186 papers:
CASE-2015-WuDZW #detection- Kalman filter based DNS cache poisoning attack detection (HW, XD, LZ, LW), pp. 1594–1600.
DAC-2015-AgostaBPS #information management- Information leakage chaff: feeding red herrings to side channel attackers (GA, AB, GP, MS), p. 6.
DAC-2015-JangPGB #self- Self-correcting STTRAM under magnetic field attacks (JWJ, JP, SG, SB), p. 6.
DAC-2015-LiuZWYX #analysis #difference #encryption #fault #named- DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
DAC-2015-MiuraFNHHA #concept- EM attack sensor: concept, circuit, and design-automation methodology (NM, DF, MN, NH, YiH, TA), p. 6.
DAC-2015-YuUK- Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks (WY, OAU, SK), p. 6.
DATE-2015-BanciuOW #information management #reliability- Reliable information extraction for single trace attacks (VB, EO, CW), pp. 133–138.
DATE-2015-JovanovicP #product line- Fault-based attacks on the Bel-T block cipher family (PJ, IP), pp. 601–604.
DATE-2015-NguyenSCM #performance #robust #set- Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set (PHN, DPS, RSC, DM), pp. 641–646.
DATE-2015-PozoSKM #question- Side-channel attacks from static power: when should we care? (SMDP, FXS, DK, AM), pp. 145–150.
DATE-2015-VijayakumarK #design #modelling #novel- A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics (AV, SK), pp. 653–658.
ESOP-2015-CalzavaraBCS #detection #fine-grained- Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
ICEIS-v2-2015-CavallariAT #aspect-oriented #mobile- Organisational Aspects and Anatomy of an Attack on NFC/HCE Mobile Payment Systems (MC, LA, FT), pp. 685–700.
RecSys-2015-SeminarioW #collaboration #recommendation- Nuke ’Em Till They Go: Investigating Power User Attacks to Disparage Items in Collaborative Recommenders (CES, DCW), pp. 293–296.
SAC-2015-OliveiraLV #framework #performance #security #web #web service- Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
SAC-2015-XiongN #estimation #low cost #power management- Cost-efficient and attack-resilient approaches for state estimation in power grids (KX, PN), pp. 2192–2197.
ESEC-FSE-2015-Theisen #approximate #automation- Automated attack surface approximation (CT), pp. 1063–1065.
ICSE-v2-2015-TheisenHMMW #approximate #stack- Approximating Attack Surfaces with Stack Traces (CT, KH, PM, BM, LAW), pp. 199–208.
ASPLOS-2015-ColpZGSLRSW #memory management #smarttech- Protecting Data on Smartphones and Tablets from Memory Attacks (PC, JZ, JG, SS, EdL, HR, SS, AW), pp. 177–189.
ICST-2015-AppeltNB #injection #question #sql- Behind an Application Firewall, Are We Safe from SQL Injection Attacks? (DA, CDN, LCB), pp. 1–10.
ISSTA-2015-XueWLXSC #behaviour #classification #detection #javascript #modelling- Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
DAC-2014-VaidyanathanDP #detection #reliability #stack #using- Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DAC-2014-WasicekDL #aspect-oriented #cyber-physical #modelling- Aspect-oriented Modeling of Attacks in Automotive Cyber-Physical Systems (AW, PD, EAL), p. 6.
DATE-2014-DelvauxV- Key-recovery attacks on various RO PUF constructions via helper data manipulation (JD, IV), pp. 1–6.
DATE-2014-DijkR #protocol- Protocol attacks on advanced PUF protocols and countermeasures (MvD, UR), pp. 1–6.
DATE-2014-IvanovPL- Attack-resilient sensor fusion (RI, MP, IL), pp. 1–6.
DATE-2014-LiuW #configuration management #design #embedded #logic #obfuscation- Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks (BL, BW), pp. 1–6.
DATE-2014-PapadimitriouHBML #clustering #fault #injection #modelling #multi #towards- A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks (AP, DH, VB, PM, RL), pp. 1–4.
DATE-2014-RuhrmairS #bibliography #modelling #perspective- PUF modeling attacks: An introduction and overview (UR, JS), pp. 1–6.
DATE-2014-RuhrmairSB #how- Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks (UR, US, WB), pp. 1–4.
DATE-2014-XuB #hybrid #question- Hybrid side-channel/machine-learning attacks on PUFs: A new threat? (XX, WB), pp. 1–6.
TACAS-2014-EldibWS #smt #verification- SMT-Based Verification of Software Countermeasures against Side-Channel Attacks (HE, CW, PS), pp. 62–77.
STOC-2014-GenkinIPST- Circuits resilient to additive attacks with applications to secure computation (DG, YI, MP, AS, ET), pp. 495–504.
FM-2014-WenMM #analysis #formal method #information management #towards- Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
ICPR-2014-GuptaBVS #on the #using- On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
KDD-2014-ChiaS #mining #predict #scalability- Scalable noise mining in long-term electrocardiographic time-series to predict death following heart attacks (CCC, ZS), pp. 125–134.
RecSys-2014-SeminarioW #recommendation- Attacking item-based recommender systems with power items (CES, DCW), pp. 57–64.
SEKE-2014-ZhuangZL #fine-grained #framework #layout #reuse #runtime- Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization (YZ, TZ, ZL), pp. 609–614.
SIGIR-2014-ZhouKWAD #detection #recommendation- Detection of abnormal profiles on group attacks in recommender systems (WZ, YSK, JW, SA, GD), pp. 955–958.
SAC-2014-JunAK #detection #using- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
HPCA-2014-ElwellRAP #architecture #memory management- A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks (JE, RR, NBAG, DP), pp. 201–212.
CAV-2014-EldibW #synthesis- Synthesis of Masking Countermeasures against Side Channel Attacks (HE, CW), pp. 114–130.
SAT-2014-KonevL #satisfiability- A SAT Attack on the Erdős Discrepancy Conjecture (BK, AL), pp. 219–226.
DAC-2013-ChandrikakuttyUTW #hardware #monitoring #network- High-performance hardware monitors to protect network processors from data plane attacks (HC, DU, RT, TW), p. 6.
DAC-2013-WangYRNZMMB #design #grid #power management- Role of power grid in side channel attack and power-grid-aware secure design (XW, WY, DBR, SN, YZ, SM, DM, SB), p. 9.
DATE-2013-BayrakVRNBI- An EDA-friendly protection scheme against side-channel attacks (AGB, NV, FR, DN, PB, PI), pp. 410–415.
DATE-2013-TheissingMSSS #analysis #fault- Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
ITiCSE-2013-TrabelsiA #education #generative #network #using- Using network packet generators and snort rules for teaching denial of service attacks (ZT, LA), pp. 285–290.
ICPC-2013-BasileC #towards- Towards a unified software attack model to assess software protections (CB, MC), pp. 219–222.
RecSys-2013-Seminario #collaboration #recommendation #robust- Accuracy and robustness impacts of power user attacks on collaborative recommender systems (CES), pp. 447–450.
RecSys-2013-WilsonS #collaboration #recommendation- When power users attack: assessing impacts in collaborative recommender systems (DCW, CES), pp. 427–430.
SEKE-2013-YuFCL #in the cloud #modelling- Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
SAC-2013-VukovicD #distributed #estimation #on the #security- On the security of distributed power system state estimation under targeted attacks (OV, GD), pp. 666–672.
ASPLOS-2013-CheckowayS #api #why- Iago attacks: why the system call API is a bad untrusted RPC interface (SC, HS), pp. 253–264.
HPCA-2013-KayaalpSNPA #architecture #named #reuse- SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
HPCA-2013-XiaLC #architecture #physics #virtual machine- Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks (YX, YL, HC), pp. 246–257.
LICS-2013-Comon-Lundh #logic #modelling #named #problem #security- LICS: Logic in Computer Security — Some Attacker’s Models and Related Decision Problems (HCL), p. 1.
ASE-2012-BartelKTM #android #automation- Automatically securing permission-based software by reducing the attack surface: an application to Android (AB, JK, YLT, MM), pp. 274–277.
HT-2012-KlienS #analysis #network- Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
FASE-2012-EckhardtMAMW- Stable Availability under Denial of Service Attacks through Formal Patterns (JE, TM, MA, JM, MW), pp. 78–93.
CHI-2012-ShiraziMKS #authentication #gesture- Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks (ASS, PM, HK, AS), pp. 2045–2048.
CIKM-2012-LiYHCS #mvc #network #robust- Measuring robustness of complex networks under MVC attack (RHL, JXY, XH, HC, ZS), pp. 1512–1516.
ICML-2012-BiggioNL- Poisoning Attacks against Support Vector Machines (BB, BN, PL), p. 190.
ICML-2012-ShterevD- Bayesian Watermark Attacks (IS, DBD), p. 153.
KDD-2012-WuWCT #detection #hybrid #named #recommendation- HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
KR-2012-Coste-MarquisKMO #framework- Weighted Attacks in Argumentation Frameworks (SCM, SK, PM, MAO).
POPL-2012-RayL #injection- Defining code-injection attacks (DR, JL), pp. 179–190.
SAC-2012-GreyRS #automation- Automatic creation of VPN backup paths for improved resilience against BGP-attackers (MG, MR, GS), pp. 613–620.
QoSA-ISARCS-2011-ArissX #modelling #security- Modeling security attacks with statecharts (OeA, DX), pp. 123–132.
DATE-2011-AliCMB #encryption #hardware #multi #security- Multi-level attacks: An emerging security concern for cryptographic hardware (SA, RSC, DM, SB), pp. 1176–1179.
DATE-2011-MedwedM #detection #fault #logic- Arithmetic logic units with high error detection rates to counteract fault attacks (MM, SM), pp. 1644–1649.
DATE-2011-MeynardRFGHD- Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques (OM, DR, FF, SG, NH, JLD), pp. 1004–1009.
FoSSaCS-2011-BorealePP #information management- Asymptotic Information Leakage under One-Try Attacks (MB, FP, MP), pp. 396–410.
KDD-2011-Cormode #learning #privacy- Personal privacy vs population privacy: learning to attack anonymization (GC), pp. 1253–1261.
KDD-2011-TaiYYC #network #privacy #social- Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
RecSys-2011-WuCMW #detection #learning #named- Semi-SAD: applying semi-supervised learning to shilling attack detection (ZW, JC, BM, YW), pp. 289–292.
SAC-2011-CederquistD #complexity #constraints- Complexity of fairness constraints for the Dolev-Yao attacker model (JC, MTD), pp. 1502–1509.
SAC-2011-FuPT #clustering #distributed #framework #named- CluB: a cluster based framework for mitigating distributed denial of service attacks (ZF, MP, PT), pp. 520–527.
SAC-2011-JinL #performance- Efficient traitor tracing for clone attack in content protection (HJ, JBL), pp. 1544–1549.
SAC-2011-JohnsBSP #reliability- Reliable protection against session fixation attacks (MJ, BB, MS, JP), pp. 1531–1537.
SAC-2011-LeeKY #kernel #linux- Experimenting with system and Libc call interception attacks on ARM-based Linux kernel (HcL, CHK, JHY), pp. 631–632.
SAC-2011-Muramatsu #algorithm #online #random #verification- Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
SAC-2011-WangZ #detection #performance #web- High-speed web attack detection through extracting exemplars from HTTP traffic (WW, XZ), pp. 1538–1543.
CASE-2010-Hui- Optimal control of bio-attack induced infectious disease dynamics: The case of anthrax (QH), pp. 911–916.
DATE-2010-PellegriniBA #authentication- Fault-based attack of RSA authentication (AP, VB, TMA), pp. 855–860.
SIGMOD-2010-ChengFL #morphism #named #network #privacy- K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
VLDB-2010-CormodeLLS- Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
ICEIS-DISI-2010-SunyaevKDK #framework #health- Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
ICPR-2010-RathgebU #performance #recognition- Attacking Iris Recognition: An Efficient Hill-Climbing Technique (CR, AU), pp. 1217–1220.
GPCE-J-2007-BravenboerDV10 #injection #syntax- Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 473–495.
REFSQ-2010-KarpatiSO #case study #visualisation- Visualizing Cyber Attacks with Misuse Case Maps (PK, GS, ALO), pp. 262–275.
SAC-2010-BlackshearV- R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks (SB, RMV), pp. 1985–1992.
SAC-2010-FuPTW #using- Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
SAC-2010-SardanaJ #network- Dual-level defense for networks under DDoS attacks (AS, RCJ), pp. 733–734.
DAC-2009-LinB #analysis #process- Analysis and mitigation of process variation impacts on Power-Attack Tolerance (LL, WPB), pp. 238–243.
DATE-2009-RealVD #correlation #using- Enhancing correlation electromagnetic attack using planar near-field cartography (DR, FV, MD), pp. 628–633.
DATE-2009-SauvageGDMN #constraints- Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints (LS, SG, JLD, YM, MN), pp. 640–645.
ICDAR-2009-ChenLM #pseudo #towards- Toward Resisting Forgery Attacks via Pseudo-Signatures (JC, DPL, FM), pp. 51–55.
ICDAR-2009-GalballyFMO #evaluation #using #verification- Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
SIGMOD-2009-Kifer #privacy #theorem- Attacks on privacy and deFinetti’s theorem (DK), pp. 127–138.
STOC-2009-KunS- A new line of attack on the dichotomy conjecture (GK, MS), pp. 725–734.
RecSys-2009-ChengH #effectiveness #modelling #obfuscation #recommendation- Effective diverse and obfuscated attacks on model-based recommender systems (ZC, NH), pp. 141–148.
RecSys-2009-HurleyCZ #detection #statistics- Statistical attack detection (NH, ZC, MZ), pp. 149–156.
QAPL-2009-MontaltoC #modelling #reasoning- Modeling and Reasoning about an Attacker with Cryptanalytical Capabilities (BM, CC), pp. 143–165.
SAC-2009-FranqueiraLE #framework #mobile #modelling #multi #simulation- Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients (VNLF, RHCL, PvE), pp. 66–73.
SAC-2009-KingLS #network #taxonomy- A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
SAC-2009-LiuYWS #architecture #injection #named #sql #towards- SQLProb: a proxy-based architecture towards preventing SQL injection attacks (AL, YY, DW, AS), pp. 2054–2061.
SAC-2009-OGormanB #correlation #network- Improving stream correlation attacks on anonymous networks (GO, SB), pp. 2024–2028.
SAC-2009-TupakulaVP #named- DoSTRACK: a system for defending against DoS attacks (UKT, VV, SRP), pp. 47–53.
ICSE-2009-KiezunGJE #automation #injection #sql- Automatic creation of SQL Injection and cross-site scripting attacks (AK, PJG, KJ, MDE), pp. 199–209.
HPCA-2009-KongASZ- Hardware-software integrated approaches to defend against software cache-based side channel attacks (JK, OA, JPS, HZ), pp. 393–404.
SOSP-2009-DunaganZS #combinator #graph #named #optimisation #using- Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
ICST-2009-GegickRW #component #predict- Predicting Attack-prone Components (MG, PR, LAW), pp. 181–190.
VLDB-2008-MetwallyEAA #correlation #detection #named #using- SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
TACAS-2008-BoonstoppelCE #constraints #explosion #generative #named #testing- RWset: Attacking Path Explosion in Constraint-Based Test Generation (PB, CC, DRE), pp. 351–366.
ICALP-C-2008-HallgrenKSZ #protocol #quantum #verification- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
CIKM-2008-PanXM #mobile #privacy- Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
KDD-2008-GantaKS #composition #privacy- Composition attacks and auxiliary information in data privacy (SRG, SPK, AS), pp. 265–273.
KR-2008-MartinezGS #framework- An Abstract Argumentation Framework with Varied-Strength Attacks (DCM, AJG, GRS), pp. 135–144.
RecSys-2008-BryanOC #collaboration #recommendation #retrieval- Unsupervised retrieval of attack profiles in collaborative recommender systems (KB, MPO, PC), pp. 155–162.
SIGIR-2008-MehtaN #collaboration- Attack resistant collaborative filtering (BM, WN), pp. 75–82.
SAC-2008-GantaA #adaptation #enterprise #privacy- Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
CAV-2008-Felten- Coping with Outside-the-Box Attacks (EWF), pp. 3–4.
SAT-2008-EibachPV #satisfiability #using- Attacking Bivium Using SAT Solvers (TE, EP, GV), pp. 63–76.
CASE-2007-WeiJL #automation #industrial #on the- On Protecting Industrial Automation and Control Systems against Electronic Attacks (DW, MAJ, YL), pp. 176–181.
DAC-2007-AmbroseRP #analysis #injection #named #random- RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
DAC-2007-Tiri- Side-Channel Attack Pitfalls (KT), pp. 15–20.
VLDB-2007-WongFWP #privacy- Minimality Attack in Privacy Preserving Data Publishing (RCWW, AWCF, KW, JP), pp. 543–554.
CSMR-2007-MerloLA #automation #injection #php- Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
SEFM-2007-KumarG #modelling #validation- Recovery from DoS Attacks in MIPv6: Modeling and Validation (MCK, KG), pp. 205–214.
HIMI-MTT-2007-HuangLW #correlation #mining #multi- Mining Attack Correlation Scenarios Based on Multi-agent System (SH, ZL, LW), pp. 632–641.
ICEIS-AIDSS-2007-SkaruzSB #approach #detection #network #sql- Recurrent Neural Networks Approach to The Detection of SQL Attacks (JS, FS, PB), pp. 191–197.
MLDM-2007-AriuGP #markov #modelling #network- Sensing Attacks in Computers Networks with Hidden Markov Models (DA, GG, RP), pp. 449–463.
GPCE-2007-BravenboerDV #injection #syntax- Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 3–12.
REFSQ-2007-Sindre #diagrams #process- Mal-Activity Diagrams for Capturing Attacks on Business Processes (GS), pp. 355–366.
SAC-2007-DjemaielB- A global marking scheme for tracing cyber attacks (YD, NB), pp. 170–174.
SAC-2007-JohnsB #approximate #automation #injection #named #web- SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
SAC-2007-ZhouHP #database #image #using- An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
SAT-2007-DeKV #using- Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
DATE-DF-2006-PotlapallyRRJL #encryption #framework #satisfiability- Satisfiability-based framework for enabling side-channel attacks on cryptographic software (NRP, AR, SR, NKJ, RBL), pp. 18–23.
FoSSaCS-2006-AbadiBW #equivalence- Guessing Attacks and the Computational Soundness of Static Equivalence (MA, MB, BW), pp. 398–412.
STOC-2006-Watrous #quantum- Zero-knowledge against quantum attacks (JW), pp. 296–305.
CHI-2006-WuMG #question #security- Do security toolbars actually prevent phishing attacks? (MW, RCM, SLG), pp. 601–610.
CIKM-2006-YangDB- Practical private data matching deterrent to spoofing attacks (YY, RHD, FB), pp. 852–853.
ICPR-v3-2006-BaigBK #distributed #network #pattern matching #pattern recognition #recognition- A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks (ZAB, MB, AIK), pp. 1050–1054.
KDD-2006-BurkeMWB #classification #collaboration #detection #recommendation- Classification features for attack detection in collaborative recommender systems (RDB, BM, CW, RB), pp. 542–547.
KDD-2006-ZhangCFM #detection #recommendation- Attack detection in time series for recommender systems (SZ, AC, JF, FM), pp. 809–814.
SIGIR-2006-ZhangOFM #analysis #linear #recommendation- Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
POPL-2006-SuW #injection #web- The essence of command injection attacks in web applications (ZS, GW), pp. 372–382.
SAC-2006-KirdaKVJ #named- Noxes: a client-side solution for mitigating cross-site scripting attacks (EK, CK, GV, NJ), pp. 330–337.
SAC-2006-SimpsonPS #health #on the- On tracker attacks in health grids (ACS, DJP, MS), pp. 209–216.
FSE-2006-HalfondOM #evaluation #injection #sql #using- Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
ICSE-2006-HalfondO #injection #sql #using- Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
ASE-2005-HalfondO #analysis #injection #monitoring #named- AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.
DATE-2005-TiriV05a #design- A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs (KT, IV), pp. 58–63.
DATE-2005-YangWVSX #approach #design- Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach (SY, WW, NV, DNS, YX), pp. 64–69.
DRR-2005-BairdR #named #segmentation- ScatterType: a reading CAPTCHA resistant to segmentation attack (HSB, TPR), pp. 197–207.
DRR-2005-LoprestiS #documentation #information management- Information leakage through document redaction: attacks and countermeasures (DPL, ALS), pp. 183–190.
ITiCSE-2005-TobinW #education #security #using- Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
ESOP-2005-GiacobazziM #abstract interpretation #classification #modelling- Adjoining Declassification and Attack Models by Abstract Interpretation (RG, IM), pp. 295–310.
ICALP-2005-LipmaaWB #security #verification- Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction (HL, GW, FB), pp. 459–471.
CHI-2005-Johnson #design #interactive #lessons learnt #simulation- Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuation simulations (CWJ), pp. 651–660.
ICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation- A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
ICEIS-v3-2005-EspositoMORS #data mining #detection #mining #novel #realtime- Real Time Detection of Novel Attacks by Means of Data Mining Techniques (ME, CM, FO, SPR, CS), pp. 120–127.
SAC-2005-UppuluriJR- Preventing race condition attacks on file-systems (PU, UJ, AR), pp. 346–353.
CADE-2005-Truderung #protocol- Regular Protocols and Attacks with Regular Knowledge (TT), pp. 377–391.
ESOP-2004-Hansen- A Hardest Attacker for Leaking References (RRH), pp. 310–324.
ICEIS-v3-2004-MouratidisGM #design #information management #security #using- Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
IJCAR-2004-SteelBM #induction #protocol- Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
ESEC-FSE-2003-YongH #c #pointer #source code- Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
SAS-2002-PierroHW #approximate- Analysing Approximate Confinement under Uniform Attacks (ADP, CH, HW), pp. 310–325.
KDD-2002-MahoneyC #detection #learning #modelling #network #novel- Learning nonstationary models of normal network traffic for detecting novel attacks (MVM, PKC), pp. 376–385.
SAC-2002-SteffanS #collaboration #modelling- Collaborative attack modeling (JS, MS), pp. 253–259.
SAC-2002-XuS #authentication #multi- Authenticated multicast immune to denial-of-service attack (SX, RSS), pp. 196–200.
CAV-2001-DelzannoRB #explosion- Attacking Symbolic State Explosion (GD, JFR, LVB), pp. 298–310.
LICS-2001-Stoller #bound #protocol- A Bound on Attacks on Payment Protocols (SDS), pp. 61–70.
OSDI-1999-SpatscheckP- Defending Against Denial of Service Attacks in Scout (OS, LLP), pp. 59–72.
RE-1997-ZaveJ #complexity #requirements- Requirements for Telecommunications Services: An Attack on Complexity (PZ, MJ), pp. 106–117.
TOOLS-EUROPE-1994-Rubio #c++- C++: Attacks and Defenses (JAR), pp. 429–435.
ICRE-1994-Alford #complexity #requirements #using- Attacking requirements complexity using a separation of concerns (MWA), pp. 2–5.
SAC-1994-RogersU #linear #using- A deterrent to linear system inferential attacks using a mediator (DSR, EAU), pp. 15–19.
HCI-ACS-1993-Westlander #health #research- The Simultaneous Attack on Several Work Environment Factors — An Organizational Change Project Inspired of Occupational Health Research Findings (GW), pp. 833–838.
STOC-1990-NaorY- Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
CAV-1990-Valmari #explosion- A Stubborn Attack On State Explosion (AV), pp. 156–165.
SOSP-1987-Zayas #migration #process- Attacking the Process Migration Bottleneck (ERZ), pp. 13–24.
ICALP-1984-Lagarias #analysis #performance- Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.