


default search action
ACM Transactions on Privacy and Security, Volume 21
Volume 21, Number 1, January 2018
- AbdelRahman Abdou, Paul C. van Oorschot

:
Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication. 1:1-1:26 - Hao Shi, Jelena Mirkovic, Abdulla Alwabel:

Handling Anti-Virtual Machine Techniques in Malicious Software. 2:1-2:31 - Neil Zhenqiang Gong, Bin Liu

:
Attribute Inference Attacks in Online Social Networks. 3:1-3:30 - Marcus Botacin, Paulo Lício de Geus

, André Grégio
:
Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging. 4:1-4:30 - Sarani Bhattacharya, Debdeep Mukhopadhyay:

Utilizing Performance Counters for Compromising Public Key Ciphers. 5:1-5:31
Volume 21, Number 2, February 2018
- Yihua Zhang, Marina Blanton

, Ghada Almashaqbeh:
Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler. 6:1-6:34 - Benny Pinkas, Thomas Schneider

, Michael Zohner:
Scalable Private Set Intersection Based on OT Extension. 7:1-7:35 - Saed Alrabaee, Paria Shirani

, Lingyu Wang, Mourad Debbabi
:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. 8:1-8:34 - Roberto Giacobazzi, Isabella Mastroeni

:
Abstract Non-Interference: A Unifying Framework for Weakening Information-flow. 9:1-9:31 - Yunmok Son

, Juhwan Noh, Jaeyeong Choi, Yongdae Kim
:
GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes. 10:1-10:25
Volume 21, Number 3, June 2018
- Michele Carminati

, Mario Polino, Andrea Continella
, Andrea Lanzi, Federico Maggi, Stefano Zanero
:
Security Evaluation of a Banking Fraud Analysis System. 11:1-11:31 - Florian Kelbert, Alexander Pretschner:

Data Usage Control for Distributed Systems. 12:1-12:32 - Elizabeth Stobert, Robert Biddle:

The Password Life Cycle. 13:1-13:32 - Fengguo Wei, Sankardas Roy, Xinming Ou, Robby:

Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. 14:1-14:32 - Siqi Zhao, Xuhua Ding

:
FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems. 15:1-15:30
Volume 21, Number 4, October 2018
- Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia

:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. 16:1-16:28 - Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin

, Sungwook Kim
:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. 17:1-17:30 - Fanny Lalonde Lévesque

, Sonia Chiasson, Anil Somayaji, José M. Fernandez:
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. 18:1-18:30 - Guixin Ye

, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam J. Aviv
, Zheng Wang
:
A Video-based Attack for Android Pattern Lock. 19:1-19:31 - Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz:

Verifiable Graph Processing. 20:1-20:23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














