Sciweavers

CCS
2007
ACM
15 years 5 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
76
Voted
CCS
2007
ACM
15 years 5 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
80
Voted
CCS
2007
ACM
15 years 5 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
74
Voted
CCS
2007
ACM
15 years 5 months ago
Addressing interoperability issues in access control models
Vishwas Patil, Alessandro Mei, Luigi V. Mancini
CCS
2007
ACM
15 years 5 months ago
BASE: an incrementally deployable mechanism for viable IP spoofing prevention
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Pe...
61
Voted
CCS
2007
ACM
15 years 5 months ago
Verification condition generation for conditional information flow
Torben Amtoft, Anindya Banerjee
66
Voted
CCS
2007
ACM
15 years 5 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
78
Voted
CCS
2007
ACM
15 years 5 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
74
Voted
CCS
2007
ACM
15 years 5 months ago
Elastic block ciphers: the basic design
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while ...
Debra L. Cook, Angelos D. Keromytis, Moti Yung
CCS
2007
ACM
15 years 5 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...