-
2
-
-
33746053876
-
Privacy vulnerabilities in encrypted http streams
-
G.D. Bissias, M. Liberatore, D. Jensen, and B.N. Levine. "Privacy vulnerabilities in encrypted http streams," In proceedings of Privacy Enhancing Technologies Workshop (PET 2005), pages 1-11, 2005.
-
(2005)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2005)
, pp. 1-11
-
-
Bissias, G.D.1
Liberatore, M.2
Jensen, D.3
Levine, B.N.4
-
3
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
New York, NY, USA. ACM
-
A. Bose, X. Hu, K.G. Shin, and T. Park. "Behavioral detection of malware on mobile handsets," In MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services, pages 225-238, New York, NY, USA, 2008. ACM.
-
(2008)
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
5
-
-
84923201020
-
Defending against sensor-sniffing attacks on mobile phones
-
New York, NY, USA. ACM
-
L. Cai, S. Machiraju, and H. Chen. "Defending against sensor-sniffing attacks on mobile phones," In Mo-biHeld '09: proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, pages 31-36, New York, NY, USA, 2009. ACM.
-
(2009)
Mo-biHeld ' 09: Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds
, pp. 31-36
-
-
Cai, L.1
MacHiraju, S.2
Chen, H.3
-
7
-
-
35448979944
-
Smart-siren: Virus detection and alert for smartphones
-
New York, NY, USA. ACM
-
J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu. "Smart-siren: virus detection and alert for smartphones," In MobiSys '07: proceedings of the 5th international conference on Mobile systems, applications and services, pages 258-271, New York, NY, USA, 2007. ACM.
-
(2007)
MobiSys '07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
8
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
D. Dagon, T. Martin, and T. Starner. "Mobile phones as computing devices: The viruses are coming!" IEEE Pervasive Computing, 3(4):11-15, 2004.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
10
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA. ACM
-
W. Enck, M. Ongtang, and P. McDaniel. "On lightweight mobile phone application certification," In CCS '09: proceedings of the 16th ACM conference on Computer and communications security, pages 235-245, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
11
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA. ACM
-
W. Enck, M. Ongtang, and P. McDaniel. "On lightweight mobile phone application certification," In CCS '09: proceedings of the 16th ACM conference on Computer and communications security, pages 235-245, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
12
-
-
60049085302
-
Understanding android security
-
W. Enck, M. Ongtang, and P.D. McDaniel. "Understanding android security," IEEE Security & Privacy, 7(1):50-57, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.D.3
-
13
-
-
33745796561
-
Exploiting open functionality in sms-capable cellular networks
-
New York, NY, USA. ACM
-
W. Enck, P. Traynor, P. McDaniel, and T. La Porta. "Exploiting open functionality in sms-capable cellular networks," In CCS '05: proceedings of the 12th ACM conference on Computer and communications security, pages 393-404, New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 393-404
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
La Porta, T.4
-
14
-
-
74249094714
-
Learning and predicting multimodal daily life patterns from cell phones
-
J.L. Crowley, Y. Ivanov, C.R. Wren, D. Gatica-Perez, M. Johnston, and R. Stiefelhagen, editors. ACM
-
K. Farrahi and D.G. Perez. "Learning and predicting multimodal daily life patterns from cell phones," In J.L. Crowley, Y. Ivanov, C.R. Wren, D. Gatica-Perez, M. Johnston, and R. Stiefelhagen, editors, ICMI, pages 277-280. ACM, 2009.
-
(2009)
ICMI
, pp. 277-280
-
-
Farrahi, K.1
Perez, D.G.2
-
15
-
-
34547358090
-
Gait analyzer based on a cell phone with a single three-axis accelerometer
-
New York, NY, USA. ACM
-
T. Iso and K. Yamazaki. "Gait analyzer based on a cell phone with a single three-axis accelerometer," In MobileHCI '06: proceedings of the 8th conference on Human-computer interaction with mobile devices and services, pages 141-144, New York, NY, USA, 2006. ACM.
-
(2006)
MobileHCI '06: Proceedings of the 8th Conference on Human-computer Interaction with Mobile Devices and Services
, pp. 141-144
-
-
Iso, T.1
Yamazaki, K.2
-
17
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, NY, USA. ACM
-
C. Karlof, N. Sastry, and D. Wagner. "Tinysec: a link layer security architecture for wireless sensor networks," In SenSys '04: proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162-175, New York, NY, USA, 2004. ACM.
-
(2004)
SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
18
-
-
33748055433
-
Modeling steady-state and transient behaviors of user mobility: Formulation, analysis, and application
-
New York, NY, USA. ACM
-
J.K. Lee and J.C. Hou. "Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application," In MobiHoc '06: proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, pages 85-96, New York, NY, USA, 2006. ACM.
-
(2006)
MobiHoc '06: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 85-96
-
-
Lee, J.K.1
Hou, J.C.2
-
19
-
-
33744910431
-
TinyOS: An operating system for sensor networks
-
Springer Verlag
-
P. Levis, S. Madden, J. Polastre, R. Szewczyk, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, and D. Culler. "TinyOS: An operating system for sensor networks," In Ambient Intelligence. Springer Verlag, 2004.
-
(2004)
Ambient Intelligence
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Woo, A.5
Gay, D.6
Hill, J.7
Welsh, M.8
Brewer, E.9
Culler, D.10
-
20
-
-
76649138917
-
Virusmeter: Preventing your cellphone from spies
-
E. Kirda, S. Jha, and D. Balzarotti, editors of Lecture Notes in Computer Science. Springer
-
L. Liu, G. Yan, X. Zhang, and S. Chen. "Virusmeter: Preventing your cellphone from spies," In E. Kirda, S. Jha, and D. Balzarotti, editors, RAID, volume 5758 of Lecture Notes in Computer Science, pages 244-264. Springer, 2009.
-
(2009)
RAID
, vol.5758
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
21
-
-
35348897342
-
Minisec: A secure sensor network communication architecture
-
New York, NY, USA. ACM
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor. "Minisec: a secure sensor network communication architecture," In IPSN '07: proceedings of the 6th international conference on Information processing in sensor networks, pages 479-488, New York, NY, USA, 2007. ACM.
-
(2007)
IPSN ' 07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
23
-
-
77950851532
-
Semantically rich application-centric security in Android
-
IEEE Computer Society
-
M. Ongtang, S. E. McLaughlin, W. Enck, and P. D. McDaniel. "Semantically rich application-centric security in Android," In ACSAC, pages 340-349. IEEE Computer Society, 2009.
-
(2009)
ACSAC
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.E.2
Enck, W.3
McDaniel, P.D.4
-
25
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA. ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," In CCS '09: proceedings of the 16th ACM conference on Computer and communications security, pages 199-212, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
26
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Berkeley, CA, USA. USENIX Association
-
T.S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. "Devices that tell on you: privacy trends in consumer ubiquitous computing," In SS'07: proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1-16, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-16
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
27
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
Berkeley, CA, USA. USENIX Association
-
D.X. Song, D. Wagner, and X. Tian. "Timing analysis of keystrokes and timing attacks on SSH," In SSYM'01: proceedings of the 10th conference on USENIX Security Symposium, pages 25-25, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
SSYM'01: Proceedings of the 10th Conference on USENIX Security Symposium
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
28
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G.E. Suh, J.W. Lee, D. Zhang, and S. Devadas. "Secure program execution via dynamic information flow tracking," In ASPLOS-XI: proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pages 85-96, 2004.
-
(2004)
ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
29
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Washington DC, USA. IEEE Computer Society
-
Q. Sun, D.R. Simon, Y.M. Wang, W. Russell, V.N. Padmanabhan, and L. Qiu. "Statistical identification of encrypted web browsing traffic," In SP '02: proceedings of the 2002 IEEE Symposium on Security and Privacy, page 19, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 19
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
30
-
-
74049105488
-
EPet: When cellular phone learns to recognize its owner
-
New York, NY, USA. ACM
-
M. Tamviruzzaman, S.I. Ahamed, C.S. Hasan, and C. O'brien. "ePet: when cellular phone learns to recognize its owner," In SafeConfig '09: proceedings of the 2nd ACM workshop on Assurable and usable security configuration, pages 13-18, New York, NY, USA, 2009. ACM.
-
(2009)
SafeConfig '09: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration
, pp. 13-18
-
-
Tamviruzzaman, M.1
Ahamed, S.I.2
Hasan, C.S.3
O'Brien, C.4
-
31
-
-
79960330115
-
-
The Tor Project. Tor: anonymity online. http://www.torproject.org/, 2009.
-
(2009)
Tor: Anonymity Online
-
-
-
32
-
-
70349309702
-
Securing cellular infrastructure: Challenges and opportunities
-
P. Traynor. "Securing cellular infrastructure: Challenges and opportunities," IEEE Security & Privacy, 7(4):77-79, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 77-79
-
-
Traynor, P.1
-
33
-
-
33751040642
-
Mitigating attacks on open functionality in sms-capable cellular networks
-
New York, NY, USA. ACM
-
P. Traynor, W. Enck, P. McDaniel, and T.L. Porta. "Mitigating attacks on open functionality in sms-capable cellular networks," In MobiCom '06: proceedings of the 12th annual international conference on Mobile computing and networking, pages 182-193, New York, NY, USA, 2006. ACM.
-
(2006)
MobiCom '06: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking
, pp. 182-193
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
34
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
E. Al-Shaer, S. Jha, and A.D. Keromytis, editors. ACM
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P.D. McDaniel, and T.F. La Porta. "On cellular botnets: measuring the impact of malicious devices on a cellular network core," In E. Al-Shaer, S. Jha, and A.D. Keromytis, editors, ACM Conference on Computer and Communications Security, pages 223-234. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.D.6
Porta La, T.F.7
-
35
-
-
84882198584
-
Compromising electromagnetic emanations of wired and wireless key-boards
-
Montreal, Canada. USENIX Association
-
M. Vuagnoux and S. Pasini. "Compromising electromagnetic emanations of wired and wireless key-boards," In proceedings of the 18th USENIX Security Symposium, pages 1-16, Montreal, Canada, 2009. USENIX Association.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 1-16
-
-
Vuagnoux, M.1
Pasini, S.2
-
36
-
-
84946432389
-
Analysis of the SSL 3.0 protocol
-
Berkeley, CA, USA. USENIX Association
-
D. Wagner and B. Schneier. "Analysis of the SSL 3.0 protocol," In WOEC'96: proceedings of the Second USENIX Workshop on Electronic Commerce, pages 4-4, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
WOEC'96: Proceedings of the Second USENIX Workshop on Electronic Commerce
, pp. 4-4
-
-
Wagner, D.1
Schneier, B.2
-
37
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
Washington, DC, USA. IEEE Computer Society
-
C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M. Masson. "Spot me if you can: Uncovering spoken phrases in encrypted voip conversations," In SP '08: proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 35-49, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
38
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3g smartphones
-
New York, NY, USA. ACM
-
N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng. "Stealthy video capturer: a new video-based spyware in 3g smartphones," In WiSec 09: proceedings of the second ACM conference on Wireless network security, pages 69-78, New York, NY, USA, 2009. ACM.
-
(2009)
WiSec 09: Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
-
39
-
-
77954483223
-
Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
Montreal, Canada. USENIX Association
-
K. Zhang and X. Wang. "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-user Systems," In USENIX Security 09: proceedings of the 18th USENIX Security Symposium, Montreal, Canada, 2008. USENIX Association.
-
(2008)
USENIX Security 09: Proceedings of the 18th USENIX Security Symposium
-
-
Zhang, K.1
Wang, X.2
|