default search action
16th CCS 2009: Chicago, Illinois, USA
- Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis:
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM 2009, ISBN 978-1-60558-894-0
Attacks I
- Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz:
Attacking cryptographic schemes based on "perturbation polynomials". 1-10 - Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. 11-20 - Yao Liu, Michael K. Reiter, Peng Ning:
False data injection attacks against state estimation in electric power grids. 21-32
RFID
- Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. 33-42 - Côme Berbain, Olivier Billet, Jonathan Etrog, Henri Gilbert:
An efficient forward private RFID protocol. 43-53 - Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li:
RFID privacy: relation between two notions, minimal condition, and efficient construction. 54-65
Formal techniques
- Michael Backes, Dennis Hofheinz, Dominique Unruh:
CoSP: a general framework for computational soundness proofs. 66-78 - Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich, Steve Zdancewic:
Reactive noninterference. 79-90 - Ralf Küsters, Max Tuengerthal:
Computational soundness for key exchange protocols with symmetric encryption. 91-100 - Mario Frank, Andreas P. Streich, David A. Basin, Joachim M. Buhmann:
A probabilistic approach to hybrid role mining. 101-111
Applied cryptography
- Allison B. Lewko, Brent Waters:
Efficient pseudorandom functions from the decisional linear assumption and weaker variants. 112-120 - Melissa Chase, Sherman S. M. Chow:
Improving privacy and security in multi-authority attribute-based encryption. 121-130 - Jan Camenisch, Maria Dubovitskaya, Gregory Neven:
Oblivious transfer with access control. 131-140
Anonymization networks
- Andriy Panchenko, Stefan Richter, Arne Rache:
NISAN: network information service for anonymization networks. 141-150 - Dario Catalano, Dario Fiore, Rosario Gennaro:
Certificateless onion routing. 151-160 - Prateek Mittal, Nikita Borisov:
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. 161-172
Cloud security
- K. Vikram, Abhishek Prateek, V. Benjamin Livshits:
Ripley: automatically securing web 2.0 applications through replicated execution. 173-186 - Kevin D. Bowers, Ari Juels, Alina Oprea:
HAIL: a high-availability and integrity layer for cloud storage. 187-198 - Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. 199-212 - C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic provable data possession. 213-222
Security of mobile services
- Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
On cellular botnets: measuring the impact of malicious devices on a cellular network core. 223-234 - William Enck, Machigar Ongtang, Patrick D. McDaniel:
On lightweight mobile phone application certification. 235-245 - Justin Manweiler, Ryan Scudellari, Landon P. Cox:
SMILE: encounter-based trust for mobile social services. 246-255
Software security using behavior
- Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Haining Wang:
Battle of Botcraft: fighting bots in online games with human observational proofs. 256-268 - Edward C. Kaiser, Wu-chang Feng, Travis Schluessler:
Fides: remote anomaly-based cheat detection using client emulation. 269-279 - Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Behavior based software theft detection. 280-290
Systems and networks
- Steffen Reidt, Mudhakar Srivatsa, Shane Balfe:
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. 291-302 - Masana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto:
Effective implementation of the cell broadband engineTM isolation loader. 303-313 - Muhammad Qasim Ali, Hassan Khan, Ali Sajjad, Syed Ali Khayam:
On achieving good operating points on an ROC plane using stochastic anomaly score prediction. 314-323
Privacy
- Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes:
On non-cooperative location privacy: a game-theoretic analysis. 324-337 - Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Michael K. Reiter, Zheng Dong:
Privacy-preserving genomic computation through program specialization. 338-347 - Toby Xu, Ying Cai:
Feeling-based location privacy protection for location-based services. 348-357 - Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen:
Multi-party off-the-record messaging. 358-368
Anonymization techniques
- Carmela Troncoso, George Danezis:
The bayesian traffic analysis of mix networks. 369-379 - Matthew Edman, Paul F. Syverson:
As-awareness in Tor path selection. 380-389 - Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim:
Membership-concealing overlay networks. 390-399
Embedded and mobile devices
- Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente:
On the difficulty of software-based attestation of embedded devices. 400-409 - Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Proximity-based access control for implantable medical devices. 410-419 - Hristo Bojinov, Elie Bursztein, Dan Boneh:
XCS: cross channel scripting and its impact on web applications. 420-431
Technique for ensuring software security
- Cédric Fournet, Gurvan Le Guernic, Tamara Rezk:
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. 432-441 - Siliang Li, Gang Tan:
Finding bugs in exceptional situations of JNI programs. 442-452 - Andrew Meneely, Laurie A. Williams:
Secure open source collaboration: an empirical study of linus' law. 453-462
Designing secure systems
- Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, David A. Wagner:
On voting machine design for verification and testability. 463-476 - Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi:
Secure in-VM monitoring using hardware virtualization. 477-487 - Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt:
A metadata calculus for secure information sharing. 488-499 - Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle:
Multiple password interference in text passwords and click-based graphical passwords. 500-511
Attacks II
- Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, Matt Blaze:
Can they hear me now?: a security analysis of law enforcement wiretaps. 512-523 - Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus:
English shellcode. 524-533 - Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang, Xiao-yong Zhou:
Learning your identity and disease from research papers: information leaks in genome wide association study. 534-544
System security
- Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. 545-554 - Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang:
Mapping kernel objects to enable systematic integrity checking. 555-565 - Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin:
Robust signatures for kernel data structures. 566-577
Anonymization
- Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A new cell counter based attack against tor. 578-589 - Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim:
Scalable onion routing with torsk. 590-599 - Patrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup:
Anonymous credentials on a standard java card. 600-610
Malware and bots
- Xin Hu, Tzi-cker Chiueh, Kang G. Shin:
Large-scale malware indexing using function-call graphs. 611-620 - Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song:
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. 621-634 - Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. 635-647
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.