default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac2012.bht:"
@inproceedings{DBLP:conf/acsac/AgtenABPDP12, author = {Pieter Agten and Steven {Van Acker} and Yoran Brondsema and Phu H. Phung and Lieven Desmet and Frank Piessens}, editor = {Robert H'obbes' Zakon}, title = {JSand: complete client-side sandboxing of third-party JavaScript without browser modifications}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {1--10}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420952}, doi = {10.1145/2420950.2420952}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AgtenABPDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Alexander12, author = {Susan D. Alexander}, editor = {Robert H'obbes' Zakon}, title = {Trust engineering: rejecting the tyranny of the weakest link}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {145--148}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420973}, doi = {10.1145/2420950.2420973}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Alexander12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlrwaisGDSGO12, author = {Sumayah A. Alrwais and Alexandre Gerber and Christopher W. Dunn and Oliver Spatscheck and Minaxi Gupta and Eric Osterweil}, editor = {Robert H'obbes' Zakon}, title = {Dissecting ghost clicks: ad fraud via misdirected human clicks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {21--30}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420954}, doi = {10.1145/2420950.2420954}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AlrwaisGDSGO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Anderson12, author = {Ross J. Anderson}, editor = {Robert H'obbes' Zakon}, title = {Security economics: a personal perspective}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {139--144}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420971}, doi = {10.1145/2420950.2420971}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Anderson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivSBS12, author = {Adam J. Aviv and Benjamin Sapp and Matt Blaze and Jonathan M. Smith}, editor = {Robert H'obbes' Zakon}, title = {Practicality of accelerometer side channels on smartphones}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {41--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420957}, doi = {10.1145/2420950.2420957}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BilgeBRKK12, author = {Leyla Bilge and Davide Balzarotti and William K. Robertson and Engin Kirda and Christopher Kruegel}, editor = {Robert H'obbes' Zakon}, title = {Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {129--138}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420969}, doi = {10.1145/2420950.2420969}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BilgeBRKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BlassR12, author = {Erik{-}Oliver Blass and William Robertson}, editor = {Robert H'obbes' Zakon}, title = {{TRESOR-HUNT:} attacking CPU-bound encryption}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {71--78}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420961}, doi = {10.1145/2420950.2420961}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BlassR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CollbergMMN12, author = {Christian S. Collberg and Sam Martin and Jonathan Myers and Jasvir Nagra}, editor = {Robert H'obbes' Zakon}, title = {Distributed application tamper detection via continuous software updates}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {319--328}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420997}, doi = {10.1145/2420950.2420997}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CollbergMMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DangZGCQX12, author = {Yingnong Dang and Dongmei Zhang and Song Ge and Chengyun Chu and Yingjun Qiu and Tao Xie}, editor = {Robert H'obbes' Zakon}, title = {{XIAO:} tuning code clones at hands of engineers in practice}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {369--378}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421004}, doi = {10.1145/2420950.2421004}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DangZGCQX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DiesburgMSMMGWK12, author = {Sarah M. Diesburg and Christopher R. Meyers and Mark J. Stanovich and Michael Mitchell and Justin Marshall and Julia Gould and An{-}I Andy Wang and Geoff Kuenning}, editor = {Robert H'obbes' Zakon}, title = {TrueErase: per-file secure deletion for the storage data path}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {439--448}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421013}, doi = {10.1145/2420950.2421013}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DiesburgMSMMGWK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DunphyO12, author = {Paul Dunphy and Patrick Olivier}, editor = {Robert H'obbes' Zakon}, title = {On automated image choice for secure and usable graphical passwords}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {99--108}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420965}, doi = {10.1145/2420950.2420965}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DunphyO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnevJBRK12, author = {Miro Enev and Jaeyeon Jung and Liefeng Bo and Xiaofeng Ren and Tadayoshi Kohno}, editor = {Robert H'obbes' Zakon}, title = {SensorSift: balancing sensor data privacy and utility in automated face understanding}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {149--158}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420975}, doi = {10.1145/2420950.2420975}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EnevJBRK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GatesLCP12, author = {Christopher S. Gates and Ninghui Li and Jing Chen and Robert W. Proctor}, editor = {Robert H'obbes' Zakon}, title = {CodeShield: towards personalized application whitelisting}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {279--288}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420992}, doi = {10.1145/2420950.2420992}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GatesLCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GrazianoLB12, author = {Mariano Graziano and Corrado Leita and Davide Balzarotti}, editor = {Robert H'obbes' Zakon}, title = {Towards network containment in malware analysis systems}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {339--348}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421000}, doi = {10.1145/2420950.2421000}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GrazianoLB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HeelanG12, author = {Sean Heelan and Agustin Gianni}, editor = {Robert H'obbes' Zakon}, title = {Augmenting vulnerability analysis of binary code}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {199--208}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420981}, doi = {10.1145/2420950.2420981}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HeelanG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HoushmandA12, author = {Shiva Houshmand and Sudhir Aggarwal}, editor = {Robert H'obbes' Zakon}, title = {Building better passwords using probabilistic techniques}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {109--118}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420966}, doi = {10.1145/2420950.2420966}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HoushmandA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JarabekBA12, author = {Chris Jarabek and David Barrera and John Aycock}, editor = {Robert H'obbes' Zakon}, title = {ThinAV: truly lightweight mobile cloud-based anti-malware}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {209--218}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420983}, doi = {10.1145/2420950.2420983}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JarabekBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JohnsLBF12, author = {Martin Johns and Sebastian Lekies and Bastian Braun and Benjamin Flesch}, editor = {Robert H'obbes' Zakon}, title = {BetterAuth: web authentication revisited}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {169--178}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420977}, doi = {10.1145/2420950.2420977}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JohnsLBF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Kumar12, author = {Apurva Kumar}, editor = {Robert H'obbes' Zakon}, title = {Using automated model analysis for reasoning about security of web protocols}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {289--298}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420993}, doi = {10.1145/2420950.2420993}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Kumar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LevillainEMD12, author = {Olivier Levillain and Arnaud {\'{E}}balard and Benjamin Morin and Herv{\'{e}} Debar}, editor = {Robert H'obbes' Zakon}, title = {One year of {SSL} internet measurement}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {11--20}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420953}, doi = {10.1145/2420950.2420953}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LevillainEMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12, author = {Martina Lindorfer and Alessandro Di Federico and Federico Maggi and Paolo Milani Comparetti and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {Lines of malicious code: insights into the malicious software industry}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {349--358}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421001}, doi = {10.1145/2420950.2421001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MarforioRFC12, author = {Claudio Marforio and Hubert Ritzdorf and Aur{\'{e}}lien Francillon and Srdjan Capkun}, editor = {Robert H'obbes' Zakon}, title = {Analysis of the communication between colluding applications on modern smartphones}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {51--60}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420958}, doi = {10.1145/2420950.2420958}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MarforioRFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MastiMRFC12, author = {Ramya Jayaram Masti and Claudio Marforio and Aanjhan Ranganathan and Aur{\'{e}}lien Francillon and Srdjan Capkun}, editor = {Robert H'obbes' Zakon}, title = {Enabling trusted scheduling in embedded systems}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {61--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420960}, doi = {10.1145/2420950.2420960}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MastiMRFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McCarneyBCCO12, author = {Daniel McCarney and David Barrera and Jeremy Clark and Sonia Chiasson and Paul C. van Oorschot}, editor = {Robert H'obbes' Zakon}, title = {Tapas: design, implementation, and usability evaluation of a password manager}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {89--98}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420964}, doi = {10.1145/2420950.2420964}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/McCarneyBCCO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottMLKK12, author = {John P. McDermott and Bruce E. Montrose and Margery Li and James Kirby and Myong H. Kang}, editor = {Robert H'obbes' Zakon}, title = {Separation virtual machine monitors}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {419--428}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421011}, doi = {10.1145/2420950.2421011}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/McDermottMLKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MuthukumaranRTVTJ12, author = {Divya Muthukumaran and Sandra Julieta Rueda and Nirupama Talele and Hayawardh Vijayakumar and Jason Teutsch and Trent Jaeger}, editor = {Robert H'obbes' Zakon}, title = {Transforming commodity security policies to enforce Clark-Wilson integrity}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {269--278}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420991}, doi = {10.1145/2420950.2420991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MuthukumaranRTVTJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PerdisciU12, author = {Roberto Perdisci and Man Chon U}, editor = {Robert H'obbes' Zakon}, title = {{VAMO:} towards a fully automated malware clustering validity analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {329--338}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420999}, doi = {10.1145/2420950.2420999}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PerdisciU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PohlyMMB12, author = {Devin J. Pohly and Stephen E. McLaughlin and Patrick D. McDaniel and Kevin R. B. Butler}, editor = {Robert H'obbes' Zakon}, title = {Hi-Fi: collecting high-fidelity whole-system provenance}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {259--268}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420989}, doi = {10.1145/2420950.2420989}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PohlyMMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12, author = {Iasonas Polakis and Marco Lancini and Georgios Kontaxis and Federico Maggi and Sotiris Ioannidis and Angelos D. Keromytis and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {All your face are belong to us: breaking Facebook's social authentication}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {399--408}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421008}, doi = {10.1145/2420950.2421008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ReinaFPCB12, author = {Alessandro Reina and Aristide Fattori and Fabio Pagani and Lorenzo Cavallaro and Danilo Bruschi}, editor = {Robert H'obbes' Zakon}, title = {When hardware meets software: a bulletproof solution to forensic memory acquisition}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {79--88}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420962}, doi = {10.1145/2420950.2420962}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ReinaFPCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchlumbergerKV12, author = {Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna}, editor = {Robert H'obbes' Zakon}, title = {Jarhead analysis and detection of malicious Java applets}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {249--257}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420988}, doi = {10.1145/2420950.2420988}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchlumbergerKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShiojiKIH12, author = {Eitaro Shioji and Yuhei Kawakoya and Makoto Iwamura and Takeo Hariu}, editor = {Robert H'obbes' Zakon}, title = {Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {309--318}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420996}, doi = {10.1145/2420950.2420996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShiojiKIH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SinghBMKA12, author = {Indrajeet Singh and Michael Butkiewicz and Harsha V. Madhyastha and Srikanth V. Krishnamurthy and Sateesh Addepalli}, editor = {Robert H'obbes' Zakon}, title = {Enabling private conversations on Twitter}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {409--418}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421009}, doi = {10.1145/2420950.2421009}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SinghBMKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SmutzS12, author = {Charles Smutz and Angelos Stavrou}, editor = {Robert H'obbes' Zakon}, title = {Malicious {PDF} detection using metadata and structural features}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {239--248}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420987}, doi = {10.1145/2420950.2420987}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SmutzS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SridharanSG12, author = {Vasumathi Sridharan and Vaibhav Shankar and Minaxi Gupta}, editor = {Robert H'obbes' Zakon}, title = {Twitter games: how successful spammers pick targets}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {389--398}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421007}, doi = {10.1145/2420950.2421007}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SridharanSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SrivastavaG12, author = {Abhinav Srivastava and Jonathon T. Giffin}, editor = {Robert H'obbes' Zakon}, title = {Efficient protection of kernel data structures via object partitioning}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {429--438}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421012}, doi = {10.1145/2420950.2421012}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SrivastavaG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StefanovDJO12, author = {Emil Stefanov and Marten van Dijk and Ari Juels and Alina Oprea}, editor = {Robert H'obbes' Zakon}, title = {Iris: a scalable cloud file system with efficient integrity checks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {229--238}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420985}, doi = {10.1145/2420950.2420985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TendulkarSPBSE12, author = {Vasant Tendulkar and Ryan Snyder and Joe Pletcher and Kevin R. B. Butler and Ashwin Shashidharan and William Enck}, editor = {Robert H'obbes' Zakon}, title = {Abusing cloud-based browsers for fun and profit}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {219--228}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420984}, doi = {10.1145/2420950.2420984}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TendulkarSPBSE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TrewinSKMSB12, author = {Shari Trewin and Calvin Swart and Larry Koved and Jacquelyn Martino and Kapil Singh and Shay Ben{-}David}, editor = {Robert H'obbes' Zakon}, title = {Biometric authentication on a mobile device: a study of user effort, error and task disruption}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {159--168}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420976}, doi = {10.1145/2420950.2420976}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/TrewinSKMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WartellMHL12, author = {Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin}, editor = {Robert H'obbes' Zakon}, title = {Securing untrusted code via compiler-agnostic binary rewriting}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {299--308}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420995}, doi = {10.1145/2420950.2420995}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WartellMHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiGNF12, author = {Xuetao Wei and Lorenzo Gomez and Iulian Neamtiu and Michalis Faloutsos}, editor = {Robert H'obbes' Zakon}, title = {Permission evolution in the Android ecosystem}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {31--40}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420956}, doi = {10.1145/2420950.2420956}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeiGNF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsFH12, author = {Carsten Willems and Felix C. Freiling and Thorsten Holz}, editor = {Robert H'obbes' Zakon}, title = {Using memory management to detect and extract illegitimate code for malware analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {179--188}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420979}, doi = {10.1145/2420950.2420979}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WillemsHFFHV12, author = {Carsten Willems and Ralf Hund and Andreas Fobian and Dennis Felsch and Thorsten Holz and Amit Vasudevan}, editor = {Robert H'obbes' Zakon}, title = {Down to the bare metal: using processor features for binary analysis}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {189--198}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420980}, doi = {10.1145/2420950.2420980}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WillemsHFFHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YamaguchiLR12, author = {Fabian Yamaguchi and Markus Lottmann and Konrad Rieck}, editor = {Robert H'obbes' Zakon}, title = {Generalized vulnerability extrapolation using abstract syntax trees}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {359--368}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421003}, doi = {10.1145/2420950.2421003}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YamaguchiLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZavouPK12, author = {Angeliki Zavou and Georgios Portokalidis and Angelos D. Keromytis}, editor = {Robert H'obbes' Zakon}, title = {Self-healing multitier architectures using cascading rescue points}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {379--388}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421005}, doi = {10.1145/2420950.2421005}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZavouPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhaoLLGMT12, author = {Shuang Zhao and Patrick P. C. Lee and John C. S. Lui and Xiaohong Guan and Xiaobo Ma and Jing Tao}, editor = {Robert H'obbes' Zakon}, title = {Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {119--128}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420968}, doi = {10.1145/2420950.2420968}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhaoLLGMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2012, editor = {Robert H'obbes' Zakon}, title = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2420950}, isbn = {978-1-4503-1312-4}, timestamp = {Thu, 20 Dec 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.