


default search action
ACSAC 2017: Orlando, FL, USA
- Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017. ACM 2017, ISBN 978-1-4503-5345-8

Mobile Authentication
- Roel Peeters

, Jens Hermans, Pieter Maene
, Katri Grenman
, Kimmo Halunen, Juha Häikiö
:
n-Auth: Mobile Authentication Done Right. 1-15 - Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. 16-27 - Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:

A Secure Mobile Authentication Alternative to Biometrics. 28-41
Memory Corruption
- Hua Yan, Yulei Sui

, Shiping Chen
, Jingling Xue
:
Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. 42-54 - Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz

:
Breaking and Fixing Destructive Code Read Defenses. 55-67 - Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi

:
QUASAR: Quantitative Attack Space Analysis and Reasoning. 68-78
Big Data Analytics
- Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang

, Zhaoquan Gu:
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. 79-90 - Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang

:
Marmite: Spreading Malicious File Reputation Through Download Graphs. 91-102 - Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed

, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. 103-115
Software Protection
- Anh Quach

, Matthew Cole
, Aravind Prakash:
Supplementing Modern Software Defenses with Stack-Pointer Sanity. 116-127 - Mingwei Zhang, Michalis Polychronakis, R. Sekar:

Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. 128-140 - Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna:

Piston: Uncooperative Remote Runtime Patching. 141-153
Applied Crypto
- Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec

, Michel Cozic:
Proxy Re-Encryption Based on Homomorphic Encryption. 154-161 - Matús Nemec

, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas:
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. 162-175 - Chris McMahon Stone, Tom Chothia, Flavio D. Garcia

:
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. 176-188
Enterprise Security
- Shang-Tse Chen, Yufei Han, Duen Horng Chau

, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. 189-199 - Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico

, Robert Scott:
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. 200-211 - Jake Weidman, Jens Grossklags:

I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. 212-224
Internet of Things (IoT)
- Jo Van Bulck

, Jan Tobias Mühlberg
, Frank Piessens:
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. 225-237 - Jun Young Kim

, Ralph Holz, Wen Hu
, Sanjay Jha
:
Automated Analysis of Secure Internet of Things Protocols. 238-249 - Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic:

HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. 250-261
Adversarial Machine Learning
- Uyeong Jang, Xi Wu, Somesh Jha:

Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. 262-277 - Xiaoyu Cao, Neil Zhenqiang Gong:

Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. 278-287 - Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter:

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. 288-302
Cyber-Physical Systems
- Adrian Dabrowski

, Johanna Ullrich
, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. 303-314 - Long Cheng, Ke Tian, Danfeng (Daphne) Yao

:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. 315-326 - Richard James Thomas

, Mihai Ordean
, Tom Chothia, Joeri de Ruiter
:
TRAKS: A Universal Key Management Scheme for ERTMS. 327-338
Android Malware
- Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo

, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. 339-349 - Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang:

Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. 350-361 - Lingwei Chen, Shifu Hou, Yanfang Ye:

SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. 362-372
Intrusions
- Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. 373-386 - Timothy Barron, Nick Nikiforakis:

Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. 387-398 - Ronny Chevalier

, Maugan Villatel, David Plaquin, Guillaume Hiet:
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. 399-411
Embedded Systems
- Taegyu Kim, Chung Hwan Kim

, Hongjun Choi
, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang
, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. 412-424 - Binbin Chen

, Xinshu Dong, Guangdong Bai
, Sumeet Jauhar, Yueqiang Cheng:
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. 425-436 - Ali Abbasi

, Thorsten Holz
, Emmanuele Zambon
, Sandro Etalle:
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. 437-448
Network Security
- Matteo Dell'Amico

, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier:
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. 449-460 - Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska:

A Security-Mode for Carrier-Grade SDN Controllers. 461-473 - Jelena Mirkovic, Erik Kline, Peter L. Reiher:

RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. 474-485
Usability
- Adam J. Aviv

, John T. Davin, Flynn Wolf, Ravi Kuber:
Towards Baselines for Shoulder Surfing on Mobile Authentication. 486-498 - Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:

On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. 499-511 - Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon:

Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. 512-527
System Security
- Peter C. Johnson, Sergey Bratus, Sean W. Smith:

Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. 528-541 - Junya Ogasawara, Kenji Kono:

Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. 542-552 - Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang

:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. 553-565
Privacy
- Xiyue Deng, Jelena Mirkovic:

Commoner Privacy And A Study On Network Traces. 566-576 - Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:

The Devil's in The Details: Placing Decoy Routers in the Internet. 577-589 - Michael Weissbacher, Enrico Mariconti

, Guillermo Suarez-Tangil
, Gianluca Stringhini, William K. Robertson
, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. 590-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














