Catálogo de publicaciones - actas de congreso

Compartir en
redes sociales


Annual Computer Security Applications Conference

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2020 ACM Digital Library

Información

Tipo de recurso:

actas de congreso

ISBN impreso

978-1-4503-8858-0

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Información sobre derechos de publicación

Copyright © ACM, Inc.

Tabla de contenidos

Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK

Sean Oesch; Ruba Abu-Salma; Oumar Diallo; Juliane Krämer; James Simmons; Justin Wu; Scott Ruoti

Pp. No disponible

WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training

Cong Shi; Yan Wang; Yingying Chen; Nitesh Saxena; Chen Wang

Pp. No disponible

Faulty Point Unit: ABI Poisoning Attacks on Intel SGX

Fritz Alder; Jo Van Bulck; David Oswald; Frank Piessens

Pp. No disponible

Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks

Maliheh Shirvanian; Manar Mohammed; Nitesh Saxena; S Abhishek Anand

Pp. No disponible

ZeroAUDIT

Aman Luthra; James Cavanaugh; Hugo Renzzo Olcese; Rina M. Hirsch; Xiang Fu

Pp. No disponible

NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services

Dario Ferrari; Michele Carminati; Mario Polino; Stefano Zanero

Pp. No disponible

LeakyPick: IoT Audio Spy Detector

Richard Mitev; Anna Pazii; Markus Miettinen; William Enck; Ahmad-Reza Sadeghi

Pp. No disponible

FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

Nampoina Andriamilanto; Tristan Allard; Gaëtan Le Guelvouit

Pp. No disponible

ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings

Paul Muntean; Mathias Neumayer; Zhiqiang Lin; Gang Tan; Jens Grossklags; Claudia Eckert

Pp. No disponible

Talek: Private Group Messaging with Hidden Access Patterns

Raymond Cheng; William Scott; Elisaweta Masserova; Irene Zhang; Vipul Goyal; Thomas Anderson; Arvind Krishnamurthy; Bryan Parno

Pp. No disponible