}, title = {Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {16--27}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134615}, doi = {10.1145/3134600.3134615}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BianchiGFKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiEC17, author = {Riccardo Bortolameotti and Thijs van Ede and Marco Caselli and Maarten H. Everts and Pieter H. Hartel and Rick Hofstede and Willem Jonker and Andreas Peter}, title = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive Application Fingerprinting}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {373--386}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134605}, doi = {10.1145/3134600.3134605}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BulckMP17, author = {Jo Van Bulck and Jan Tobias M{\"{u}}hlberg and Frank Piessens}, title = {VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {225--237}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134623}, doi = {10.1145/3134600.3134623}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BulckMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoG17, author = {Xiaoyu Cao and Neil Zhenqiang Gong}, title = {Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {278--287}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134606}, doi = {10.1145/3134600.3134606}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaoG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenDBJC17, author = {Binbin Chen and Xinshu Dong and Guangdong Bai and Sumeet Jauhar and Yueqiang Cheng}, title = {Secure and Efficient Software-based Attestation for Industrial Control Devices with {ARM} Processors}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {425--436}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134621}, doi = {10.1145/3134600.3134621}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenDBJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenHCGHR17, author = {Shang{-}Tse Chen and Yufei Han and Duen Horng Chau and Christopher S. Gates and Michael Hart and Kevin A. Roundy}, title = {Predicting Cyber Threats with Virtual Security Products}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {189--199}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134617}, doi = {10.1145/3134600.3134617}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChenHCGHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenHY17, author = {Lingwei Chen and Shifu Hou and Yanfang Ye}, title = {SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {362--372}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134636}, doi = {10.1145/3134600.3134636}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChenHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenLEAZ17, author = {Haining Chen and Ninghui Li and William Enck and Yousra Aafer and Xiangyu Zhang}, title = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {553--565}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134638}, doi = {10.1145/3134600.3134638}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenLEAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChengTY17, author = {Long Cheng and Ke Tian and Danfeng (Daphne) Yao}, title = {Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {315--326}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134640}, doi = {10.1145/3134600.3134640}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChengTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChevalierVPH17, author = {Ronny Chevalier and Maugan Villatel and David Plaquin and Guillaume Hiet}, title = {Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {399--411}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134622}, doi = {10.1145/3134600.3134622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChevalierVPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DabrowskiUW17, author = {Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl}, title = {Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {303--314}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134639}, doi = {10.1145/3134600.3134639}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DabrowskiUW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DellAmicoBKEV17, author = {Matteo Dell'Amico and Leyla Bilge and Ashwin Kumar Kayyoor and Petros Efstathopoulos and Pierre{-}Antoine Vervier}, title = {Lean On Me: Mining Internet Service Dependencies From Large-Scale {DNS} Data}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {449--460}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134637}, doi = {10.1145/3134600.3134637}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DellAmicoBKEV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DengM17, author = {Xiyue Deng and Jelena Mirkovic}, title = {Commoner Privacy And {A} Study On Network Traces}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {566--576}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134602}, doi = {10.1145/3134600.3134602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DengM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GosainACA17, author = {Devashish Gosain and Anshika Agarwal and Sambuddho Chakravarty and Hrishikesh B. Acharya}, title = {The Devil's in The Details: Placing Decoy Routers in the Internet}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {577--589}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134608}, doi = {10.1145/3134600.3134608}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GosainACA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuanJCZLLLXX17, author = {Le Guan and Shijie Jia and Bo Chen and Fengwei Zhang and Bo Luo and Jingqiang Lin and Peng Liu and Xinyu Xing and Luning Xia}, title = {Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {339--349}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134647}, doi = {10.1145/3134600.3134647}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GuanJCZLLLXX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HusariAACN17, author = {Ghaith Husari and Ehab Al{-}Shaer and Mohiuddin Ahmed and Bill Chu and Xi Niu}, title = {TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of {CTI} Sources}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {103--115}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134646}, doi = {10.1145/3134600.3134646}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HusariAACN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jang0J17, author = {Uyeong Jang and Xi Wu and Somesh Jha}, title = {Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {262--277}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134635}, doi = {10.1145/3134600.3134635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jang0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JiangZAWCLG17, author = {Jianyu Jiang and Shixiong Zhao and Danish Alsayed and Yuexuan Wang and Heming Cui and Feng Liang and Zhaoquan Gu}, title = {Kakute: {A} Precise, Unified Information Flow Analysis System for Big-data Security}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {79--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134607}, doi = {10.1145/3134600.3134607}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JiangZAWCLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JohnsonBS17, author = {Peter C. Johnson and Sergey Bratus and Sean W. Smith}, title = {Protecting Against Malicious Bits On the Wire: Automatically Generating a {USB} Protocol Parser for a Production Kernel}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {528--541}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134630}, doi = {10.1145/3134600.3134630}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JohnsonBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimHHJ17, author = {Jun Young Kim and Ralph Holz and Wen Hu and Sanjay Jha}, title = {Automated Analysis of Secure Internet of Things Protocols}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {238--249}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134624}, doi = {10.1145/3134600.3134624}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KimHHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KimKCKSZX17, author = {Taegyu Kim and Chung Hwan Kim and Hongjun Choi and Yonghwi Kwon and Brendan Saltaformaggio and Xiangyu Zhang and Dongyan Xu}, title = {RevARM: {A} Platform-Agnostic {ARM} Binary Rewriter for Security Applications}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {412--424}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134627}, doi = {10.1145/3134600.3134627}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KimKCKSZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeeKK17, author = {Hoyeon Lee and Seungyeon Kim and Taekyoung Kwon}, title = {Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {512--527}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134643}, doi = {10.1145/3134600.3134643}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeeKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MirkovicKR17, author = {Jelena Mirkovic and Erik Kline and Peter L. Reiher}, title = {{RESECT:} Self-Learning Traffic Filters for {IP} Spoofing Defense}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {474--485}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134644}, doi = {10.1145/3134600.3134644}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MirkovicKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NemecKSSM17, author = {Mat{\'{u}}s Nemec and Dusan Klinec and Petr Svenda and Peter Sekan and Vashek Matyas}, title = {Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {162--175}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134612}, doi = {10.1145/3134600.3134612}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NemecKSSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OgasawaraK17, author = {Junya Ogasawara and Kenji Kono}, title = {Nioh: Hardening The Hypervisor by Filtering Illegal {I/O} Requests to Virtual Devices}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {542--552}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134648}, doi = {10.1145/3134600.3134648}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OgasawaraK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PeetersHMGHH17, author = {Roel Peeters and Jens Hermans and Pieter Maene and Katri Grenman and Kimmo Halunen and Juha H{\"{a}}iki{\"{o}}}, title = {n-Auth: Mobile Authentication Done Right}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {1--15}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134613}, doi = {10.1145/3134600.3134613}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PeetersHMGHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PewnyKDH17, author = {Jannik Pewny and Philipp Koppe and Lucas Davi and Thorsten Holz}, title = {Breaking and Fixing Destructive Code Read Defenses}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {55--67}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134626}, doi = {10.1145/3134600.3134626}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PewnyKDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/QuachCP17, author = {Anh Quach and Matthew Cole and Aravind Prakash}, title = {Supplementing Modern Software Defenses with Stack-Pointer Sanity}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {116--127}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134641}, doi = {10.1145/3134600.3134641}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/QuachCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RoundyTSHKDS17, author = {Kevin A. Roundy and Acar Tamersoy and Michael Spertus and Michael Hart and Daniel Kats and Matteo Dell'Amico and Robert Scott}, title = {Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {200--211}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134645}, doi = {10.1145/3134600.3134645}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RoundyTSHKDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SallsSSKV17, author = {Christopher Salls and Yan Shoshitaishvili and Nick Stephens and Christopher Kruegel and Giovanni Vigna}, title = {Piston: Uncooperative Remote Runtime Patching}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {141--153}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134611}, doi = {10.1145/3134600.3134611}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SallsSSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianSG17, author = {Maliheh Shirvanian and Nitesh Saxena and Jesvin James George}, title = {On the Pitfalls of End-to-End Encrypted Communications: {A} Study of Remote Key-Fingerprint Verification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {499--511}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134610}, doi = {10.1145/3134600.3134610}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SkowyraGBLO17, author = {Richard Skowyra and Steven R. Gomez and David Bigelow and James Landry and Hamed Okhravi}, title = {{QUASAR:} Quantitative Attack Space Analysis and Reasoning}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {68--78}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134633}, doi = {10.1145/3134600.3134633}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SkowyraGBLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SluganovicSDM17, author = {Ivo Sluganovic and Matej Serbec and Ante Derek and Ivan Martinovic}, title = {HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {250--261}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134625}, doi = {10.1145/3134600.3134625}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SluganovicSDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StoneCG17, author = {Chris McMahon Stone and Tom Chothia and Flavio D. Garcia}, title = {Spinner: Semi-Automatic Detection of Pinning without Hostname Verification}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {176--188}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134628}, doi = {10.1145/3134600.3134628}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StoneCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StringhiniSHZ17, author = {Gianluca Stringhini and Yun Shen and Yufei Han and Xiangliang Zhang}, title = {Marmite: Spreading Malicious File Reputation Through Download Graphs}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {91--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134604}, doi = {10.1145/3134600.3134604}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StringhiniSHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ThomasOCR17, author = {Richard J. Thomas and Mihai Ordean and Tom Chothia and Joeri de Ruiter}, title = {{TRAKS:} {A} Universal Key Management Scheme for {ERTMS}}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {327--338}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134631}, doi = {10.1145/3134600.3134631}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ThomasOCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangZZY17, author = {Xiaolei Wang and Sencun Zhu and Dehua Zhou and Yuexiang Yang}, title = {Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {350--361}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134601}, doi = {10.1145/3134600.3134601}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeidmanG17, author = {Jake Weidman and Jens Grossklags}, title = {I Like It, but {I} Hate It: Employee Perceptions Towards an Institutional Transition to {BYOD} Second-Factor Authentication}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {212--224}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134629}, doi = {10.1145/3134600.3134629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeidmanG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeissbacherMSSR17, author = {Michael Weissbacher and Enrico Mariconti and Guillermo Suarez{-}Tangil and Gianluca Stringhini and William K. Robertson and Engin Kirda}, title = {Ex-Ray: Detection of History-Leaking Browser Extensions}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {590--602}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134632}, doi = {10.1145/3134600.3134632}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeissbacherMSSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanSCX17, author = {Hua Yan and Yulei Sui and Shiping Chen and Jingling Xue}, title = {Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {42--54}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134620}, doi = {10.1145/3134600.3134620}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YanSCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangK0G17, author = {Wei Yang and Deguang Kong and Tao Xie and Carl A. Gunter}, title = {Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {288--302}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134642}, doi = {10.1145/3134600.3134642}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangK0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YoonSPYKFOV17, author = {Changhoon Yoon and Seungwon Shin and Phillip A. Porras and Vinod Yegneswaran and Heedo Kang and Martin W. Fong and Brian O'Connor and Thomas Vachuska}, title = {A Security-Mode for Carrier-Grade {SDN} Controllers}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {461--473}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134603}, doi = {10.1145/3134600.3134603}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YoonSPYKFOV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangPS17, author = {Mingwei Zhang and Michalis Polychronakis and R. Sekar}, title = {Protecting {COTS} Binaries from Disclosure-guided Code Reuse Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {128--140}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134634}, doi = {10.1145/3134600.3134634}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2017, title = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600}, doi = {10.1145/3134600}, isbn = {978-1-4503-5345-8}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.