-
1
-
-
84867723998
-
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
-
Perth
-
Almotairi, S. I., Clark, A. J., Dacier, M., Leita, C., Mohay, G. M., Pham, V. H., Thonnard, O., Zimmermann, J.: Extracting inter-arrival time based behaviour from honeypot traffic using cliques. In: Proceedings of the 5th Australian Digital Forensics Conference, Perth, pp. 79-87 (2007)
-
(2007)
Proceedings of the 5th Australian Digital Forensics Conference
, pp. 79-87
-
-
Almotairi, S.I.1
Clark, A.J.2
Dacier, M.3
Leita, C.4
Mohay, G.M.5
Pham, V.H.6
Thonnard, O.7
Zimmermann, J.8
-
2
-
-
57949092537
-
Characterization of attackers' activities in honeypot traffic using principal component analysis
-
Shanghai, IEEE Computer Society, Washington, DC
-
Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: Characterization of attackers' activities in honeypot traffic using principal component analysis. In: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, NPC'08, Shanghai, pp. 147-154. IEEE Computer Society, Washington, DC (2008)
-
(2008)
Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, NPC'08
, pp. 147-154
-
-
Almotairi, S.1
Clark, A.2
Mohay, G.3
Zimmermann, J.4
-
3
-
-
70349586341
-
A technique for detecting new attacks in low-interaction honeypot traffic
-
Venice, IEEE Computer Society, Washington, DC
-
Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: A technique for detecting new attacks in low-interaction honeypot traffic. In: Proceedings of the 4th International Conference on Internet Monitoring and Protection, ICIMP'09, Venice, pp. 7-13. IEEE Computer Society, Washington, DC (2009)
-
(2009)
Proceedings of the 4th International Conference on Internet Monitoring and Protection, ICIMP'09
, pp. 7-13
-
-
Almotairi, S.1
Clark, A.2
Mohay, G.3
Zimmermann, J.4
-
4
-
-
85052273979
-
Resource management and fault tolerance principles for supporting distributed realtime and embedded systems in the cloud
-
Montreal, ACM, New York
-
An, K.: Resource management and fault tolerance principles for supporting distributed realtime and embedded systems in the cloud. In: Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware Conference, MIDDLEWARE' 12, Montreal, pp. 4:1-4:6. ACM, New York (2012). doi:10.1145/2405688.2405692
-
(2012)
Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware Conference, MIDDLEWARE' 12
, pp. 41-46
-
-
An, K.1
-
6
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50-58 (2010). doi:10.1145/1721654.1721672
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
7
-
-
74049102823
-
Provable data possession at untrusted stores
-
Alexandria, ACM, New York
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07, Alexandria, pp. 598-609. ACM, New York (2007). doi:10.1145/1315245.1315318
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
8
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
Chicago, ACM, New York
-
Azab, A. M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N. C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, Chicago, pp. 38-49. ACM, New York (2010). doi:10.1145/1866307.1866313
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
9
-
-
80755169488
-
Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
-
ACM, New York
-
Azab, A. M., Ning, P., Zhang, X.: Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11, pp. 375-388. ACM, New York (2011). doi: 10.1145/2046707.2046752
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11
, pp. 375-388
-
-
Azab, A.M.1
Ning, P.2
Zhang, X.3
-
10
-
-
34250660925
-
Spamrank - Fully automatic link spam detection
-
Chiba
-
Benczur, A. A., Csalogany, K., Sarlos, T., Uher, M., Uher, M.: Spamrank - fully automatic link spam detection. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb'05, Chiba (2005)
-
(2005)
Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb'05
-
-
Benczur, A.A.1
Csalogany, K.2
Sarlos, T.3
Uher, M.4
Uher, M.5
-
11
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
Vancouver. USENIX Association, Berkeley
-
Berger, S., Cáceres, R., Goldman, K. A., Perez, R., Sailer, R., Van Doorn, L.: vtpm: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06, Vancouver. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
12
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
ACM, New York
-
Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: Proceedings of the 20th International Conference on World Wide Web, WWW'11, pp. 197-206. ACM, New York (2011). doi:10.1145/1963405.1963436
-
(2011)
Proceedings of the 20th International Conference on World Wide Web, WWW'11
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
13
-
-
35548952721
-
A taxonomy of javascript redirection spam
-
Banff, ACM, New York
-
Chellapilla, K., Maykov, A.: A taxonomy of javascript redirection spam. In: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, AIRWeb'07, Banff, pp. 81-88. ACM, New York (2007). doi:10.1145/1244408.1244423
-
(2007)
Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, AIRWeb'07
, pp. 81-88
-
-
Chellapilla, K.1
Maykov, A.2
-
14
-
-
84874521918
-
Detecting malicious web links and identifying their attack types
-
Portland, USENIX Association, Berkeley
-
Choi, H., Zhu, B. B., Lee, H.: Detecting malicious web links and identifying their attack types. In: Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps'11, Portland, pp. 121-132. USENIX Association, Berkeley (2011)
-
(2011)
Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps'11
, pp. 121-132
-
-
Choi, H.1
Zhu, B.B.2
Lee, H.3
-
15
-
-
48749114837
-
Internet attack knowledge discovery via clusters and cliques of attack traces
-
Clark, A., Dacier, M., Mohay, G., Pouget, F., Zimmermann, J.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. Inf. Assur. Secur. 1(1), 21-32 (2006)
-
(2006)
J. Inf. Assur. Secur.
, vol.1
, Issue.1
, pp. 21-32
-
-
Clark, A.1
Dacier, M.2
Mohay, G.3
Pouget, F.4
Zimmermann, J.5
-
16
-
-
20444438039
-
Passive visual fingerprinting of network attack tools
-
Washington DC, ACM, New York
-
Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC'04, Washington DC, pp. 45-54. ACM, New York (2004). doi:10.1145/1029208.1029216
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC'04
, pp. 45-54
-
-
Conti, G.1
Abdullah, K.2
-
17
-
-
78650035874
-
Tee: A virtual drtm based execution environment for secure cloud-end computing
-
Chicago, ACM, New York
-
Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: Tee: A virtual drtm based execution environment for secure cloud-end computing. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, Chicago, pp. 663-665. ACM, New York (2010). doi:10.1145/1866307.1866390
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10
, pp. 663-665
-
-
Dai, W.1
Jin, H.2
Zou, D.3
Xu, S.4
Zheng, W.5
Shi, L.6
-
18
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
ACM, New York
-
Garera, S., Provos, N., Chew, M., Rubin, A. D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM'07, pp. 1-8. ACM, New York (2007). doi:10.1145/1314389.1314391
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM'07
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
19
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Oper. Syst. Rev. 37(5), 193-206 (2003). doi: 10.1145/1165389.945464
-
(2003)
ACM SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
21
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Alexandria, ACM, New York
-
Juels, A., Kaliski, B. S., Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07, Alexandria, pp. 584-597. ACM, New York (2007). doi:10.1145/1315245.1315317
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
22
-
-
79956295945
-
Social network-based botnet commandandcontrol: Emerging threats and countermeasures
-
Beijing, Springer, Berlin/Heidelberg
-
Kartaltepe, E. J., Morales, J. A., Xu, S., Sandhu, R.: Social network-based botnet commandandcontrol: emerging threats and countermeasures. In: Proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS'10, Beijing, pp. 511-528. Springer, Berlin/Heidelberg (2010)
-
(2010)
Proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS'10
, pp. 511-528
-
-
Kartaltepe, E.J.1
Morales, J.A.2
Xu, S.3
Sandhu, R.4
-
23
-
-
72249120603
-
Sel4: Formal verification of an OS kernel
-
Big Sky, ACM, New York
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: sel4: formal verification of an OS kernel. In: Proceedings of the 2009 ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP'09, Big Sky, pp. 207-220. ACM, New York (2009). doi:10.1145/1629575.1629596
-
(2009)
Proceedings of the 2009 ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP'09
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
24
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Chicago, ACM, New York
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD'06, Chicago, pp. 121-132. ACM, New York (2006). doi: 10.1145/1142473.1142488
-
(2006)
Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD'06
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
25
-
-
79951817047
-
Towards situational awareness of large-scale botnet probing events
-
Li, Z., Goyal, A., Chen, Y., Paxson, V.: Towards situational awareness of large-scale botnet probing events. IEEE Trans. Inf. Forensics Secur. 6(1), 175-188 (2011). doi:10.1109/TIFS. 2010.2086445
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.1
, pp. 175-188
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
26
-
-
84869744829
-
Benchmarking cloud security level agreements using quantitative policy trees
-
Raleigh, ACM, New York
-
Luna Garcia, J., Langenberg, R., Suri, N.: Benchmarking cloud security level agreements using quantitative policy trees. In: Proceedings of the 4th ACM Workshop on Cloud Computing Security Workshop, CCSW'12, Raleigh, pp. 103-112. ACM, New York (2012). doi:10.1145/2381913.2381932
-
(2012)
Proceedings of the 4th ACM Workshop on Cloud Computing Security Workshop, CCSW'12
, pp. 103-112
-
-
Luna Garcia, J.1
Langenberg, R.2
Suri, N.3
-
27
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
Paris, ACM, New York
-
Ma, J., Saul, L. K., Savage, S., Voelker, G. M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'09, Paris, pp. 1245-1254. ACM, New York (2009). doi:10.1145/1557019.1557153
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'09
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
28
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
Edmonton, ACM, New York
-
Mahoney, M. V., Chan, P. K.: Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proceedings of the 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'02, Edmonton, pp. 376-385. ACM, New York (2002). doi:10.1145/775047.775102
-
(2002)
Proceedings of the 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'02
, pp. 376-385
-
-
Mahoney, M.V.1
Chan, P.K.2
-
29
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
Oakland, IEEE Computer Society, Washington, DC
-
McCune, J. M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: Trustvisor: efficient TCB reduction and attestation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP'10, Oakland, pp. 143-158. IEEE Computer Society, Washington, DC (2010). doi:10.1109/SP.2010.17
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP'10
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
30
-
-
85192430237
-
-
Meer, H., Arvanitis, N., Slaviero, M.: defcon.org, Clobbering the cloud. http://goo.gl/42hRL (2009)
-
(2009)
Defcon.org, Clobbering the Cloud
-
-
Meer, H.1
Arvanitis, N.2
Slaviero, M.3
-
32
-
-
84893520306
-
A quantitative study of forum spamming using context-based analysis
-
San Diego
-
Niu, Y., Chen, H., Hsu, F., Wang, Y. M., Ma, M.: A quantitative study of forum spamming using context-based analysis. In: Proceedings of the 2007 Network and Distributed System Security Symposium, NDSS'07, San Diego (2007)
-
(2007)
Proceedings of the 2007 Network and Distributed System Security Symposium, NDSS'07
-
-
Niu, Y.1
Chen, H.2
Hsu, F.3
Wang, Y.M.4
Ma, M.5
-
33
-
-
77952757644
-
Scalable verification for outsourced dynamic databases
-
Pang, H., Zhang, J., Mouratidis, K.: Scalable verification for outsourced dynamic databases. Proc. VLDB Endow. 2(1), 802-813 (2009)
-
(2009)
Proc. VLDB Endow.
, vol.2
, Issue.1
, pp. 802-813
-
-
Pang, H.1
Zhang, J.2
Mouratidis, K.3
-
34
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
Alexandria, ACM, New York
-
Petroni Jr., N. L., Hicks, M.: Automated detection of persistent kernel control-flow attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07, Alexandria, pp. 103-115. ACM, New York (2007). doi:10.1145/1315245.1315260
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07
, pp. 103-115
-
-
Petroni, N.L.1
Hicks, M.2
-
39
-
-
84894550652
-
Making middleboxes someone else's problem: Network processing as a cloud service
-
Helsinki, ACM, New York
-
Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else's problem: network processing as a cloud service. In: Proceedings of the 2012 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM'12, Helsinki, pp. 13-24. ACM, New York (2012). doi:10.1145/2342356.2342359
-
(2012)
Proceedings of the 2012 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM'12
, pp. 13-24
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
-
40
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
Chicago, ACM, New York
-
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., Lo Iacono, L.: All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW'11, Chicago, pp. 3-14. ACM, New York (2011). doi:10.1145/2046660.2046664
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW'11
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
42
-
-
77954565496
-
Nova: A microhypervisor-based secure virtualization architecture
-
Paris, ACM, New York
-
Steinberg, U., Kauer, B.: Nova: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys'10, Paris, pp. 209-222. ACM, New York (2010). doi:10.1145/1755913.1755935
-
(2010)
Proceedings of the 5th European Conference on Computer Systems, EuroSys'10
, pp. 209-222
-
-
Steinberg, U.1
Kauer, B.2
-
43
-
-
85084095302
-
The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns
-
Boston, USENIX Association, Berkeley
-
Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster's perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET'11, Boston, pp. 25-32. USENIX Association, Berkeley (2011)
-
(2011)
Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET'11
, pp. 25-32
-
-
Stone-Gross, B.1
Holz, T.2
Stringhini, G.3
Vigna, G.4
-
44
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
Chicago, ACM, New York
-
Szefer, J., Keller, E., Lee, R. B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11, Chicago, pp. 401-412. ACM, New York (2011). doi: 10.1145/2046707.2046754
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS'11
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
45
-
-
84858773328
-
Architectural support for hypervisor-secure virtualization
-
London, ACM, New York
-
Szefer, J., Lee, R. B.: Architectural support for hypervisor-secure virtualization. In: Proceedings of the 7th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS'12, London, pp. 437-450. ACM, New York (2012). doi:10.1145/2150976.2151022
-
(2012)
Proceedings of the 7th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS'12
, pp. 437-450
-
-
Szefer, J.1
Lee, R.B.2
-
46
-
-
85069458084
-
Splitting interfaces: Making trust between applications and operating systems configurable
-
Seattle, USENIX Association, Berkeley
-
Ta-Min, R., Litty, L., Lie, D.: Splitting interfaces: making trust between applications and operating systems configurable. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI'06, Seattle, pp. 279-292. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI'06
, pp. 279-292
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
-
47
-
-
48749129421
-
A framework for attack patterns' discovery in honeynet data
-
Thonnard, O., Dacier, M.: A framework for attack patterns' discovery in honeynet data. Digit. Investig. 5, S128-S139 (2008). doi:10.1016/j.diin. 2008.05.012
-
(2008)
Digit. Investig.
, vol.5
, pp. S128-S139
-
-
Thonnard, O.1
Dacier, M.2
-
49
-
-
84904088330
-
Automated Web patrol with strider HoneyMonkeys: Finding Web sites that exploit browser vulnerabilities
-
San Diego. The Internet Society, San Diego
-
Wang, Y. M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S. T.: Automated Web patrol with strider HoneyMonkeys: finding Web sites that exploit browser vulnerabilities. In: Proceedings of the 2006 Network and Distributed System Security Symposium, NDSS'06, San Diego. The Internet Society, San Diego (2006)
-
(2006)
Proceedings of the 2006 Network and Distributed System Security Symposium, NDSS'06
-
-
Wang, Y.M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
50
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor controlflow integrity
-
Oakland, IEEE Computer Society, Washington, DC
-
Wang, Z., Jiang, X.: Hypersafe: a lightweight approach to provide lifetime hypervisor controlflow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP'10, Oakland, pp. 380-395. IEEE Computer Society, Washington, DC (2010). doi:10.1109/SP. 2010.30
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP'10
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
51
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
Chicago, ACM, New York
-
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 1st ACM Workshop on Cloud Computing Security, CCSW'09, Chicago, pp. 91-96. ACM, New York (2009). doi:10.1145/1655008.1655021
-
(2009)
Proceedings of the 1st ACM Workshop on Cloud Computing Security, CCSW'09
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
52
-
-
84876932907
-
Cloaking and redirection: A preliminary study
-
Chiba, Chiba
-
Wu, B., Davison, B. D.: Cloaking and redirection: a preliminary study. In: Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb'05, Chiba, pp. 7-16. Chiba (2005)
-
(2005)
Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web, AIRWeb'05
, pp. 7-16
-
-
Wu, B.1
Davison, B.D.2
-
53
-
-
84864878546
-
Trusted computing challenges
-
Alexandria, ACM, New York
-
Van Doorn, L.: Trusted computing challenges. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC'07, Alexandria, pp. 1-1. ACM, New York (2007). doi: 10.1145/1314354.1314356
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC'07
, pp. 1-1
-
-
Van Doorn, L.1
-
54
-
-
77955007911
-
Socialclouds: Concept, security architecture and some mechanisms
-
Beijing, Springer, Berlin/Heidelberg
-
Xu, S., Yung, M.: Socialclouds: concept, security architecture and some mechanisms. In: Proceedings of the 1st International Conference on Trusted Systems, INTRUST'09, Beijing, pp. 104-128. Springer, Berlin/Heidelberg (2010). doi:10.1007/978-3-642-14597-1 7
-
(2010)
Proceedings of the 1st International Conference on Trusted Systems, INTRUST'09
, pp. 104-128
-
-
Xu, S.1
Yung, M.2
-
55
-
-
79952791500
-
Fair and dynamic proofs of retrievability
-
San Antonio, ACM, New York
-
Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY'11, San Antonio, pp. 237-248. ACM, New York (2011). doi:10.1145/1943513.1943546
-
(2011)
Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY'11
, pp. 237-248
-
-
Zheng, Q.1
Xu, S.2
-
56
-
-
84869744058
-
Efficient query integrity for outsourced dynamic databases
-
Raleigh, ACM, New York
-
Zheng, Q., Xu, S., Ateniese, G.: Efficient query integrity for outsourced dynamic databases. In: Proceedings of the 2012 ACMWorkshop on Cloud Computing SecurityWorkshop, CCSW'12, Raleigh, pp. 71-82. ACM, New York (2012). doi:10.1145/2381913.2381927
-
(2012)
Proceedings of the 2012 ACMWorkshop on Cloud Computing SecurityWorkshop, CCSW'12
, pp. 71-82
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
|