-
2
-
-
0035014942
-
Cheat-proof playout for centralized and distributed online games
-
Apr
-
N. E. Baughman and B. N. Levine. Cheat-proof playout for centralized and distributed online games. In Proceedings of IEEE INFOCOM, Apr. 2001.
-
(2001)
Proceedings of IEEE INFOCOM
-
-
Baughman, N. E.1
Levine, B. N.2
-
3
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
6
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
Nov
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Nov. 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P. M.3
Dill, D. L.4
Engler, D. R.5
-
7
-
-
34547223440
-
Identifying MMORPG bots: A traffic analysis approach
-
June
-
K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen. Identifying MMORPG bots: A traffic analysis approach. In Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, June 2006.
-
(2006)
Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology
-
-
Chen, K.-T.1
Jiang, J.-W.2
Huang, P.3
Chu, H.-H.4
Lei, C.-L.5
Chen, W.-C.6
-
9
-
-
41149124878
-
Secure web applications via automatic partitioning
-
Oct
-
S. Chong, J. Liu, A. C. Myers, X. Qi, N. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In Proceedings of the 21st ACM Symposium on Operating Systems Principles, pages 31–44, Oct. 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A. C.3
Qi, X.4
Vikram, N.5
Zheng, L.6
Zheng, X.7
-
11
-
-
11244251956
-
Is runtime verification applicable to cheat detection?
-
Aug
-
M. DeLap, B. Knutsson, H. Lu, O. Sokolsky, U. Sammapun, I. Lee, and C. Tsarouchis. Is runtime verification applicable to cheat detection? In Proceedings of 3rd ACM SIGCOMM Workshop on Network and System Support for Games, Aug. 2004.
-
(2004)
Proceedings of 3rd ACM SIGCOMM Workshop on Network and System Support for Games
-
-
DeLap, M.1
Knutsson, B.2
Lu, H.3
Sokolsky, O.4
Sammapun, U.5
Lee, I.6
Tsarouchis, C.7
-
19
-
-
84938015047
-
A method for the construction of minimum-redundancy codes
-
Sept
-
D. A. Huffman. A method for the construction of minimum-redundancy codes. Proceedings of the Institute of Radio Engineers, 40(9):1098–1101, Sept. 1952.
-
(1952)
Proceedings of the Institute of Radio Engineers
, vol.40
, Issue.9
, pp. 1098-1101
-
-
Huffman, D. A.1
-
20
-
-
77953115606
-
Cheat detection for MMORPG on P2P environments
-
Oct
-
T. Izaiku, S. Yamamoto, Y. Murata, N. Shibata, K. Yasumoto, and M. Ito. Cheat detection for MMORPG on P2P environments. In Proceedings of 5th ACM SIGCOMM Workshop on Network and System Support for Games, Oct. 2006.
-
(2006)
Proceedings of 5th ACM SIGCOMM Workshop on Network and System Support for Games
-
-
Izaiku, T.1
Yamamoto, S.2
Murata, Y.3
Shibata, N.4
Yasumoto, K.5
Ito, M.6
-
21
-
-
34548788559
-
Enforcing semantic integrity on untrusted clients in networked virtual environments (extended abstract)
-
May
-
S. Jha, S. Katzenbeisser, C. Schallhart, H. Veith, and S. Chenney. Enforcing semantic integrity on untrusted clients in networked virtual environments (extended abstract). In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 179–186, May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 179-186
-
-
Jha, S.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
Chenney, S.5
-
24
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
July
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th USENIX Security Symposium, pages 161–176, July 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
, pp. 161-176
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
27
-
-
67650790241
-
Server-side bot detection in massive multiplayer online games
-
3
-
S. Mitterhofer, C. Platzer, C. Kruegel, and E. Kirda. Server-side bot detection in massive multiplayer online games. IEEE Security and Privacy, 7:18–25, 3 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 18-25
-
-
Mitterhofer, S.1
Platzer, C.2
Kruegel, C.3
Kirda, E.4
-
32
-
-
85180539668
-
former lead designer for Meridian 59
-
Quoted [29]
-
D. Schubert, former lead designer for Meridian 59. Quoted [29, p. 221].
-
-
-
Schubert, D.1
-
36
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
Nov
-
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Nov. 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M. K.5
Dong, Z.6
-
39
-
-
41249095464
-
Embedded noninteractive continuous bot detection
-
Oct
-
R. V. Yampolskly and V. Govindaraju. Embedded noninteractive continuous bot detection. Computers in Entertainment, 5(4):1–11, Oct. 2007.
-
(2007)
Computers in Entertainment
, vol.5
, Issue.4
, pp. 1-11
-
-
Yampolskly, R. V.1
Govindaraju, V.2
-
41
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
May
-
J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler. Automatically generating malicious disks using symbolic execution. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
|