default search action
25. ACSAC 2009: Honolulu, Hawaii, USA
- Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3919-5
Discovering Policy
- Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis:
A Network Access Control Mechanism Based on Behavior Profiles. 3-12 - Dana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang:
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control. 13-22 - Ana Ferreira, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes:
How to Securely Break into RBAC: The BTG-RBAC Model. 23-31
Invited Paper
- Peter G. Neumann:
Computer-Related Risk Futures. 35-40
Hardware/Software Security
- Mario Kirschbaum, Thomas Popp:
Evaluation of a DPA-Resistant Prototype Chip. 43-50 - Hua Wang, Yao Guo, Xiangqun Chen:
FPValidator: Validating Type Equivalence of Function Pointers on the Fly. 51-59 - Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Surgically Returning to Randomized lib(c). 60-69
Cloud Security
- Wei Wei, Juan Du, Ting Yu, Xiaohui Gu:
SecureMR: A Service Integrity Assurance Framework for MapReduce. 73-82 - Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel:
Justifying Integrity Using a Virtual Machine Verifier. 83-92
Integrity
- Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. 95-104 - Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
A Study of User-Friendly Hash Comparison Schemes. 105-114
Network Security
- Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E. Webster, Stephen W. Boyer:
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. 117-126 - Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen:
Evaluating Network Security With Two-Layer Attack Graphs. 127-136
Intellectual Property Rights
- Hongxia Jin, Jeffrey B. Lotspiech:
Unifying Broadcast Encryption and Traitor Tracing for Content Protection. 139-148 - Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:
Detecting Software Theft via System Call Based Birthmarks. 149-158
Classic Paper I
- Matt Bishop:
Reflections on UNIX Vulnerabilities. 161-184
Invited Essayist
- Mary Ann Davidson:
The Good, the Bad, And the Ugly: Stepping on the Security Scale. 187-195
Authentication and Audit
- Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao:
A New Approach for Anonymous Password Authentication. 199-208 - Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). 209-218 - Attila Altay Yavuz, Peng Ning:
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. 219-228
Malware, Botnets and Operating System Security (Part 1)
- Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda:
FIRE: FInding Rogue nEtworks. 231-240 - Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee:
Active Botnet Probing to Identify Obscure Command and Control Channels. 241-253 - Hamed Okhravi, David M. Nicol:
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems. 254-265
Denial of Service Defense
- Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher:
RAD: Reflector Attack Defense Using Message Authentication Codes. 269-278 - Mehmud Abliz, Taieb Znati:
A Guided Tour Puzzle for Denial of Service Prevention. 279-288 - Lixin Li, James E. Just, R. Sekar:
Online Signature Generation for Windows Systems. 289-298
Malware, Botnets and Operating System Security (Part 2)
- Shakeel Butt, Vinod Ganapathy, Michael M. Swift, Chih-Cheng Chang:
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers. 301-310 - Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee:
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. 311-320 - Young Hee Park, Douglas S. Reeves:
Identification of Bot Commands by Run-Time Execution Monitoring. 321-330
Mobile Security
- Alf Zugenmaier, Sven Lachmund, Dileesh Jostin:
Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use. 333-339 - Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically Rich Application-Centric Security in Android. 340-349 - Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor:
Leveraging Cellular Infrastructure to Improve Fraud Prevention. 350-359
Multimedia and Web Security
- Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Analyzing and Detecting Malicious Flash Advertisements. 363-372 - Emily Stark, Michael Hamburg, Dan Boneh:
Symmetric Cryptography in Javascript. 373-381 - Mohan Dhawan, Vinod Ganapathy:
Analyzing Information Flow in JavaScript-Based Browser Extensions. 382-391
Classic Paper II
- Li Gong:
Java Security: A Ten Year Retrospective. 395-405
Trust Management
- San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Secure Web 2.0 Content Sharing Beyond Walled Gardens. 409-418 - Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitaman Datta:
Enabling Secure Secret Sharing in Distributed Online Social Networks. 419-428 - Eric Osterweil, Daniel Massey, Lixia Zhang:
Deploying and Monitoring DNS Security (DNSSEC). 429-438
Virtualization Security
- Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha Godiyal, Samuel T. King, Hai D. Nguyen:
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. 441-450 - Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu:
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System. 451-460 - Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang:
HIMA: A Hypervisor-Based Integrity Measurement Agent. 461-470
Intrusion Detection, Recovery and Analysis
- Baris Coskun, Nasir D. Memon:
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. 473-483 - Xi Xiong, Xiaoqi Jia, Peng Liu:
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. 484-493 - Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan:
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis. 494-503
Privacy and Software Assurance
- Nathanael Paul, Andrew S. Tanenbaum:
The Design of a Trustworthy Voting System. 507-517 - Karsten Nohl, David Evans:
Privacy through Noise: A Design Space for Private Identification. 518-527 - Jeremy Epstein:
A Survey of Vendor Software Assurance Practices. 528-537
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.