Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2014
Protecting users against XSS-based password manager abuse
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 183–194https://doi.org/10.1145/2590296.2590336To ease the burden of repeated password authentication on multiple sites, modern Web browsers provide password managers, which offer to automatically complete password fields on Web pages, after the password has been stored once. Unfortunately, these ...
- research-articleJune 2014
VirtualSwindle: an automated attack against in-app billing on android
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 459–470https://doi.org/10.1145/2590296.2590335Since its introduction, Android's in-app billing service has quickly gained popularity. The in-app billing service allows users to pay for options, services, subscriptions, and virtual goods from within mobile apps themselves. In-app billing is ...
- research-articleJune 2014
Malware detection with quantitative data flow graphs
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 271–282https://doi.org/10.1145/2590296.2590319We propose a novel behavioral malware detection approach based on a generic system-wide quantitative data flow model. We base our data flow analysis on the incremental construction of aggregated quantitative data flow graphs. These graphs represent ...
- research-articleJune 2014
Remotely wiping sensitive data on stolen smartphones
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 537–542https://doi.org/10.1145/2590296.2590318Smartphones are playing an increasingly important role in personal life and carrying massive private data. Unfortunately, once the smartphones are stolen, all the sensitive information, such as contacts, messages, photos, credit card information and ...
- short-paperJune 2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 525–530https://doi.org/10.1145/2590296.2590311With the constant migration of applications from the desktop to the web, power users have found ways of enhancing web applications, at the client-side, according to their needs.
In this paper, we investigate this phenomenon by focusing on the popular ...
- short-paperJune 2014
Cyber defenses for physical attacks and insider threats in cloud computing
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 519–524https://doi.org/10.1145/2590296.2590310In cloud computing, most of the computations and data in the data center do not belong to the cloud provider. This leaves owners of applications and data concerned about cyber and physical attacks which may compromise the confidentiality, integrity or ...
- research-articleJune 2014
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 353–364https://doi.org/10.1145/2590296.2590302A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a botnet to send it. Each of these three elements are critical for the success of the spam operation: a good email list should be composed ...