default search action
19th CCS 2012: Raleigh, NC, USA
- Ting Yu, George Danezis, Virgil D. Gligor:
the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. ACM 2012, ISBN 978-1-4503-1651-4
Keynote address
- Virgil D. Gligor:
On the foundations of trust in networks of humans and computers. 1
Systems security
- Raoul Strackx, Frank Piessens:
Fides: selectively hardening software application components against kernel-level or process-level malware. 2-13 - Yu-Yuan Chen, Pramod A. Jamkhedkar, Ruby B. Lee:
A software-hardware architecture for self-protecting data. 14-27 - Hyungon Moon, Hojoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
Vigilare: toward snoop-based kernel integrity monitor. 28-37
Transport layer security
- Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov:
The most dangerous code in the world: validating SSL certificates in non-browser software. 38-49 - Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Lars Baumgärtner, Bernd Freisleben:
Why eve and mallory love android: an analysis of android SSL (in)security. 50-61 - Nikos Mavrogiannopoulos, Frederik Vercauteren, Vesselin Velichkov, Bart Preneel:
A cross-protocol attack on the TLS protocol. 62-72
Anonymity & censorship
- Mashael AlSabah, Kevin S. Bauer, Ian Goldberg:
Enhancing Tor's performance using real-time traffic classification. 73-84 - Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper:
Routing around decoys. 85-96 - Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg:
SkypeMorph: protocol obfuscation for Tor bridges. 97-108 - Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh:
StegoTorus: a camouflage proxy for the Tor anonymity system. 109-120 - Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov:
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. 121-132
Software security
- Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis:
Adaptive defenses for commodity software through virtual application partitioning. 133-144 - Divya Muthukumaran, Trent Jaeger, Vinod Ganapathy:
Leveraging "choice" to automate authorization hook placement. 145-156 - Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. 157-168 - Joan Calvet, José M. Fernandez, Jean-Yves Marion:
Aligot: cryptographic function identification in obfuscated binary programs. 169-182 - Nigel Edwards, Liqun Chen:
An historical examination of open source releases and their vulnerabilities. 183-194
Mobile security
- Chunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang:
Mobile data charging: new attacks and countermeasures. 195-204 - Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
New privacy issues in mobile telephony: fix and verification. 205-216 - Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, David Lie:
PScout: analyzing the Android permission specification. 217-228 - Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
CHEX: statically vetting Android apps for component hijacking vulnerabilities. 229-240 - Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Using probabilistic generative models for ranking risks of Android apps. 241-252
Cloud security
- Shakeel Butt, H. Andrés Lagar-Cavilla, Abhinav Srivastava, Vinod Ganapathy:
Self-service cloud computing. 253-264 - Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos:
Hourglass schemes: how to prove that cloud files are encrypted. 265-280 - Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, Michael M. Swift:
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense). 281-292 - Peter Williams, Radu Sion:
Single round access privacy on outsourced storage. 293-304 - Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. 305-316
Intrusions & abuse
- Muhammad Asim Jamshed, Jihyung Lee, Sangwoo Moon, Insu Yun, Deokjin Kim, Sungryoul Lee, Yung Yi, KyoungSoo Park:
Kargus: a highly-scalable software-based intrusion detection system. 317-328 - Chi-Yao Hong, Fang Yu, Yinglian Xie:
Populated IP addresses: classification and applications. 329-340 - Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Blacksheep: detecting compromised hosts in homogeneous crowds. 341-352 - Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao:
Innocent by association: early recognition of legitimate users. 353-364
Usability, authentication & trust
- Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper:
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs. 365-377 - San-Tsai Sun, Konstantin Beznosov:
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. 378-390 - Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason I. Hong, Adrian Perrig, Debin Gao:
OTO: online trust oracle for user-centric trust establishment. 391-403 - Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, Dirk Balfanz:
Strengthening user authentication through opportunistic cryptographic identity assertions. 404-414
Infrastructure security & privacy
- Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick D. McDaniel:
Minimizing private data disclosures in the smart grid. 415-427 - Wei-Hong Chuang, Ravi Garg, Min Wu:
How secure are power network signature based time stamps? 428-438 - Stephen E. McLaughlin, Patrick D. McDaniel:
SABOT: specification-based payload generation for programmable logic controllers. 439-449 - Tyler Nighswander, Brent M. Ledvina, Jonathan Diamond, Robert Brumley, David Brumley:
GPS software attacks. 450-461 - Ishtiaq Rouf, Hossen Asiful Mustafa, Miao Xu, Wenyuan Xu, Robert D. Miller, Marco Gruteser:
Neighborhood watch: security and privacy analysis of automatic meter reading systems. 462-473
Applied cryptography I
- Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. 474-487 - José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin:
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. 488-500 - Dario Fiore, Rosario Gennaro:
Publicly verifiable delegation of large polynomials and matrix computations, with applications. 501-512 - S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis:
Secure two-party computation in sublinear (amortized) time. 513-524 - Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical yet universally composable two-server password-authenticated secret sharing. 525-536
Network Security
- Alexandra Boldyreva, Robert Lychev:
Provable security of S-BGP and other path vector protocols: model, analysis and extensions. 541-552 - Guanhua Yan, Ritchie Lee, Alex Kent, David H. Wolpert:
Towards a bayesian network game framework for evaluating DDoS attacks and defense. 553-566 - Haifeng Yu, Phillip B. Gibbons, Chenwei Shi:
DCast: sustaining collaboration in overlay multicast despite rational collusion. 567-580 - Zhaoyan Xu, Lingfeng Chen, Guofei Gu, Christopher Kruegel:
PeerPress: utilizing enemies' P2P strength against them. 581-592 - Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie:
Collaborative TCP sequence number inference attack: how to crack sequence number under a second. 593-604
Privacy
- Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, Rob Johnson:
Touching from a distance: website fingerprinting attacks and defenses. 605-616 - Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Protecting location privacy: optimal strategy against localization attacks. 617-627 - Mudhakar Srivatsa, Michael Hicks:
Deanonymizing mobility traces: using social network as a side-channel. 628-637 - Rui Chen, Gergely Ács, Claude Castelluccia:
Differentially private sequential data publication via variable-length n-grams. 638-649 - Ilya Mironov:
On significance of the least significant bits for differential privacy. 650-661
Advertising security & privacy
- Michaela Hardt, Suman Nath:
Privacy-aware personalization for mobile advertising. 662-673 - Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Knowing your enemy: understanding and detecting malicious web advertising. 674-686 - Istemi Ekin Akkus, Ruichuan Chen, Michaela Hardt, Paul Francis, Johannes Gehrke:
Non-tracking web analytics. 687-698
Verification
- Michael Backes, Ankit Malik, Dominique Unruh:
Computational soundness without protocol restrictions. 699-711 - Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Computational verification of C protocol implementations by symbolic execution. 712-723 - Gilles Barthe, David Pointcheval, Santiago Zanella Béguelin:
Verified security of redundancy-free encryption from Rabin and RSA. 724-735
Web security
- Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. 736-747 - Willem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens:
FlowFox: a web browser with flexible and precise information flow control. 748-759 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk:
Scriptless attacks: stealing the pie without touching the sill. 760-771
Secure computation
- Andreas Holzer, Martin Franz, Stefan Katzenbeisser, Helmut Veith:
Secure two-party computations in ANSI C. 772-783 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:
Foundations of garbled circuits. 784-796 - Seny Kamara, Payman Mohassel, Ben Riva:
Salus: a system for server-aided secure function evaluation. 797-808
Badware
- Markus Kammerstetter, Christian Platzer, Gilbert Wondracek:
Vanity, cracks and malware: insights into the anti-copy protection ecosystem. 809-820 - Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. 821-832 - Leyla Bilge, Tudor Dumitras:
Before we knew it: an empirical study of zero-day attacks in the real world. 833-844 - Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage:
Priceless: the role of payments in abuse-advertised goods. 845-856
Theory
- Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the parameterized complexity of the workflow satisfiability problem. 857-868 - Kai Engelhardt, Ron van der Meyden, Chenyi Zhang:
Intransitive noninterference in nondeterministic systems. 869-880 - Scott Moore, Aslan Askarov, Stephen Chong:
Precise enforcement of progress-sensitive security. 881-893 - Mads Dam, Gurvan Le Guernic, Andreas Lundblad:
TreeDroid: a tree automaton based approach to enforcing data processing policies. 894-905
Payments, votes & reputation
- Ghassan Karame, Elli Androulaki, Srdjan Capkun:
Double-spending fast payments in bitcoin. 906-917 - Véronique Cortier, Graham Steel, Cyrille Wiedling:
Revoke and let live: a secure key revocation api for cryptographic devices. 918-928 - Man Ho Au, Apu Kapadia:
PERM: practical reputation-based blacklisting without TTPS. 929-940 - David Bernhard, Véronique Cortier, Olivier Pereira, Bogdan Warinschi:
Measuring vote privacy, revisited. 941-952
Applied cryptography II
- Dominique Schröder, Heike Schröder:
Verifiable data streaming. 953-964 - Seny Kamara, Charalampos Papamanthou, Tom Roeder:
Dynamic searchable symmetric encryption. 965-976 - Peter Williams, Radu Sion, Alin Tomescu:
PrivateFS: a parallel oblivious file system. 977-988
Posters & demos
- Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith:
Towards measuring warning readability. 989-991 - Lung-Hao Lee, Yen-Cheng Juan, Kuei-Ching Lee, Wei-Lin Tseng, Hsin-Hsi Chen, Yuen-Hsien Tseng:
Context-aware web security threat prevention. 992-994 - Érik Archambault, Craig A. Shue:
Understanding new anonymity networks from a user's perspective. 995-997 - Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
Demonstrating the effectiveness of MOSES for separation of execution modes. 998-1000 - Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. 1001-1003 - Eitan Menahem, Gabi Nakibly, Yuval Elovici:
Network-based intrusion detection systems go active! 1004-1006 - Kenrick J. Mock, Bogdan Hoanca, Justin Weaver, Mikal Milton:
Real-time continuous iris recognition for authentication using an eye tracker. 1007-1009 - Giuseppe Petracca, Anna Cinzia Squicciarini, William G. Horne, Marco Casassa Mont:
ReasONets: a fuzzy-based approach for reasoning on network incidents. 1010-1012 - Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu:
How privacy leaks from bluetooth mouse? 1013-1015 - Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: making it harder to fish for gadgets. 1016-1018 - Xiang Cui, Binxing Fang, Peng Liao, Chaoge Liu:
Advanced triple-channel botnets: model and implementation. 1019-1021 - Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Gopavaram, Elisa Bertino:
Demonstrating a lightweight data provenance for sensor networks. 1022-1024 - Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. 1025-1027 - Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li:
Authenticated secret key extraction using channel characteristics for body area networks. 1028-1030 - Shumin Guo, Keke Chen:
Privacy preserving boosting in the cloud with secure half-space queries. 1031-1033 - Chao Yang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Detecting money-stealing apps in alternative Android markets. 1034-1036 - Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
Automatic generation of vaccines for malware immunization. 1037-1039 - Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
A covert channel construction in a virtualized environment. 1040-1042 - Bo Chen, Reza Curtmola:
Robust dynamic remote data checking for public clouds. 1043-1045 - Supriyo Chakraborty, Kasturi Rangan Raghavan, Mani B. Srivastava, Harris Teague:
Model-based context privacy for personal data streams. 1046-1048 - Dongxi Liu, Shenlu Wang:
Query encrypted databases practically. 1049-1051
Tutorials
- Ruby B. Lee, Simha Sethumadhavan, G. Edward Suh:
Hardware enhanced security. 1052 - Stuart S. Shapiro:
The state and evolution of privacy by design. 1053 - David Dagon:
Large-scale DNS data analysis. 1054-1055
Workshops
- Alvaro A. Cárdenas, Blaine Nelson, Benjamin I. P. Rubinstein:
Fifth ACM workshop on artificial intelligence and security (AISec 2012). 1056-1057 - Xinwen Zhang, Xuhua Ding:
STC 2012: the seventh ACM workshop on scalable trusted computing. 1058-1059 - Srdjan Capkun, Seny Kamara:
4th cloud computing security workshop (CCSW 2012). 1060-1061 - William Enck, Xuxian Jiang:
CCS'12 co-located workshop summary for SPSM 2012. 1062-1063 - Nikita Borisov:
11th workshop on privacy in the electronic society. 1064-1065 - Mihai Christodorescu:
Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12). 1066-1067
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.