237
Voted
ACSAC
10 years 1 months ago
2015 IEEE
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
229
click to vote
ACSAC
10 years 1 months ago
2015 IEEE
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumenta...
141
click to vote
ACSAC
10 years 1 months ago
2015 IEEE
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements. Many existing CAPTCHAs can be broken usin...
135
click to vote
ACSAC
10 years 1 months ago
2015 IEEE
Existing malware defenses are primarily reactive in nature, with defenses effective only on malware that has previously been observed. Unfortunately, we are witnessing a generati...
132
click to vote
ACSAC
10 years 1 months ago
2015 IEEE
Cloud platforms that use logical partitions to allocate dedicated resources to VMs can benefit from small and therefore secure hypervisors. Many-core platforms, with their abunda...
|