default search action
ACM Transactions on Privacy and Security, Volume 22
Volume 22, Number 1, January 2019
- Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. 1:1-1:35 - Bradley Reaves, Luis Vargas, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Security of the SMS Ecosystem with Public Gateways. 2:1-2:31 - Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson:
KIST: Kernel-Informed Socket Transport for Tor. 3:1-3:37 - Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication. 4:1-4:30 - Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis:
Kernel Protection Against Just-In-Time Code Reuse. 5:1-5:28 - Xabier Ugarte-Pedrero, Mariano Graziano, Davide Balzarotti:
A Close Look at a Daily Dataset of Malware Samples. 6:1-6:30 - Sebastian Mödersheim, Luca Viganò:
Alpha-Beta Privacy. 7:1-7:35
Volume 22, Number 2, April 2019
- Diego Kreutz, Jiangshan Yu, Fernando M. V. Ramos, Paulo Jorge Esteves Veríssimo:
ANCHOR: Logically Centralized Security for Software-Defined Networks. 8:1-8:36 - Fabio Pagani, Oleksii Fedorov, Davide Balzarotti:
Introducing the Temporal Dimension to Memory Forensics. 9:1-9:21 - Donghyun Kwon, Hayoon Yi, Yeongpil Cho, Yunheung Paek:
Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation. 10:1-10:30 - Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le, Jelena Mirkovic:
Using Episodic Memory for User Authentication. 11:1-11:34 - Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, Yongdae Kim:
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. 12:1-12:26 - Scott Ruoti, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'Neill, Ken Reese, Brad Spendlove, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
A Usability Study of Four Secure Email Tools Using Paired Participants. 13:1-13:33 - Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini:
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). 14:1-14:34
Volume 22, Number 3, July 2019
- Fang-Yu Rao, Jianneng Cao, Elisa Bertino, Murat Kantarcioglu:
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records. 15:1-15:36 - Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. 16:1-16:30 - Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Database Audit Workload Prioritization via Game Theory. 17:1-17:21 - Alexander V. Outkin, Brandon K. Eames, Meghan A. Galiardi, Sarah Walsh, Eric D. Vugrin, Byron Heersink, Jacob A. Hobbs, Gregory D. Wyss:
GPLADD: Quantifying Trust in Government and Commercial Systems A Game-Theoretic Approach. 18:1-18:27 - Samuel Wedaj, Kolin Paul, Vinay J. Ribeiro:
DADS: Decentralized Attestation for Device Swarms. 19:1-19:29
Volume 22, Number 4, December 2019
- Gokcan Cantali, Orhan Ermis, Mehmet Ufuk Çaglayan, Cem Ersoy:
Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems. 20:1-20:36 - Hongyu Jin, Panos Papadimitratos:
Resilient Privacy Protection for Location-Based Services through Decentralization. 21:1-21:36 - Brian A. Powell:
Malicious Overtones: Hunting Data Theft in the Frequency Domain with One-class Learning. 22:1-22:34 - Awanthika Senarath, Marthie Grobler, Nalin Asanka Gamagedara Arachchilage:
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies. 23:1-23:30 - Stefano Cecconello, Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Skype & Type: Keyboard Eavesdropping in Voice-over-IP. 24:1-24:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.