205
Voted
ACSAC
9 years 10 months ago
2015 IEEE
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
195
Voted
ACSAC
9 years 10 months ago
2015 IEEE
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
113
Voted
ACSAC
9 years 10 months ago
2015 IEEE
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
108
Voted
ACSAC
9 years 10 months ago
2015 IEEE
Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid....
107
Voted
ACSAC
9 years 10 months ago
2015 IEEE
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
|