-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sept.
-
M. Abadi, M. Burrows, B. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, Sept. 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.D.4
-
2
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
Alexandria, VA, Oct.
-
A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In 15th ACM Conference on Computer and Communications Security (CCS '08), Alexandria, VA, Oct. 2008.
-
(2008)
15th ACM Conference on Computer and Communications Security (CCS '08)
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
4
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
Vancouver, B.C., Aug.
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In 15th Usenix Security Symposium, Vancouver, B.C., Aug. 2006.
-
(2006)
15th Usenix Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
6
-
-
80755167433
-
-
Technical Report TR-2011-04, Technische Universität Darmstadt, Apr.
-
S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. XManDroid: A new Android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Universität Darmstadt, Apr. 2011. http://www.trust.informatik.tu-darmstadt.de/fileadmin/ user_upload/Group_TRUST/PubsPDF/xmandroid.pdf.
-
(2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.-R.5
-
7
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, 2002.
-
(2002)
ACM Transactions on Computer Systems (TOCS)
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
9
-
-
79961035117
-
Analyzing inter-application communication in Android
-
June
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), June 2011.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011)
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
10
-
-
84856178855
-
CRePE: Context-related policy enforcement for Android
-
Boca Raton, FL, Oct.
-
M. Conti, V. T. N. Nguyen, and B. Crispo. CRePE: Context-related policy enforcement for Android. In Proceedings of the Thirteen Information Security Conference (ISC '10), Boca Raton, FL, Oct. 2010.
-
(2010)
Proceedings of the Thirteen Information Security Conference (ISC '10)
-
-
Conti, M.1
Nguyen, V.T.N.2
Crispo, B.3
-
12
-
-
43049166949
-
Securityby-contract on the.NET platform
-
L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens, I. Siahaan, and D. Vanoverberghe. Securityby-contract on the.NET platform. Information Security Technical Report, 13(1):25-32, 2008.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.1
, pp. 25-32
-
-
Desmet, L.1
Joosen, W.2
Massacci, F.3
Philippaerts, P.4
Piessens, F.5
Siahaan, I.6
Vanoverberghe, D.7
-
13
-
-
85076889619
-
An informationflow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, C. Byung-gon, L. P. Cox, J. Jung, P. McDaniel, and S. A. N. TaintDroid: An informationflow tracking system for realtime privacy monitoring on smartphones. In Proceeding of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10), pages 393-408, 2010.
-
(2010)
Proceeding of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10)
, pp. 393-408
-
-
Enck, W.1
Gilbert, P.2
Byung-Gon, C.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
TaintDroid, S.A.N.7
-
14
-
-
74049155830
-
On lightweight mobile phone application certification
-
Chicago, IL, Nov.
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In 16th ACM Conference on Computer and Communications Security (CCS '09), Chicago, IL, Nov. 2009.
-
(2009)
16th ACM Conference on Computer and Communications Security (CCS '09)
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
15
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
San Fansisco, CA, Aug.
-
A. P. Felt, H. J. Wang, A. Moshchuck, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In 20th Usenix Security Symposium, San Fansisco, CA, Aug. 2011.
-
(2011)
20th Usenix Security Symposium
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuck, A.3
Hanna, S.4
Chin, E.5
-
16
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY, Oct.
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th Symposium on Operating System Principles (SOSP '03), Bolton Landing, NY, Oct. 2003.
-
(2003)
Proceedings of the 19th Symposium on Operating System Principles (SOSP '03)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
18
-
-
0024089972
-
The confused deputy
-
Oct.
-
N. Hardy. The confused deputy. ACM Operating Systems Review, 22(4):36-38, Oct. 1988.
-
(1988)
ACM Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
19
-
-
84856138620
-
MashupOS: Operating system abstractions for client mashups
-
J. Howell, C. Jackson, H. J. Wang, and X. Fan. MashupOS: Operating system abstractions for client mashups. In Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HotOS '07), pages 1-7, 2007.
-
(2007)
Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HotOS '07)
, pp. 1-7
-
-
Howell, J.1
Jackson, C.2
Wang, H.J.3
Fan, X.4
-
21
-
-
0006595839
-
Message authentication with md5
-
B. Kaliski and M. Robshaw. Message authentication with md5. CryptoBytes, 1:5-8, 1995.
-
(1995)
CryptoBytes
, vol.1
, pp. 5-8
-
-
Kaliski, B.1
Robshaw, M.2
-
23
-
-
79951908511
-
DEFCON: High-performance event processing with information security
-
Boston, MA, June
-
M. Migliavacca, I. Papagiannis, D. M. Eyers, B. Shand, J. Bacon, and P. Pietzuch. DEFCON: High-performance event processing with information security. In Proceedings of the 2010 USENIX Annual Technical Conference, Boston, MA, June 2010.
-
(2010)
Proceedings of the 2010 USENIX Annual Technical Conference
-
-
Migliavacca, M.1
Papagiannis, I.2
Eyers, D.M.3
Shand, B.4
Bacon, J.5
Pietzuch, P.6
-
25
-
-
0031543270
-
A decentralized model for information flow control
-
A. C. Myers and B. Liskov. A decentralized model for information flow control. ACM SIGOPS Operating Systems Review, 31(5):129-142, 1997.
-
(1997)
ACM SIGOPS Operating Systems Review
, vol.31
, Issue.5
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
26
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
Oakland, California, May
-
A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 186-197, Oakland, California, May 1998.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
28
-
-
77954487766
-
Apex: Extending Android permission model and enforcement with userdefined runtime constraints
-
M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android permission model and enforcement with userdefined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 328-332, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
29
-
-
77950851532
-
Semantically rich application-centric security in Android
-
Honolulu, HI, Dec.
-
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in Android. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), Honolulu, HI, Dec. 2009.
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09)
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
30
-
-
78751498804
-
Paranoid Android: Zero-day protection for smartphones using the cloud
-
Austin, TX, Dec.
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: Zero-day protection for smartphones using the cloud. In Annual Computer Security Applications Conference (ACSAC '10), Austin, TX, Dec. 2010.
-
(2010)
Annual Computer Security Applications Conference (ACSAC '10)
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
31
-
-
69149107997
-
Browser security: Lessons from Google Chrome
-
C. Reis, A. Barth, and C. Pizano. Browser security: Lessons from Google Chrome. Communications of the ACM, 52(8):45-49, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.8
, pp. 45-49
-
-
Reis, C.1
Barth, A.2
Pizano, C.3
-
32
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
33
-
-
37049002830
-
Labels and event processes in the Asbestos operating system
-
Dec.
-
S. VanDeBogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D. Mazières. Labels and event processes in the Asbestos operating system. ACM Transactions on Computer Systems (TOCS), 25(4), Dec. 2007.
-
(2007)
ACM Transactions on Computer Systems (TOCS)
, vol.25
, Issue.4
-
-
VanDeBogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazières, D.9
-
35
-
-
0039334688
-
The security architecture formerly known as stack inspection: A security mechanism for language-based systems
-
Oct.
-
D. S. Wallach, E. W. Felten, and A. W. Appel. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4):341-378, Oct. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Felten, E.W.2
Appel, A.W.3
-
36
-
-
77954608267
-
The multi-principal OS construction of the Gazelle web browser
-
H. J.Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal OS construction of the Gazelle web browser. In Proceedings of the 18th USENIX Security Symposium, 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
37
-
-
49249112788
-
Remote client authentication
-
July
-
T. Weigold, T. Kramp, and M. Baentsch. Remote client authentication. IEEE Security & Privacy, 6(4):36-43, July 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.4
, pp. 36-43
-
-
Weigold, T.1
Kramp, T.2
Baentsch, M.3
-
38
-
-
0028380781
-
Authentication in the Taos operating system
-
E.Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems (TOCS), 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems (TOCS)
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
39
-
-
85094632142
-
Securing distributed systems with information flow control
-
San Francisco, CA, Apr.
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI '08), San Francisco, CA, Apr. 2008.
-
(2008)
Proceedings of the 5th Symposium on Networked Systems Design and Implementation (NSDI '08)
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
|