


default search action
16th CCS 2009: Chicago, Illinois, USA
- Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis:

Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM 2009, ISBN 978-1-60558-894-0
Attacks I
- Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz:

Attacking cryptographic schemes based on "perturbation polynomials". 1-10 - Yves Younan, Pieter Philippaerts

, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. 11-20 - Yao Liu, Michael K. Reiter, Peng Ning:

False data injection attacks against state estimation in electric power grids. 21-32
RFID
- Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:

EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. 33-42 - Côme Berbain, Olivier Billet

, Jonathan Etrog, Henri Gilbert:
An efficient forward private RFID protocol. 43-53 - Changshe Ma, Yingjiu Li, Robert H. Deng

, Tieyan Li:
RFID privacy: relation between two notions, minimal condition, and efficient construction. 54-65
Formal techniques
- Michael Backes, Dennis Hofheinz, Dominique Unruh

:
CoSP: a general framework for computational soundness proofs. 66-78 - Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich

, Steve Zdancewic:
Reactive noninterference. 79-90 - Ralf Küsters, Max Tuengerthal:

Computational soundness for key exchange protocols with symmetric encryption. 91-100 - Mario Frank, Andreas P. Streich, David A. Basin, Joachim M. Buhmann:

A probabilistic approach to hybrid role mining. 101-111
Applied cryptography
- Allison B. Lewko, Brent Waters:

Efficient pseudorandom functions from the decisional linear assumption and weaker variants. 112-120 - Melissa Chase, Sherman S. M. Chow

:
Improving privacy and security in multi-authority attribute-based encryption. 121-130 - Jan Camenisch, Maria Dubovitskaya, Gregory Neven:

Oblivious transfer with access control. 131-140
Anonymization networks
- Andriy Panchenko, Stefan Richter, Arne Rache:

NISAN: network information service for anonymization networks. 141-150 - Dario Catalano, Dario Fiore, Rosario Gennaro:

Certificateless onion routing. 151-160 - Prateek Mittal, Nikita Borisov

:
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. 161-172
Cloud security
- K. Vikram, Abhishek Prateek, V. Benjamin Livshits:

Ripley: automatically securing web 2.0 applications through replicated execution. 173-186 - Kevin D. Bowers, Ari Juels, Alina Oprea:

HAIL: a high-availability and integrity layer for cloud storage. 187-198 - Thomas Ristenpart, Eran Tromer

, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. 199-212 - C. Christopher Erway, Alptekin Küpçü

, Charalampos Papamanthou, Roberto Tamassia:
Dynamic provable data possession. 213-222
Security of mobile services
- Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:

On cellular botnets: measuring the impact of malicious devices on a cellular network core. 223-234 - William Enck, Machigar Ongtang, Patrick D. McDaniel:

On lightweight mobile phone application certification. 235-245 - Justin Manweiler, Ryan Scudellari, Landon P. Cox:

SMILE: encounter-based trust for mobile social services. 246-255
Software security using behavior
- Steven Gianvecchio, Zhenyu Wu, Mengjun Xie

, Haining Wang:
Battle of Botcraft: fighting bots in online games with human observational proofs. 256-268 - Edward C. Kaiser, Wu-chang Feng, Travis Schluessler:

Fides: remote anomaly-based cheat detection using client emulation. 269-279 - Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu:

Behavior based software theft detection. 280-290
Systems and networks
- Steffen Reidt, Mudhakar Srivatsa, Shane Balfe:

The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. 291-302 - Masana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto:

Effective implementation of the cell broadband engineTM isolation loader. 303-313 - Muhammad Qasim Ali, Hassan Khan, Ali Sajjad, Syed Ali Khayam:

On achieving good operating points on an ROC plane using stochastic anomaly score prediction. 314-323
Privacy
- Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes:

On non-cooperative location privacy: a game-theoretic analysis. 324-337 - Rui Wang, XiaoFeng Wang, Zhou Li

, Haixu Tang, Michael K. Reiter, Zheng Dong:
Privacy-preserving genomic computation through program specialization. 338-347 - Toby Xu, Ying Cai:

Feeling-based location privacy protection for location-based services. 348-357 - Ian Goldberg, Berkant Ustaoglu

, Matthew Van Gundy, Hao Chen
:
Multi-party off-the-record messaging. 358-368
Anonymization techniques
- Carmela Troncoso, George Danezis:

The bayesian traffic analysis of mix networks. 369-379 - Matthew Edman, Paul F. Syverson:

As-awareness in Tor path selection. 380-389 - Eugene Y. Vasserman

, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim
:
Membership-concealing overlay networks. 390-399
Embedded and mobile devices
- Claude Castelluccia, Aurélien Francillon

, Daniele Perito, Claudio Soriente
:
On the difficulty of software-based attestation of embedded devices. 400-409 - Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:

Proximity-based access control for implantable medical devices. 410-419 - Hristo Bojinov, Elie Bursztein, Dan Boneh:

XCS: cross channel scripting and its impact on web applications. 420-431
Technique for ensuring software security
- Cédric Fournet, Gurvan Le Guernic

, Tamara Rezk:
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. 432-441 - Siliang Li, Gang Tan

:
Finding bugs in exceptional situations of JNI programs. 442-452 - Andrew Meneely

, Laurie A. Williams:
Secure open source collaboration: an empirical study of linus' law. 453-462
Designing secure systems
- Cynthia Sturton, Susmit Jha

, Sanjit A. Seshia, David A. Wagner:
On voting machine design for verification and testability. 463-476 - Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi:

Secure in-VM monitoring using hardware virtualization. 477-487 - Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt:

A metadata calculus for secure information sharing. 488-499 - Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot

, Robert Biddle:
Multiple password interference in text passwords and click-based graphical passwords. 500-511
Attacks II
- Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, Matt Blaze:

Can they hear me now?: a security analysis of law enforcement wiretaps. 512-523 - Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus:

English shellcode. 524-533 - Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang, Xiao-yong Zhou:

Learning your identity and disease from research papers: information leaks in genome wide association study. 534-544
System security
- Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:

Countering kernel rootkits with lightweight hook protection. 545-554 - Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang:

Mapping kernel objects to enable systematic integrity checking. 555-565 - Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin:

Robust signatures for kernel data structures. 566-577
Anonymization
- Zhen Ling, Junzhou Luo, Wei Yu

, Xinwen Fu
, Dong Xuan, Weijia Jia
:
A new cell counter based attack against tor. 578-589 - Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim

:
Scalable onion routing with torsk. 590-599 - Patrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup:

Anonymous credentials on a standard java card. 600-610
Malware and bots
- Xin Hu, Tzi-cker Chiueh, Kang G. Shin:

Large-scale malware indexing using function-call graphs. 611-620 - Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song:

Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. 621-634 - Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro

, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. 635-647

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














