Catálogo de publicaciones - actas de congreso
Annual Computer Security Applications Conference
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2020 | ACM Digital Library |
Información
Tipo de recurso:
actas de congreso
ISBN impreso
978-1-4503-8858-0
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
2020-12-07
Información sobre derechos de publicación
Copyright © ACM, Inc.
Cobertura temática
Tabla de contenidos
SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes
Corentin Thomasset; David Barrera
Pp. No disponible
On the Feasibility of Automating Stock Market Manipulation
Carter Yagemann; Simon P. Chung; Erkam Uzun; Sai Ragam; Brendan Saltaformaggio; Wenke Lee
Pp. No disponible
Towards a Practical Differentially Private Collaborative Phone Blacklisting System
Daniele Ucci; Roberto Perdisci; Jaewoo Lee; Mustaque Ahamad
Pp. No disponible
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts
Aisha Ali-Gombe; Alexandra Tambaoan; Angela Gurfolino; Golden G. Richard III
Pp. No disponible
This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
Wajih Ul Hassan; Ding Li; Kangkook Jee; Xiao Yu; Kexuan Zou; Dawei Wang; Zhengzhang Chen; Zhichun Li; Junghwan Rhee; Jiaping Gui; Adam Bates
Pp. No disponible
Privacy-Preserving Production Process Parameter Exchange
Jan Pennekamp; Erik Buchholz; Yannik Lockner; Markus Dahlmanns; Tiandong Xi; Marcel Fey; Christian Brecher; Christian Hopmann; Klaus Wehrle
Pp. No disponible
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond
Hassan Khan; Jason Ceci; Jonah Stegman; Adam J. Aviv; Rozita Dara; Ravi Kuber
Pp. No disponible
RusTEE: Developing Memory-Safe ARM TrustZone Applications
Shengye Wan; Mingshen Sun; Kun Sun; Ning Zhang; Xu He
Pp. No disponible
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching
Nian Xue; Liang Niu; Xianbin Hong; Zhen Li; Larissa Hoffaeller; Christina Pöpper
Pp. No disponible
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
Daniel De Almeida Braga; Pierre-Alain Fouque; Mohamed Sabt
Pp. No disponible