Catálogo de publicaciones - actas de congreso

Compartir en
redes sociales


Annual Computer Security Applications Conference

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2020 ACM Digital Library

Información

Tipo de recurso:

actas de congreso

ISBN impreso

978-1-4503-8858-0

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Información sobre derechos de publicación

Copyright © ACM, Inc.

Tabla de contenidos

Set It and Forget It! Turnkey ECC for Instant Integration

Dmitry Belyavsky; Billy Bob Brumley; Jesús-Javier Chi-Domínguez; Luis Rivera-Zamarripa; Igor Ustinov

Pp. No disponible

Practical Over-Threshold Multi-Party Private Set Intersection

Rasoul Akhavan Mahdavi; Thomas Humphries; Bailey Kacsmar; Simeon Krastnikov; Nils Lukas; John A. Premkumar; Masoumeh Shafieinejad; Simon Oya; Florian Kerschbaum; Erik-Oliver Blass

Pp. No disponible

A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs

Sanjeev Das; Kedrian James; Jan Werner; Manos Antonakakis; Michalis Polychronakis; Fabian Monrose

Pp. No disponible

CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications

Yuhang Lin; Olufogorehan Tunde-Onadele; Xiaohui Gu

Pp. No disponible

Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine

Fadi Yilmaz; Meera Sridhar; Wontae Choi

Pp. No disponible

Effect of Security Controls on Patching Window: A Causal Inference based Approach

Aditya Kuppa; Lamine Aouad; Nhien-An Le-Khac

Pp. No disponible

Understanding Promotion-as-a-Service on GitHub

Kun Du; Hao Yang; Yubao Zhang; Haixin Duan; Haining Wang; Shuang Hao; Zhou Li; Min Yang

Pp. No disponible

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability

Yangguang Tian; Nan Li; Yingjiu Li; Pawel Szalachowski; Jianying Zhou

Pp. No disponible

Probabilistic Naming of Functions in Stripped Binaries

James Patrick-Evans; Lorenzo Cavallaro; Johannes Kinder

Pp. No disponible

Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns

Tim Forman; Adam Aviv

Pp. No disponible