Sciweavers

CCS
2007
ACM
14 years 5 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
CCS
2007
ACM
14 years 5 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
CCS
2007
ACM
14 years 5 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CCS
2007
ACM
14 years 5 months ago
Addressing interoperability issues in access control models
Vishwas Patil, Alessandro Mei, Luigi V. Mancini
CCS
2007
ACM
14 years 5 months ago
BASE: an incrementally deployable mechanism for viable IP spoofing prevention
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Pe...
CCS
2007
ACM
14 years 5 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
CCS
2007
ACM
14 years 5 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
CCS
2007
ACM
14 years 5 months ago
Elastic block ciphers: the basic design
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while ...
Debra L. Cook, Angelos D. Keromytis, Moti Yung
CCS
2007
ACM
14 years 5 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...