


default search action
15th CCS 2008: Alexandria, VA, USA
- Peng Ning, Paul F. Syverson, Somesh Jha:

Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. ACM 2008, ISBN 978-1-59593-810-7
Keynote address
- Martín Abadi:

The good, the bad, and the provable. 1
Attacks 1
- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:

Spamalytics: an empirical analysis of spam marketing conversion. 3-14 - Aurélien Francillon

, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. 15-26 - Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage:

When good instructions go bad: generalizing return-oriented programming to RISC. 27-38
Software security 1
- Walter Chang, Brandon Streiff, Calvin Lin:

Efficient and extensible security enforcement using dynamic data flow analysis. 39-50 - Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee:

Ether: malware analysis via hardware virtualization extensions. 51-62 - Diptikalyan Saha:

Extending logical attack graphs for efficient vulnerability analysis. 63-74
Browser security
- Adam Barth, Collin Jackson, John C. Mitchell:

Robust defenses for cross-site request forgery. 75-88 - Terri Oda, Glenn Wurster, Paul C. van Oorschot

, Anil Somayaji:
SOMA: mutual approval for included content in web pages. 89-98 - Steven Crites, Francis Hsu, Hao Chen

:
OMash: enabling secure web mashups via object abstractions. 99-108
Formal methods 1
- Hubert Comon-Lundh, Véronique Cortier:

Computational soundness of observational equivalence. 109-118 - Cas J. F. Cremers:

Unbounded verification, falsification, and characterization of security protocols by pattern refinement. 119-128 - Ralf Küsters, Tomasz Truderung:

Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. 129-138
Privacy 1
- Peter Williams, Radu Sion

, Bogdan Carbunar:
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. 139-148 - Kasper Bonne Rasmussen, Srdjan Capkun:

Location privacy of distance bounding protocols. 149-160
Software security 2
- Matthew Finifter, Adrian Mettler, Naveen Sastry, David A. Wagner:

Verifiable functional purity in java. 161-174 - Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi:

Trust management for secure information flows. 175-188
Network security
- Hitesh Ballani, Paul Francis:

Mitigating DNS DoS attacks. 189-198 - Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux:

Revocation games in ephemeral networks. 199-210 - David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee:

Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. 211-222
System security 1
- Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode:

Enforcing authorization policies using transactional memory introspection. 223-234 - Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:

Towards practical biometric key generation with randomized biometric templates. 235-244 - Rui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li:

Towards automatic reverse engineering of software security configurations. 245-256
Privacy 2
- Assaf Ben-David, Noam Nisan

, Benny Pinkas:
FairplayMP: a system for secure multi-party computation. 257-266 - Prateek Mittal, Nikita Borisov

:
Information leaks in structured peer-to-peer anonymous communication systems. 267-278 - Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno:

Privacy oracle: a system for finding application leaks with black box differential testing. 279-288
Access control
- Lars E. Olson, Carl A. Gunter, P. Madhusudan:

A formal framework for reflective database access control policies. 289-298 - Mario Frank, David A. Basin, Joachim M. Buhmann:

A class of probabilistic models for role engineering. 299-310 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia, Stefano Paraboschi
, Pierangela Samarati
:
Assessing query privileges via safe and efficient permission composition. 311-322
Anonymity
- Wei Wang, Mehul Motani

, Vikram Srinivasan:
Dependent link padding algorithms for low latency anonymity systems. 323-332 - Patrick P. Tsang, Man Ho Au

, Apu Kapadia, Sean W. Smith:
PEREA: towards practical TTP-free revocation in anonymous authentication. 333-344 - Jan Camenisch, Thomas Groß:

Efficient attributes for anonymous credentials. 345-356
Formal methods 2
- Michael Backes, Catalin Hritcu, Matteo Maffei:

Type-checking zero-knowledge. 357-370 - Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade

, Yassine Lakhnech:
Towards automated proofs for asymmetric encryption schemes in the random oracle model. 371-380 - Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani, G. Ramalingam, Lakshmisubrahmanyam Velaga:

EON: modeling and analyzing dynamic access control systems with logic programs. 381-390
System security 2
- Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irún-Briz:

Tupni: automatic reverse engineering of input formats. 391-402 - Kevin R. B. Butler

, Stephen E. McLaughlin, Patrick D. McDaniel:
Rootkit-resistant disks. 403-416
Identity-based encryption
- Alexandra Boldyreva, Vipul Goyal, Virendra Kumar

:
Identity-based encryption with efficient revocation. 417-426 - Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters:

Black-box accountable authority identity-based encryption. 427-436
Applied cryptography 1
- Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:

Authenticated hash tables. 437-448 - Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki:

Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. 449-458 - Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:

Cryptographically verified implementations for TLS. 459-468
Device security
- Benjamin Laxton, Kai Wang, Stefan Savage:

Reconsidering physical key secrecy: teleduplication via optical decoding. 469-478 - Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno:

RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. 479-490 - Carmit Hazay

, Yehuda Lindell
:
Constructions of truly practical secure protocols using standard smartcards. 491-500
Applied cryptography 2
- Dan Boneh, Moni Naor:

Traitor tracing with constant size ciphertext. 501-510 - Benoît Libert, Damien Vergnaud

:
Multi-use unidirectional proxy re-signatures. 511-520 - Haowen Chan, Adrian Perrig:

Efficient security primitives derived from a secure aggregation algorithm. 521-534
Attacks 2
- Philippe Golle:

Machine learning attacks against the Asirra CAPTCHA. 535-542 - Jeff Yan, Ahmad Salah El Ahmad:

A low-cost attack on a Microsoft captcha. 543-554 - Ellick Chan, Jeffrey C. Carlyle, Francis M. David, Reza Farivar, Roy H. Campbell:

BootJacker: compromising computers using forced restarts. 555-564 - Justin Cappos, Justin Samuel, Scott M. Baker, John H. Hartman:

A look in the mirror: attacks on package managers. 565-574

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














