Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/spsm2013.bht:"
@inproceedings{DBLP:conf/ccs/BookW13, author = {Theodore Book and Dan S. Wallach}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {A case of collusion: a study of the interface between ad libraries and their apps}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {79--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516762}, doi = {10.1145/2516760.2516762}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BookW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoswellAKS13, author = {Stephen Doswell and Nauman Aslam and David Kendall and Graham Sexton}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Please slow down!: the impact on tor performance from mobility}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {87--92}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516773}, doi = {10.1145/2516760.2516773}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoswellAKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FedlerKS13, author = {Rafael Fedler and Marcel Kulicke and Julian Sch{\"{u}}tte}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Native code execution control for attack mitigation on android}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {15--20}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516765}, doi = {10.1145/2516760.2516765}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FedlerKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Geater13, author = {Jon A. Geater}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Security composition in the real world: squaring the circle of mobile security with contemporary device economics}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516761}, doi = {10.1145/2516760.2516761}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Geater13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaqueWS13, author = {S. M. Taiabul Haque and Matthew K. Wright and Shannon Scielzo}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {105--110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516767}, doi = {10.1145/2516760.2516767}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaqueWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiangKMLGAH13, author = {Shuying Liang and Andrew W. Keep and Matthew Might and Steven Lyde and Thomas Gilray and Petey Aldous and David Van Horn}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Sound and precise malware analysis for android via pushdown reachability and entry-point saturation}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {21--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516769}, doi = {10.1145/2516760.2516769}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiangKMLGAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaggiVZ13, author = {Federico Maggi and Andrea Valdi and Stefano Zanero}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {49--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516768}, doi = {10.1145/2516760.2516768}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaggiVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarforioKSKC13, author = {Claudio Marforio and Nikolaos Karapanos and Claudio Soriente and Kari Kostiainen and Srdjan Capkun}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Secure enrollment and practical migration for mobile trusted execution environments}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {93--98}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516764}, doi = {10.1145/2516760.2516764}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MarforioKSKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NarayanS13, author = {Akshay Narayan and Prateek Saxena}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {The curse of 140 characters: evaluating the efficacy of {SMS} spam detection on android}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {33--42}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516772}, doi = {10.1145/2516760.2516772}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NarayanS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PanCZ13, author = {Shijia Pan and An Chen and Pei Zhang}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Securitas: user identification through {RGB-NIR} camera pair on mobile devices}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {99--104}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516766}, doi = {10.1145/2516760.2516766}, timestamp = {Thu, 28 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PanCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SellwoodC13, author = {James Sellwood and Jason Crampton}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Sleeping android: the danger of dormant permissions}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {55--66}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516774}, doi = {10.1145/2516760.2516774}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SellwoodC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SimonA13, author = {Laurent Simon and Ross J. Anderson}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {{PIN} skimmer: inferring PINs through the camera and microphone}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {67--78}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516770}, doi = {10.1145/2516760.2516770}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SimonA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SkillenBO13, author = {Adam Skillen and David Barrera and Paul C. van Oorschot}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Deadbolt: locking down android disk encryption}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {3--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516771}, doi = {10.1145/2516760.2516771}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SkillenBO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasilomanolakisKFMPPP13, author = {Emmanouil Vasilomanolakis and Shankar Karuppayah and Mathias Fischer and Max M{\"{u}}hlh{\"{a}}user and Mihai Plasoianu and Lars Pandikow and Wulf Pfeiffer}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {This network is infected: HosTaGe - a low-interaction honeypot for mobile devices}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {43--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516763}, doi = {10.1145/2516760.2516763}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VasilomanolakisKFMPPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013spsm, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2516760}, isbn = {978-1-4503-2491-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013spsm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.