


default search action
Digital Threats: Research and Practice, Volume 1
Volume 1, Number 1, March 2020
- Arun Lakhotia, Leigh Metcalf:

Digital Threats: Research and Practice Inaugural Issue Editorial. 1:1-1:3 - Andrew Cormack

, Jeroen van der Ham
:
Introduction to the FIRST Special Issue. 2:1-2:3 - François Durvaux

, Marc Durvaux:
SCA-Pitaya: A Practical and Affordable Side-Channel Attack Setup for Power Leakage-Based Evaluations. 3:1-3:16 - Olivier van der Toorn, Anna Sperotto:

Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats. 4:1-4:13 - Chin-Wei Tien

, Shang-Wen Chen, Tao Ban, Sy-Yen Kuo:
Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features. 5:1-5:19 - Jan Kohlrausch, Eugene A. Brin:

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness. 6:1-6:21 - Desiree Sacher:

Fingerpointing False Positives: How to Better Integrate Continuous Improvement into Security Monitoring. 7:1-7:7
Volume 1, Number 2, June 2020
- Louis Waked, Mohammad Mannan, Amr M. Youssef:

The Sorry State of TLS Security in Enterprise Interception Appliances. 8:1-8:26 - Diksha Shukla

, Partha Pratim Kundu, Ravichandra Malapati, Sujit Poudel, Zhanpeng Jin, Vir V. Phoha
:
Thinking Unveiled: An Inference and Correlation Model to Attack EEG Biometrics. 9:1-9:29 - Jyoti Gajrani

, Meenakshi Tripathi, Vijay Laxmi, Gaurav Somani, Akka Zemmari, Manoj Singh Gaur:
Vulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. 10:1-10:25 - Mark Yep-Kui Chua, George O. M. Yee, Yuan Xiang Gu, Chung-Horng Lung:

Threats to Online Advertising and Countermeasures: A Technical Survey. 11:1-11:27 - Xinyi Zhou, Atishay Jain, Vir V. Phoha

, Reza Zafarani:
Fake News Early Detection: A Theory-driven Model. 12:1-12:25 - Matthijs R. Koot:

Field Note on CVE-2019-11510: Pulse Connect Secure SSL-VPN in the Netherlands. 13:1-13:7
Volume 1, Number 3, September 2020
- Renée Burton

:
Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks. 14:1-14:26 - Daniel Scofield, Craig Miles

, Stephen Kuhn:
Automated Model Learning for Accurate Detection of Malicious Digital Documents. 15:1-15:21 - Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti:

Malware Triage for Early Identification of Advanced Persistent Threat Activities. 16:1-16:17 - Antonín Steinhauser, Petr Tuma:

Database Traffic Interception for Graybox Detection of Stored and Context-sensitive XSS. 17:1-17:23 - Robert S. Gutzwiller, Josiah Dykstra, Bryan D. Payne:

Gaps and Opportunities in Situational Awareness for Cybersecurity. 18:1-18:6
Volume 1, Number 4, December 2020
- Roberto Perdisci, Martina Lindorfer, Adam Doupé, Andrea Lanzi, Alexandros Kapravelos, Gianluca Stringhini:

Introduction to the ACSAC'19 Special Issue - Part 1. 19e:1-19e:3 - Ioannis Agadakos

, Nicholas DeMarinis, Di Jin, Kent Williams-King, Jearson Alfajardo, Benjamin Shteinfeld, David Williams-King, Vasileios P. Kemerlis
, Georgios Portokalidis
:
Large-scale Debloating of Binary Shared Libraries. 19:1-19:28 - Tapti Palit

, Fabian Monrose, Michalis Polychronakis:
Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data. 20:1-20:26 - Ronny Chevalier, David Plaquin, Chris I. Dalton, Guillaume Hiet

:
Intrusion Survivability for Commodity Operating Systems. 21:1-21:30 - Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:

Securing Applications against Side-channel Attacks through Resource Access Veto. 22:1-22:29 - Imtiaz Karim

, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones. 23:1-23:29 - Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos:

Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing. 24:1-24:24 - Martin Ukrop, Lydia Kraus, Vashek Matyas:

Will You Trust This TLS Certificate?: Perceptions of People Working in IT (Extended Version). 25:1-25:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














