14. CCS 2007:
Alexandria,
VA,
USA
Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson (Eds.):
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007.
ACM 2007, ISBN 978-1-59593-703-2
Web applications security
Authentication and passwords
Anonymity
Operating systems and malware
Traffic analysis and location privacy
Cryptography
Network security
- Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Darrell Whitley:
Optimal security hardening using multi-objective optimization on attack tree models of networks.
204-213
- David John Zage, Cristina Nita-Rotaru:
On the accuracy of decentralized virtual coordinate systems in adversarial networks.
214-224
- Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:
Analyzing the vulnerability of superpeer networks against attack.
225-234
- Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter:
Towards automated provisioning of secure virtualized networks.
235-245
Election systems and applied cryptography
Side and covert channels detection
Protocols and spam filters
Internet security
- Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl T. Barr, Rich East:
ConceptDoppler: a weather tracker for internet censorship.
352-365
- Jeremy Elson, John R. Douceur, Jon Howell, Jared Saul:
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization.
366-374
- Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage:
An inquiry into the nature and causes of the wealth of internet miscreants.
375-388
Key management
Policies
- Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from dns rebinding attacks.
421-431
- Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek:
Alpaca: extensible authorization for distributed services.
432-444
- Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman:
Efficient policy analysis for administrative role based access control.
445-455
Cryptography and cryptoanalysis
Data privacy
- Paul Bunn, Rafail Ostrovsky:
Secure two-party k-means clustering.
486-497
- Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel:
Privacy-preserving remote diagnostics.
498-507
- Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
508-518
- Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik:
Privacy preserving error resilient dna searching through oblivious automata.
519-528
Software security
- Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller:
Predicting vulnerable software components.
529-540
- Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode.
541-551
- Hovav Shacham:
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
552-561
- Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
562-572
Data disclosure
Copyright © Sun Mar 14 22:57:22 2010
by Michael Ley (ley@uni-trier.de)