15. CCS 2008:
Alexandria,
VA,
USA
Peng Ning, Paul F. Syverson, Somesh Jha (Eds.):
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008.
ACM 2008, ISBN 978-1-59593-810-7
Keynote address
Attacks 1
- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion.
3-14
- Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices.
15-26
- Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage:
When good instructions go bad: generalizing return-oriented programming to RISC.
27-38
Software security 1
Browser security
Formal methods 1
Privacy 1
Software security 2
Network security
System security 1
- Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode:
Enforcing authorization policies using transactional memory introspection.
223-234
- Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates.
235-244
- Rui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li:
Towards automatic reverse engineering of software security configurations.
245-256
Privacy 2
Access control
Anonymity
Formal methods 2
- Michael Backes, Catalin Hritcu, Matteo Maffei:
Type-checking zero-knowledge.
357-370
- Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Towards automated proofs for asymmetric encryption schemes in the random oracle model.
371-380
- Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani, G. Ramalingam, Lakshmisubrahmanyam Velaga:
EON: modeling and analyzing dynamic access control systems with logic programs.
381-390
System security 2
Identity-based encryption
Applied cryptography 1
Device security
Applied cryptography 2
Attacks 2
Copyright © Sun Mar 14 22:57:22 2010
by Michael Ley (ley@uni-trier.de)