15. CCS 2008:
Alexandria,
VA,
USA
Peng Ning, Paul F. Syverson, Somesh Jha (Eds.):
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008.
ACM 2008, ISBN 978-1-59593-810-7 BibTeX
Keynote address
Attacks 1
- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion.
3-14
Electronic Edition (ACM DL) BibTeX
- Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices.
15-26
Electronic Edition (ACM DL) BibTeX
- Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage:
When good instructions go bad: generalizing return-oriented programming to RISC.
27-38
Electronic Edition (ACM DL) BibTeX
Software security 1
Browser security
Formal methods 1
Privacy 1
Software security 2
Network security
System security 1
- Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode:
Enforcing authorization policies using transactional memory introspection.
223-234
Electronic Edition (ACM DL) BibTeX
- Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates.
235-244
Electronic Edition (ACM DL) BibTeX
- Rui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li:
Towards automatic reverse engineering of software security configurations.
245-256
Electronic Edition (ACM DL) BibTeX
Privacy 2
Access control
Anonymity
Formal methods 2
- Michael Backes, Catalin Hritcu, Matteo Maffei:
Type-checking zero-knowledge.
357-370
Electronic Edition (ACM DL) BibTeX
- Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Towards automated proofs for asymmetric encryption schemes in the random oracle model.
371-380
Electronic Edition (ACM DL) BibTeX
- Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani, G. Ramalingam, Lakshmisubrahmanyam Velaga:
EON: modeling and analyzing dynamic access control systems with logic programs.
381-390
Electronic Edition (ACM DL) BibTeX
System security 2
Identity-based encryption
Applied cryptography 1
Device security
Applied cryptography 2
Attacks 2
Copyright © Sat May 16 23:00:54 2009
by Michael Ley (ley@uni-trier.de)