-
1
-
-
85019808720
-
-
VeriSign issues false Microsoft digital certificates, 23 March, IT World Canada, viewed 22 March 2016
-
B. Fonseca, VeriSign issues false Microsoft digital certificates, 23 March, IT World Canada, viewed 22 March 2016, 2001. http://www.itworldcanada.com/article/verisign-issues-false-microsoft-digital-certificates/30200.
-
(2001)
-
-
Fonseca, B.1
-
2
-
-
85019787849
-
Adobe code signing infrastructure hacked by ‘sophisticated threat actors’
-
27 September, ZDNet, viewed 9 March 2016
-
R. Naraine, Adobe code signing infrastructure hacked by ‘sophisticated threat actors’, 27 September, ZDNet, viewed 9 March 2016, 2012. http://www.zdnet.com/article/adobe-code-signing-infrastructure-hacked-by-sophisticated-threat-actors/.
-
(2012)
-
-
Naraine, R.1
-
3
-
-
84894178327
-
Digital certificates and malware: a dangerous mix
-
4 February, Malwarebytes LABS, viewed 9 March 2016
-
J. Segura, Digital certificates and malware: a dangerous mix, 4 February, Malwarebytes LABS, viewed 9 March 2016, 2013. https://blog.malwarebytes.org/intelligence/2013/02/digital-certificates-and-malware-a-dangerous-mix/.
-
(2013)
-
-
Segura, J.1
-
4
-
-
85019780557
-
VeriSign working to mitigate Stuxnet digital signature theft
-
21 July, The Tech Herald, viewed 9 March 2016
-
S. Ragan, VeriSign working to mitigate Stuxnet digital signature theft, 21 July, The Tech Herald, viewed 9 March 2016, 2010. http://www.thetechherald.com/articles/VeriSign-working-to-mitigate-Stuxnet-digital-signature-theft/10818/.
-
(2010)
-
-
Ragan, S.1
-
5
-
-
84914156123
-
Analyzing forged SSL certificates in the wild
-
L.-S. Huang, A. Rice, E. Ellingsen, C. Jackson, Analyzing forged SSL certificates in the wild, in: Proceedings of the IEEE Symposium on Security and Privacy, Washington, DC, USA, 2014, pp. 83–97.
-
(2014)
Proceedings of the IEEE Symposium on Security and Privacy, Washington, DC, USA
, pp. 83-97
-
-
Huang, L.-S.1
Rice, A.2
Ellingsen, E.3
Jackson, C.4
-
6
-
-
85001085799
-
Mitigating man-in-the-middle attacks on smartphones–a discussion of SSL pinning and DNSSec
-
V. Moonsamy, L. Batten, Mitigating man-in-the-middle attacks on smartphones–a discussion of SSL pinning and DNSSec, in: Proceedings of the Australian Information Security Management Conference, Perth, WA, 2014, pp. 5–13.
-
(2014)
Proceedings of the Australian Information Security Management Conference, Perth, WA
, pp. 5-13
-
-
Moonsamy, V.1
Batten, L.2
-
7
-
-
84889022608
-
Rethinking SSL development in an appified world
-
S. Fahl, M. Harbach, H. Perl, M. Koetter, M. Smith, Rethinking SSL development in an appified world, in: Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, NY, USA, 2013, pp. 49–60.
-
(2013)
Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, NY, USA
, pp. 49-60
-
-
Fahl, S.1
Harbach, M.2
Perl, H.3
Koetter, M.4
Smith, M.5
-
8
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, V. Shmatikov, The most dangerous code in the world: Validating SSL certificates in non-browser software, in: Proceedings of the ACM Conference on Computer & Communications Security, NY, USA, 2012, pp. 38–49.
-
(2012)
Proceedings of the ACM Conference on Computer & Communications Security, NY, USA
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
9
-
-
84962014059
-
Short: Danger is my middle name–experimenting with SSL vulnerabilities in android apps
-
in: NY, USA, Article 15
-
L. Onwuzurike, E. De Cristofaro, Short: Danger is my middle name–experimenting with SSL vulnerabilities in android apps, in: Proceedings of the ACM Conference on Security & Privacy in Wireless and Mobile Networks, NY, USA, 2015, Article 15.
-
(2015)
Proceedings of the ACM Conference on Security & Privacy in Wireless and Mobile Networks
-
-
Onwuzurike, L.1
De Cristofaro, E.2
-
10
-
-
84947232334
-
On the complexity of public-key certificate validation
-
D. Berbecaru, A. Lioy, M. Marian, On the complexity of public-key certificate validation, in: Proceeding of the Information Security Conference, ISC, Malaga, Spain, 2001, pp. 183–203.
-
(2001)
Proceeding of the Information Security Conference, ISC, Malaga, Spain
, pp. 183-203
-
-
Berbecaru, D.1
Lioy, A.2
Marian, M.3
-
11
-
-
85019775650
-
Solo Iranian hacker takes credit for Comodo certificate attack
-
27 March, Computerworld, viewed 13 March 2016
-
G. Keizer, Solo Iranian hacker takes credit for Comodo certificate attack, 27 March, Computerworld, viewed 13 March 2016, 2011. http://www.computerworld.com/article/2507258/security0/solo-iranian-hacker-takes-credit-for-comodo-certificate-attack.html.
-
(2011)
-
-
Keizer, G.1
-
12
-
-
84963613034
-
Forensic taxonomy of popular Android mHealth apps
-
A. Azfar, K.-K.R. Choo, L. Liu, Forensic taxonomy of popular Android mHealth apps, in: Proceedings of the Americas Conference on Information Systems, Puerto Rico, 2015.
-
(2015)
Proceedings of the Americas Conference on Information Systems, Puerto Rico
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
13
-
-
84942364406
-
A taxonomy of mHealth apps–security and privacy concerns
-
M. Plachkinova, S. Andrés, S. Chatterjee, A taxonomy of mHealth apps–security and privacy concerns, in: Proceedings of the Hawaii International Conference on System Sciences, HICSS, Kauai, HI, USA, 2015, pp. 3187–3196.
-
(2015)
Proceedings of the Hawaii International Conference on System Sciences, HICSS, Kauai, HI, USA
, pp. 3187-3196
-
-
Plachkinova, M.1
Andrés, S.2
Chatterjee, S.3
-
14
-
-
85019827840
-
-
Uber's App is Anything but Malware, 10 December, BETTER, viewed 10 March 2016
-
W. Clark, Uber's App is Anything but Malware, 10 December, BETTER, viewed 10 March 2016, 2014. http://better.mobi/2014/12/10/ubers-app-is-anything-but-malware/.
-
(2014)
-
-
Clark, W.1
-
15
-
-
85019780827
-
Defeat SSL Certificate Validation for Google Android Applications
-
McAfee, viewed 16 March 2016
-
N. Rudrappa, Defeat SSL Certificate Validation for Google Android Applications, McAfee, viewed 16 March 2016, 2013. http://www.mcafee.com/us/resources/white-papers/wp-defeating-ssl-cert-validation.pdf.
-
(2013)
-
-
Rudrappa, N.1
-
16
-
-
85019780954
-
-
Bypassing SSL Pinning on Android via Reverse Engineering, Security-assessment.com, viewed 16 March 2016
-
D. Andzakovic, Bypassing SSL Pinning on Android via Reverse Engineering, Security-assessment.com, viewed 16 March 2016, 2014. http://security-assessment.com/files/documents/whitepapers/Bypassing%20SSL%20Pinning%20on%20Android%20via%20Reverse%20Engineering.pdf.
-
(2014)
-
-
Andzakovic, D.1
-
17
-
-
85019817426
-
Defending your android app
-
F. Sierra, A. Ramirez, Defending your android app, in: Proceedings of the ACM Conference on Research in Information Technology, NY, USA, 2015, pp. 29–34.
-
(2015)
Proceedings of the ACM Conference on Research in Information Technology, NY, USA
, pp. 29-34
-
-
Sierra, F.1
Ramirez, A.2
-
18
-
-
85019798591
-
-
Bypass OpenSSL Certificate Pinning on iOS, 7 January, NCC Group, viewed 15 March 2016
-
D. Mayer, Bypass OpenSSL Certificate Pinning on iOS, 7 January, NCC Group, viewed 15 March 2016, 2015. https://www.nccgroup.trust/globalassets/newsroom/us/blog/documents/2015/01/bypassing_openssl_pinning.pdf.
-
(2015)
-
-
Mayer, D.1
-
19
-
-
84865586926
-
Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties
-
I. Dacosta, M. Ahamad, P. Traynor, Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties, in: Proceedings of the European Symposium on Research in Computer Security, Pisa, Italy, 2012, pp. 199–216.
-
(2012)
Proceedings of the European Symposium on Research in Computer Security, Pisa, Italy
, pp. 199-216
-
-
Dacosta, I.1
Ahamad, M.2
Traynor, P.3
-
20
-
-
84910629417
-
Securing SSL certificate verification through dynamic linking
-
A. Bates, J. Pletcher, T. Nichols, B. Hollembaek, D. Tian, K.R.B. Butler, A. Alkhelaifi, Securing SSL certificate verification through dynamic linking, in: Proceedings of the ACM Conference on Computer & Communications Security, NY, USA, 2014, pp. 394–405.
-
(2014)
Proceedings of the ACM Conference on Computer & Communications Security, NY, USA
, pp. 394-405
-
-
Bates, A.1
Pletcher, J.2
Nichols, T.3
Hollembaek, B.4
Tian, D.5
Butler, K.R.B.6
Alkhelaifi, A.7
-
21
-
-
84881218966
-
-
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, pp.
-
J. Clark, P.C. Van Oorschot, SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, 2013, pp. 511–525.
-
(2013)
, pp. 511-525
-
-
Clark, J.1
Van Oorschot, P.C.2
-
22
-
-
84914109052
-
Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations
-
C. Brubaker, S. Jana, B. Ray, S. Khurshid, V. Shmatikov, Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations, in: Proceedings of the IEEE Symposium on Security and Privacy, Washington, DC, USA, 2014, pp. 114–129.
-
(2014)
Proceedings of the IEEE Symposium on Security and Privacy, Washington, DC, USA
, pp. 114-129
-
-
Brubaker, C.1
Jana, S.2
Ray, B.3
Khurshid, S.4
Shmatikov, V.5
-
23
-
-
84869487159
-
Why Eve and Mallory love android: An analysis of android SSL (In)security
-
S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, B. Freisleben, Why Eve and Mallory love android: An analysis of android SSL (In)security, in: Proceedings of the ACM Conference on Computer and Communications Security, NY, USA, 2014, pp. 50–61.
-
(2014)
Proceedings of the ACM Conference on Computer and Communications Security, NY, USA
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Baumgärtner, L.5
Freisleben, B.6
-
24
-
-
85019825099
-
Mobile SSL failures
-
T. Trummer, T. Dalvi, Mobile SSL failures, in: Blackhat Mobile Security Summit, London, UK, 2015.
-
(2015)
Blackhat Mobile Security Summit, London, UK
-
-
Trummer, T.1
Dalvi, T.2
-
25
-
-
84952030369
-
A comparison of static, dynamic, and hybrid analysis for malware detection
-
Damodaran, A., Di Tropia, F., Visaggio, C.A., Austin, T.H., Stamp, M., A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comput. Virol. Hacking Tech., 2015, 1–12.
-
(2015)
J. Comput. Virol. Hacking Tech.
, pp. 1-12
-
-
Damodaran, A.1
Di Tropia, F.2
Visaggio, C.A.3
Austin, T.H.4
Stamp, M.5
-
26
-
-
84960933928
-
Employing program semantics for Malware detection
-
Naval, S., Laxmi, V., Rajarajan, M., Gaur, M.S., Conti, M., Employing program semantics for Malware detection. IEEE Trans. Inf. Forensics Secur., 10(12), 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.12
-
-
Naval, S.1
Laxmi, V.2
Rajarajan, M.3
Gaur, M.S.4
Conti, M.5
-
27
-
-
84961351749
-
Malicious sequential pattern mining for automatic malware detection
-
Fan, Y., Ye, Y., Chen, L., Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52 (2016), 16–25, 10.1016/j.eswa.2016.01.002.
-
(2016)
Expert Syst. Appl.
, vol.52
, pp. 16-25
-
-
Fan, Y.1
Ye, Y.2
Chen, L.3
-
28
-
-
84975230776
-
A probabilistic discriminative model for Android Malware detection with decompiled source code
-
Cen, L., Gates, C.S., Si, L., Li, N., A probabilistic discriminative model for Android Malware detection with decompiled source code. IEEE Trans. Dependable Secure Comput. 12:4 (2015), 400–412.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.12
, Issue.4
, pp. 400-412
-
-
Cen, L.1
Gates, C.S.2
Si, L.3
Li, N.4
-
29
-
-
85019824808
-
-
Revealed: how US and UK spy agencies defeat Internet privacy and security, 6 September, The Guardian, viewed 25 July 2016
-
J. Ball, J. Borger, G. Greenwald, Revealed: how US and UK spy agencies defeat Internet privacy and security, 6 September, The Guardian, viewed 25 July 2016, 2013. https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
-
(2013)
-
-
Ball, J.1
Borger, J.2
Greenwald, G.3
-
30
-
-
85019802055
-
-
Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment, 9 February, PC World, viewed 25 July 2016
-
L. Constantin, Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment, 9 February, PC World, viewed 25 July 2016, 2012. http://www.pcworld.idg.com.au/article/414755/trustwave_admits_issuing_man-in-the-middle_digital_certificate_mozilla_debates_punishment/.
-
(2012)
-
-
Constantin, L.1
-
31
-
-
85019817355
-
-
Managing SSL/TLS Traffic Flows, viewed 25 July 2016
-
Cisco Systems, Inc., Managing SSL/TLS Traffic Flows, viewed 25 July 2016, 2013. http://www.cisco.com/c/en/us/td/docs/security/asacx/9-1/user/guide/b_User_Guide_for_ASA_CX_and_PRSM_9_1/b_User_Guide_for_ASA_CX_and_PRSM_9_1_chapter_01101.pdf.
-
(2013)
-
-
Cisco Systems, Inc.,1
-
32
-
-
85019819820
-
-
IBM Security QRadar Incident Forensics, viewed 25 July 2016
-
IBM Corporation, IBM Security QRadar Incident Forensics, viewed 25 July 2016, 2014. http://www-03.ibm.com/software/products/en/qradar-incident-forensics.
-
(2014)
-
-
Corporation, I.B.M.1
-
33
-
-
84979828898
-
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
-
Wu, J., Ota, K., Dong, M., Li, C., A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4 (2016), 416–424.
-
(2016)
IEEE Access
, vol.4
, pp. 416-424
-
-
Wu, J.1
Ota, K.2
Dong, M.3
Li, C.4
-
34
-
-
84953364314
-
NetSecCC: A scalable and fault-tolerant architecture for cloud computing security
-
He, J., Dong, M., Ota, K., Fan, M., Wang, G., NetSecCC: A scalable and fault-tolerant architecture for cloud computing security. Peer-to-Peer Netw. Appl. 9:1 (2016), 67–81.
-
(2016)
Peer-to-Peer Netw. Appl.
, vol.9
, Issue.1
, pp. 67-81
-
-
He, J.1
Dong, M.2
Ota, K.3
Fan, M.4
Wang, G.5
-
35
-
-
84937692362
-
Identity-based signcryption from lattices
-
Yan, J., Wang, L., Dong, M., Yang, Y., Yao, W., Identity-based signcryption from lattices. Secur. Commun. Netw. 8:18 (2015), 3751–3770.
-
(2015)
Secur. Commun. Netw.
, vol.8
, Issue.18
, pp. 3751-3770
-
-
Yan, J.1
Wang, L.2
Dong, M.3
Yang, Y.4
Yao, W.5
-
36
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K.-K.R., The cyber threat landscape: Challenges and future research directions. Comput. Secur. 30:8 (2011), 719–731.
-
(2011)
Comput. Secur.
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
37
-
-
84905834871
-
A conceptual interdisciplinary plug-and-play cyber security framework
-
H. Kaur X. Tao Springer New York, USA
-
Choo, K.-K.R., A conceptual interdisciplinary plug-and-play cyber security framework. Kaur, H., Tao, X., (eds.) ICTs and the Millennium Development Goals–A United Nations Perspective, 2014, Springer, New York, USA, 81–99.
-
(2014)
ICTs and the Millennium Development Goals–A United Nations Perspective
, pp. 81-99
-
-
Choo, K.-K.R.1
-
38
-
-
85020892568
-
Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study
-
(in press)
-
Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, M.H., Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurr. Comput.: Pract. Exper., 2016, 10.1002/cpe.3855 (in press).
-
(2016)
Concurr. Comput.: Pract. Exper.
-
-
Cahyani, N.D.W.1
Martini, B.2
Choo, K.-K.R.3
Al-Azhar, M.H.4
-
39
-
-
85018406878
-
Data exfiltration from Internet of things devices: iOS devices as case studies
-
(in press)
-
D'Orazio, C.J., Choo, K.-K.R., Yang, L.T., Data exfiltration from Internet of things devices: iOS devices as case studies. IEEE Internet Things J., 2016, 10.1109/JIOT.2016.2569094 (in press).
-
(2016)
IEEE Internet Things J.
-
-
D'Orazio, C.J.1
Choo, K.-K.R.2
Yang, L.T.3
-
40
-
-
84971378672
-
Is the data on your wearable device secure? An Android wear smartwatch case study
-
(in press)
-
Do, Q., Martini, B., Choo, K.-K.R., Is the data on your wearable device secure? An Android wear smartwatch case study. Softw.: Pract. Exp., 2016, 10.1002/spe.2414 (in press).
-
(2016)
Softw.: Pract. Exp.
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
41
-
-
84933063177
-
-
Vetting the Security of Mobile Applications, NIST Special Publication 800-163, viewed 17 March 2016
-
S. Quirolgico, J. Voas, T. Karygiannis, C. Michael, K. Scarfone, Vetting the Security of Mobile Applications, NIST Special Publication 800-163, viewed 17 March 2016, 2015. http://dx.doi.org/10.6028/NIST.SP.800-163.
-
(2015)
-
-
Quirolgico, S.1
Voas, J.2
Karygiannis, T.3
Michael, C.4
Scarfone, K.5
|