BibTeX records: Collin Mulliner

download as .bib file

@inproceedings{DBLP:conf/dbsec/NeunerVFMW18,
  author    = {Sebastian Neuner and
               Artemios G. Voyiatzis and
               Spiros Fotopoulos and
               Collin Mulliner and
               Edgar R. Weippl},
  title     = {USBlock: Blocking USB-Based Keypress Injection Attacks},
  booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
               Proceedings},
  pages     = {278--295},
  year      = {2018},
  crossref  = {DBLP:conf/dbsec/2018},
  url       = {https://doi.org/10.1007/978-3-319-95729-6\_18},
  doi       = {10.1007/978-3-319-95729-6\_18},
  timestamp = {Wed, 11 Jul 2018 13:48:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/NeunerVFMW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/MullinerRK17,
  author    = {Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {On the misuse of graphical user interface elements to implement security
               controls},
  journal   = {it - Information Technology},
  volume    = {59},
  number    = {2},
  pages     = {59},
  year      = {2017},
  url       = {https://doi.org/10.1515/itit-2016-0036},
  doi       = {10.1515/itit-2016-0036},
  timestamp = {Tue, 09 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/it/MullinerRK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/woot/2017,
  editor    = {William Enck and
               Collin Mulliner},
  title     = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
               BC, Canada, August 14-15, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/woot17},
  timestamp = {Fri, 01 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woot/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CarterMLRK16,
  author    = {Patrick Carter and
               Collin Mulliner and
               Martina Lindorfer and
               William K. Robertson and
               Engin Kirda},
  title     = {CuriousDroid: Automated User Interface Interaction for Android Application
               Analysis Sandboxes},
  booktitle = {Financial Cryptography and Data Security - 20th International Conference,
               {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
               Selected Papers},
  pages     = {231--249},
  year      = {2016},
  crossref  = {DBLP:conf/fc/2016},
  url       = {https://doi.org/10.1007/978-3-662-54970-4\_13},
  doi       = {10.1007/978-3-662-54970-4\_13},
  timestamp = {Wed, 17 May 2017 11:08:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/CarterMLRK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16,
  author    = {Andrea Mambretti and
               Kaan Onarlioglu and
               Collin Mulliner and
               William Robertson and
               Engin Kirda and
               Federico Maggi and
               Stefano Zanero},
  title     = {Trellis: Privilege Separation for Multi-user Applications Made Easy},
  booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International
               Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  pages     = {437--456},
  year      = {2016},
  crossref  = {DBLP:conf/raid/2016},
  url       = {https://doi.org/10.1007/978-3-319-45719-2\_20},
  doi       = {10.1007/978-3-319-45719-2\_20},
  timestamp = {Tue, 23 May 2017 01:12:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/MambrettiOMRKMZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Neugschwandtner16,
  author    = {Matthias Neugschwandtner and
               Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded
               Devices},
  booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
               2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  pages     = {60--81},
  year      = {2016},
  crossref  = {DBLP:conf/trust/2016},
  url       = {https://doi.org/10.1007/978-3-319-45572-3\_4},
  doi       = {10.1007/978-3-319-45572-3\_4},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/Neugschwandtner16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KharrazAMRK16,
  author    = {Amin Kharraz and
               Sajjad Arshad and
               Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {{UNVEIL:} {A} Large-Scale, Automated Approach to Detecting Ransomware},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {757--772},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/kharaz},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/KharrazAMRK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OzcanGOWMRK15,
  author    = {Ahmet Talha Ozcan and
               Can Gemicioglu and
               Kaan Onarlioglu and
               Michael Weissbacher and
               Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications},
  booktitle = {Financial Cryptography and Data Security - 19th International Conference,
               {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
               Papers},
  pages     = {355--369},
  year      = {2015},
  crossref  = {DBLP:conf/fc/2015},
  url       = {https://doi.org/10.1007/978-3-662-47854-7\_21},
  doi       = {10.1007/978-3-662-47854-7\_21},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/OzcanGOWMRK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MullinerRK14,
  author    = {Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {VirtualSwindle: an automated attack against in-app billing on android},
  booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages     = {459--470},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014asia},
  url       = {https://doi.org/10.1145/2590296.2590335},
  doi       = {10.1145/2590296.2590335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MullinerRK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MullinerRK14,
  author    = {Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {Hidden GEMs: Automated Discovery of Access Control Vulnerabilities
               in Graphical User Interfaces},
  booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
               CA, USA, May 18-21, 2014},
  pages     = {149--162},
  year      = {2014},
  crossref  = {DBLP:conf/sp/2014},
  url       = {https://doi.org/10.1109/SP.2014.17},
  doi       = {10.1109/SP.2014.17},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/MullinerRK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerORK13,
  author    = {Collin Mulliner and
               Jon Oberheide and
               William K. Robertson and
               Engin Kirda},
  title     = {PatchDroid: scalable third-party security patches for Android devices},
  booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New
               Orleans, LA, USA, December 9-13, 2013},
  pages     = {259--268},
  year      = {2013},
  crossref  = {DBLP:conf/acsac/2013},
  url       = {https://doi.org/10.1145/2523649.2523679},
  doi       = {10.1145/2523649.2523679},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/MullinerORK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MullinerBSS13,
  author    = {Collin Mulliner and
               Ravishankar Borgaonkar and
               Patrick Stewin and
               Jean{-}Pierre Seifert},
  title     = {SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper)},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
               18-19, 2013. Proceedings},
  pages     = {150--159},
  year      = {2013},
  crossref  = {DBLP:conf/dimva/2013},
  url       = {https://doi.org/10.1007/978-3-642-39235-1\_9},
  doi       = {10.1007/978-3-642-39235-1\_9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/MullinerBSS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OnarliogluMRK13,
  author    = {Kaan Onarlioglu and
               Collin Mulliner and
               William K. Robertson and
               Engin Kirda},
  title     = {PrivExec: Private Execution as an Operating System Service},
  booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
               CA, USA, May 19-22, 2013},
  pages     = {206--220},
  year      = {2013},
  crossref  = {DBLP:conf/sp/2013},
  url       = {https://doi.org/10.1109/SP.2013.24},
  doi       = {10.1109/SP.2013.24},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/OnarliogluMRK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Mulliner12,
  author    = {Collin Mulliner},
  title     = {On the Impact of the Cellular Modem on the Security of Mobile Phones},
  school    = {Berlin Institute of Technology},
  year      = {2012},
  url       = {http://opus.kobv.de/tuberlin/volltexte/2012/3432/},
  urn       = {urn:nbn:de:kobv:83-opus-34320},
  timestamp = {Thu, 14 Apr 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/dnb/Mulliner12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mulliner12,
  author    = {Collin Mulliner},
  title     = {Pers{\"{o}}nliche Datenspuren bei der mobilen Internetnutzung},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {36},
  number    = {3},
  pages     = {180--184},
  year      = {2012},
  url       = {https://doi.org/10.1007/s11623-012-0061-2},
  doi       = {10.1007/s11623-012-0061-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dud/Mulliner12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MullinerLLS12,
  author    = {Collin Mulliner and
               Steffen Liebergeld and
               Matthias Lange and
               Jean{-}Pierre Seifert},
  title     = {Taming Mr Hayes: Mitigating signaling based attacks on smartphones},
  booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
               {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages     = {1--12},
  year      = {2012},
  crossref  = {DBLP:conf/dsn/2012},
  url       = {https://doi.org/10.1109/DSN.2012.6263943},
  doi       = {10.1109/DSN.2012.6263943},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/MullinerLLS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/MullinerM12,
  author    = {Collin Mulliner and
               Benjamin Mich{\'{e}}le},
  title     = {Read It Twice! {A} Mass-Storage-Based {TOCTTOU} Attack},
  booktitle = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7,
               2012, Bellevue, WA, USA, Proceedings},
  pages     = {105--112},
  year      = {2012},
  crossref  = {DBLP:conf/woot/2012},
  url       = {http://www.usenix.org/conference/woot12/read-it-twice-mass-storage-based-tocttou-attack},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woot/MullinerM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tinytocs/Mulliner12,
  author    = {Collin Mulliner},
  title     = {Fake Emulation Environment to Prevent Malware from Executing},
  journal   = {TinyToCS},
  volume    = {1},
  year      = {2012},
  url       = {http://tinytocs.org/vol1/papers/tinytocs-v1-mulliner.pdf},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tinytocs/Mulliner12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StewinSM11,
  author    = {Patrick Stewin and
               Jean{-}Pierre Seifert and
               Collin Mulliner},
  title     = {Poster: Towards detecting {DMA} malware},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {857--860},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://dl.acm.org/citation.cfm?id=2093511},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/StewinSM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MullinerGS11,
  author    = {Collin Mulliner and
               Nico Golde and
               Jean{-}Pierre Seifert},
  title     = {{SMS} of Death: From Analyzing to Attacking Mobile Phones on a Large
               Scale},
  booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011},
  url       = {http://static.usenix.org/events/sec11/tech/full\_papers/Mulliner.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/MullinerGS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MullinerS10,
  author    = {Collin Mulliner and
               Jean{-}Pierre Seifert},
  title     = {Rise of the iBots: Owning a telco network},
  booktitle = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
               2010, Nancy, France, October 19-20, 2010},
  pages     = {71--80},
  year      = {2010},
  crossref  = {DBLP:conf/malware/2010},
  url       = {https://doi.org/10.1109/MALWARE.2010.5665790},
  doi       = {10.1109/MALWARE.2010.5665790},
  timestamp = {Wed, 13 Feb 2019 11:42:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/malware/MullinerS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Mulliner09,
  author    = {Collin Mulliner},
  title     = {Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones},
  booktitle = {Proceedings of the The Forth International Conference on Availability,
               Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
               Japan},
  pages     = {695--700},
  year      = {2009},
  crossref  = {DBLP:conf/IEEEares/2009},
  url       = {https://doi.org/10.1109/ARES.2009.46},
  doi       = {10.1109/ARES.2009.46},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/Mulliner09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MullinerV06,
  author    = {Collin Mulliner and
               Giovanni Vigna},
  title     = {Vulnerability Analysis of {MMS} User Agents},
  booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
               11-15 December 2006, Miami Beach, Florida, {USA}},
  pages     = {77--88},
  year      = {2006},
  crossref  = {DBLP:conf/acsac/2006},
  url       = {https://doi.org/10.1109/ACSAC.2006.55},
  doi       = {10.1109/ACSAC.2006.55},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/MullinerV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MullinerVDL06,
  author    = {Collin Mulliner and
               Giovanni Vigna and
               David Dagon and
               Wenke Lee},
  title     = {Using Labeling to Prevent Cross-Service Attacks Against Smart Phones},
  booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
               Third International Conference, {DIMVA} 2006, Berlin, Germany, July
               13-14, 2006, Proceedings},
  pages     = {91--108},
  year      = {2006},
  crossref  = {DBLP:conf/dimva/2006},
  url       = {https://doi.org/10.1007/11790754\_6},
  doi       = {10.1007/11790754\_6},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/MullinerVDL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2018,
  editor    = {Florian Kerschbaum and
               Stefano Paraboschi},
  title     = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10980},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-95729-6},
  doi       = {10.1007/978-3-319-95729-6},
  isbn      = {978-3-319-95728-9},
  timestamp = {Wed, 11 Jul 2018 13:48:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016,
  editor    = {Jens Grossklags and
               Bart Preneel},
  title     = {Financial Cryptography and Data Security - 20th International Conference,
               {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9603},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54970-4},
  doi       = {10.1007/978-3-662-54970-4},
  isbn      = {978-3-662-54969-8},
  timestamp = {Wed, 17 May 2017 11:08:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2016,
  editor    = {Fabian Monrose and
               Marc Dacier and
               Gregory Blanc and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title     = {Research in Attacks, Intrusions, and Defenses - 19th International
               Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9854},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45719-2},
  doi       = {10.1007/978-3-319-45719-2},
  isbn      = {978-3-319-45718-5},
  timestamp = {Tue, 23 May 2017 01:12:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2016,
  editor    = {Michael Franz and
               Panos Papadimitratos},
  title     = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
               2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9824},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45572-3},
  doi       = {10.1007/978-3-319-45572-3},
  isbn      = {978-3-319-45571-6},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015,
  editor    = {Rainer B{\"{o}}hme and
               Tatsuaki Okamoto},
  title     = {Financial Cryptography and Data Security - 19th International Conference,
               {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8975},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47854-7},
  doi       = {10.1007/978-3-662-47854-7},
  isbn      = {978-3-662-47853-0},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014asia,
  editor    = {Shiho Moriai and
               Trent Jaeger and
               Kouichi Sakurai},
  title     = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2590296},
  isbn      = {978-1-4503-2800-5},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2014,
  title     = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
               CA, USA, May 18-21, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6954656},
  isbn      = {978-1-4799-4686-0},
  timestamp = {Tue, 02 Dec 2014 18:47:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2013,
  editor    = {Charles N. Payne Jr.},
  title     = {Annual Computer Security Applications Conference, {ACSAC} '13, New
               Orleans, LA, USA, December 9-13, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2523649},
  isbn      = {978-1-4503-2015-3},
  timestamp = {Wed, 08 Jan 2014 20:55:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2013,
  editor    = {Konrad Rieck and
               Patrick Stewin and
               Jean{-}Pierre Seifert},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
               18-19, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7967},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39235-1},
  doi       = {10.1007/978-3-642-39235-1},
  isbn      = {978-3-642-39234-4},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2013,
  title     = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
               CA, USA, May 19-22, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6547086},
  isbn      = {978-1-4673-6166-8},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2012,
  editor    = {Robert S. Swarz and
               Philip Koopman and
               Michel Cukier},
  title     = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
               {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6253623},
  isbn      = {978-1-4673-1624-8},
  timestamp = {Thu, 31 Mar 2016 11:12:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/woot/2012,
  editor    = {Elie Bursztein and
               Thomas Dullien},
  title     = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7,
               2012, Bellevue, WA, USA, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2012},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woot/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011,
  title     = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2011},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/malware/2010,
  title     = {5th International Conference on Malicious and Unwanted Software, {MALWARE}
               2010, Nancy, France, October 19-20, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5655114},
  isbn      = {978-1-4244-9355-5},
  timestamp = {Wed, 13 Feb 2019 11:42:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/malware/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2009,
  title     = {Proceedings of the The Forth International Conference on Availability,
               Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
               Japan},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5066393},
  isbn      = {978-1-4244-3572-2},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2006,
  title     = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
               11-15 December 2006, Miami Beach, Florida, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4041138},
  isbn      = {0-7695-2716-7},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2006,
  editor    = {Roland B{\"{u}}schkes and
               Pavel Laskov},
  title     = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
               Third International Conference, {DIMVA} 2006, Berlin, Germany, July
               13-14, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4064},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11790754},
  doi       = {10.1007/11790754},
  isbn      = {3-540-36014-X},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier