Search dblp for Publications

export results for "toc:db/conf/ccs/spsm2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BookW13,
  author       = {Theodore Book and
                  Dan S. Wallach},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {A case of collusion: a study of the interface between ad libraries
                  and their apps},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {79--86},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516762},
  doi          = {10.1145/2516760.2516762},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BookW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DoswellAKS13,
  author       = {Stephen Doswell and
                  Nauman Aslam and
                  David Kendall and
                  Graham Sexton},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Please slow down!: the impact on tor performance from mobility},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {87--92},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516773},
  doi          = {10.1145/2516760.2516773},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DoswellAKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FedlerKS13,
  author       = {Rafael Fedler and
                  Marcel Kulicke and
                  Julian Sch{\"{u}}tte},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Native code execution control for attack mitigation on android},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516765},
  doi          = {10.1145/2516760.2516765},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FedlerKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Geater13,
  author       = {Jon A. Geater},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Security composition in the real world: squaring the circle of mobile
                  security with contemporary device economics},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516761},
  doi          = {10.1145/2516760.2516761},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Geater13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaqueWS13,
  author       = {S. M. Taiabul Haque and
                  Matthew K. Wright and
                  Shannon Scielzo},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Passwords and interfaces: towards creating stronger passwords by using
                  mobile phone handsets},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516767},
  doi          = {10.1145/2516760.2516767},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaqueWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiangKMLGAH13,
  author       = {Shuying Liang and
                  Andrew W. Keep and
                  Matthew Might and
                  Steven Lyde and
                  Thomas Gilray and
                  Petey Aldous and
                  David Van Horn},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Sound and precise malware analysis for android via pushdown reachability
                  and entry-point saturation},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516769},
  doi          = {10.1145/2516760.2516769},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiangKMLGAH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaggiVZ13,
  author       = {Federico Maggi and
                  Andrea Valdi and
                  Stefano Zanero},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {AndroTotal: a flexible, scalable toolbox and service for testing mobile
                  malware detectors},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516768},
  doi          = {10.1145/2516760.2516768},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaggiVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarforioKSKC13,
  author       = {Claudio Marforio and
                  Nikolaos Karapanos and
                  Claudio Soriente and
                  Kari Kostiainen and
                  Srdjan Capkun},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Secure enrollment and practical migration for mobile trusted execution
                  environments},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {93--98},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516764},
  doi          = {10.1145/2516760.2516764},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MarforioKSKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NarayanS13,
  author       = {Akshay Narayan and
                  Prateek Saxena},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {The curse of 140 characters: evaluating the efficacy of {SMS} spam
                  detection on android},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516772},
  doi          = {10.1145/2516760.2516772},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NarayanS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PanCZ13,
  author       = {Shijia Pan and
                  An Chen and
                  Pei Zhang},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Securitas: user identification through {RGB-NIR} camera pair on mobile
                  devices},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516766},
  doi          = {10.1145/2516760.2516766},
  timestamp    = {Thu, 28 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PanCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SellwoodC13,
  author       = {James Sellwood and
                  Jason Crampton},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Sleeping android: the danger of dormant permissions},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516774},
  doi          = {10.1145/2516760.2516774},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SellwoodC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SimonA13,
  author       = {Laurent Simon and
                  Ross J. Anderson},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {{PIN} skimmer: inferring PINs through the camera and microphone},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516770},
  doi          = {10.1145/2516760.2516770},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SimonA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SkillenBO13,
  author       = {Adam Skillen and
                  David Barrera and
                  Paul C. van Oorschot},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {Deadbolt: locking down android disk encryption},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516771},
  doi          = {10.1145/2516760.2516771},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SkillenBO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasilomanolakisKFMPPP13,
  author       = {Emmanouil Vasilomanolakis and
                  Shankar Karuppayah and
                  Mathias Fischer and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Mihai Plasoianu and
                  Lars Pandikow and
                  Wulf Pfeiffer},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {This network is infected: HosTaGe - a low-interaction honeypot for
                  mobile devices},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516763},
  doi          = {10.1145/2516760.2516763},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VasilomanolakisKFMPPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013spsm,
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2516760},
  isbn         = {978-1-4503-2491-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013spsm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics