219
Voted
ACSAC
10 years 15 days ago
2015 IEEE
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
218
click to vote
ACSAC
10 years 15 days ago
2015 IEEE
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
127
click to vote
ACSAC
10 years 15 days ago
2015 IEEE
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
121
click to vote
ACSAC
10 years 15 days ago
2015 IEEE
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
120
click to vote
ACSAC
10 years 15 days ago
2015 IEEE
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
|