Publications

Publications


Year: 2017 (Total: 25)

Network and Distributed System Security Symposium [NDSS]

#497 Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#496 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#495 P2P Mixing and Unlinkable Bitcoin Transactions

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#494 SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#493 A Broad View of the Ecosystem of Socially Engineered Exploit Documents

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

IEEE European Symposium on Security and Privacy [Euro S&P]

#492 LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#491 ARTist: The Android Runtime Instrumentation and Security Toolkit

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#490 Efficient and Flexible Discovery of PHP Application Vulnerabilities

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#489 A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

Others

#488 Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals

Proc. of the 26rd International Conference on World Wide Web (WWW 2017) , 2017

#487 A promising semantics for relaxed-memory concurrency

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17), Paris, France, January 18-20, 2017 , 2017

#486 Thread modularity at many levels: a pearl in compositional verification

Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17), Paris, France, January 18-20, 2017 , 2017

#485 Security Analysis of Cache Replacement Policies

Proceedings of the 6th International Conference on Principles of Security and Trust , 2017

#484 Training Fair Classifiers

AISTATS '17: 20th International Conference on Artificial Intelligence and Statistics (Journal) , 2017

#483 Uncovering the Spatiotemporal Patterns of Collective Social Activity

2017 SIAM International Conference on Data Mining , 2017

#482 Distilling Information Reliability and Source Trustworthiness from Digital Traces

26th International World Wide Web Conference (WWW'17) , 2017

#481 Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment

26th International World Wide Web Conference (WWW'17) , 2017

#480 RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks

WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining , 2017

#479 A privacy-preserving reputation system with user rewards

Journal of Network and Computer Applications (Journal) , 2017

#478 "My friend Cayla" - eine nach § 90 TKG verbotene Sendeanlage?

JurPC (Journal) , 2017

#477 Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#476 Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#475 Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#474 Mail vom Rechtsanwalt? Herausforderungen sicherer Mandantenkommunikation

Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017 , 2017

#473 State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning

Artificial Intelligence (journal) (Journal) , 2017

Year: 2016 (Total: 99)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#472 SoK: Lessons Learned From Android Security Research For Appified Software Platforms

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

#471 You Get Where You're Looking For: The Impact Of Information Sources On Code Security

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

ACM Conference on Computer and Communications Security [CCS]

#470 Computational Soundness of Dalvik Bytecode

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16) , 2016

#469 Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#468 Membership Privacy in MicroRNA-based Studies

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#467 Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#466 Reliable Third-Party Library Detection in Android and its Security Applications

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

Usenix Security Symposium [Usenix]

#465 An Empirical Study of Textual Key-Fingerprint Representations

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#464 Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#463 SGX-Enabled Oblivious Machine Learning

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#462 T3: Comprehensive policy compliance in data retrieval systems

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#461 Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#460 On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#459 What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#458 Thoth: Comprehensive Policy Compliance in Data Retrieval Systems

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

Network and Distributed System Security Symposium [NDSS]

#457 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16) , 2016

International Cryptology Conference [Crypto]

#456 On Statistically Secure Obfuscation with Approximate Correctness

Proceedings of the 36th International Cryptology Conference (CRYPTO '16) , 2016

#455 Two Message Oblivious Evaluation of Cryptographic Functionalities

Proceedings of the 36th International Cryptology Conference (CRYPTO '16) , 2016

IEEE European Symposium on Security and Privacy [Euro S&P]

#454 HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving

Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16) , 2016

IEEE Computer Security Foundations Symposium [CSF]

#453 On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.

Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16) , 2016

#452 Micro-Policies for Web Session Security

Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16) , 2016

Others

#451 Adversarial Perturbations Against Deep Neural Networks for Malware Classification

The Computing Research Repository (CoRR) (Journal) , 2016

#450 Simulating the Large-Scale Erosion of Genomic Privacy Over Time

Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16) , 2016

#449 Light-Weight Contexts: An OS Abstraction for Safety and Performance

Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16) , 2016

#448 Profile Linkability despite Anonymity in Social Media Systems

Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES) , 2016

#447 ESPRESSO: Explaining Relationships between Entity Sets

Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16) , 2016

#446 Software verstehen, zerstören, schützen mit automatischen Software-Modellen

46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016) , 2016

#445 Ten Years of Knowledge Harvesting: Lessons and Challenges

IEEE Data Engineering Bulletin (Journal) , 2016

#444 On the Feasibility of TTL-based Filtering for DRDoS Mitigation

RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses , 2016

#443 SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion

19th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID '16) , 2016

#442 A Survey on Routing in Anonymous Communication Protocols

The Computing Research Repository (CoRR) (Journal) , 2016

#441 Causally Consistent Dynamic Slicing

Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16) , 2016

#440 Automatisches Sicherheitstesten

Datenschutz und Datensicherheit (DuD) (Journal) , 2016

#439 Smart-Home-Systeme in Zeiten digitaler Kriminalität

Datenschutz und Datensicherheit – DuD (Journal) , 2016

#438 R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities

Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16) , 2016

#437 KOGNAC: Efficient Encoding of Large Knowledge Graphs

Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016) , 2016

#436 Mining Apps for Anomalies

, 2016

#435 VatiCAN - Vetted, Authenticated CAN Bus

Conference on Cryptographic Hardware and Embedded Systems (CHES) (Journal) , 2016

#434 Kizzle: A Signature Compiler for Detecting Exploit Kits

The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks , 2016

#433 Privacy Capsules: Preventing Information Leaks by Mobile Apps

, 2016

#432 Demo: I-Pic: A Platform for Privacy-Compliant Image Capture

Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16) , 2016

#431 Mining Sandboxes

Proceedings of the 38th International Conference on Software Engineering , 2016

#430 Detecting Hardware-Assisted Virtualization

Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings , 2016

#429 J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features

Transactions of the Association for Computational Linguistics (TACL) (Journal) , 2016

#428 Boxify: Bringing Full-Fledged App Sandboxing to Stock Android

USENIX ;login: (Journal) , 2016

#427 R-Droid: Leveraging Android App Analysis with Static Slice Optimization

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , 2016

#426 RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , 2016

#425 DroidMate: a robust and extensible test generator for Android

Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16) , 2016

#424 Instant Espresso: Interactive Analysis of Relationships in Knowledge Graphs

Proceedings of the 25th International Conference on World Wide Web (WWW '16), Companion Volume (Journal) , 2016

#423 Progress-Sensitive Security for SPARK

Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16) , 2016

#422 Implementation-level Analysis of the JavaScript Helios Voting Client

Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016 , 2016

#421 The Impact of Tangled Code Changes on Defect Prediction Models

The Impact of Tangled Code Changes on Defect Prediction Models , 2016

#420 Asymmetric Secure Multi-execution with Declassification

Proceedings of Principles of Security and Trust - 5th International Conference (POST '16) , 2016

#419 Thread-level Speculation with Kernel Support

Proceedings of the 25th International Conference on Compiler Construction , 2016

#418 Nearly Optimal Verifiable Data Streaming

Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#417 Deducing User Presence from Inter-Message Intervals in Home Automation Systems

ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings , 2016

#416 Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?

juris – Die Monatszeitschrift (Journal) , 2016

#415 Attributbasierte Verschlüsselung für die Justiz

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#414 Datensicherheit (technisch-organisatorische Maßnahmen)

Cloud Computing: Rechtshandbuch , 2016

#413 Efficient smart metering based on homomorphic encryption

Computer Communications (Journal) , 2016

#412 Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#411 Privacy Challenges in the Quantified Self Movement - An EU Perspective

Proceedings on Privacy Enhancing Technologies (Journal) , 2016

#410 sec-cs: Getting the Most out of Untrusted Cloud Storage

, 2016

#409 Uses and Abuses of Server-Side Requests

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016 , 2016

#408 Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#407 Anonymous RAM

21st European Symposium on Research in Computer Security (ESORICS) , 2016

#406 Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände

Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016 , 2016

#405 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy

Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures , 2016

#404 Delegatable Functional Signatures

Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#403 Security & Privacy Column

SIGLOG News (Journal) , 2016

#402 Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm

Journal of Machine Learning Research (JMLR) (Journal) , 2016

#401 Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität

, 2016

#400 Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -

JurPC (Journal) , 2016

#399 Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?

MultiMedia und Recht (Journal) , 2016

#398 Pokémon GO – Technische Innovation und Strafrecht im Konflikt

Informatik Spektrum (Journal) , 2016

#397 Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension

Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN 2016) , 2016

#396 EU-Datenschutz nach „Safe Harbor“

Wirtschaftsführer für junge Juristen (Journal) , 2016

#395 EncFS goes Multi-User: Adding Access Control to an Encrypted File System

Proceedings of the 2nd IEEE Workshop on Security and Privacy in the Cloud (in conjunction with IEEE CNS 2016) , 2016

#394 Sicherheit in der Gebäudeautomation

xia - intelligente architektur (Journal) , 2016

#393 Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit

JurPC (Journal) , 2016

#392 Modellierung in Recht und Informatik

Festschrift für Maximilian Herberger , 2016

#391 Sicherheit der Kommunikation zwischen Rechtsanwalt und Mandant

Neue Juristische Wochenschrift (Journal) , 2016

#390 Hardware-Keylogger: Die Tastatur in der Hand des Feindes

Datenschutz und Datensicherheit - DuD (Journal) , 2016

#389 Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016

Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (Journal) , 2016

#388 Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität

juris – Die Monatszeitschrift (Journal) , 2016

#387 Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16

jurisPR-ITR (Journal) , 2016

#386 Lightweight verification of separate compilation

Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16) , 2016

#385 Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art

J. Artif. Intell. Res. (JAIR) (Journal) , 2016

#384 Practical Undoability Checking via Contingent Planning

Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16) , 2016

#383 Revisiting Goal Probability Analysis in Probabilistic Planning

Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16) , 2016

#382 Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications

Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16) , 2016

#381 Loss Functions for Top-k Error: Analysis and Insights

2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16) , 2016

#380 On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs

Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW'16) , 2016

#379 Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media

Proceedings of the 10th International Conference on Web and Social Media , 2016

#378 Message Impartiality in Social Media Discussions

Proceedings of the 10th International Conference on Web and Social Media , 2016

#377 Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News

Proceedings of the 10th International Conference on Web and Social Media , 2016

#376 Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data

12th Symposium on Usable Privacy and Security (SOUPS'16) , 2016

#375 On the Efficiency of the Information Networks in Social Media

Proceedings of the 9th ACM International Conference on Web Search and Data Mining , 2016

#374 Strengthening Weak Identities Through Inter-Domain Trust Transfer

Proceedings of the 25th International Conference on World Wide Web (WWW'16) , 2016

Year: 2015 (Total: 58)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#373 Cross-Architecture Bug Search in Binary Executables

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

#372 Privacy and Access Control for Outsourced Personal Records

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

#371 ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

ACM Conference on Computer and Communications Security [CCS]

#370 Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015) , 2015

#369 Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins

Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15) , 2015

#368 POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#367 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#366 Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , 2015

Usenix Security Symposium [Usenix]

#365 Boxify: Full-fledged App Sandboxing for Stock Android

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

#364 In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

Network and Distributed System Security Symposium [NDSS]

#363 Privacy Preserving Payments in Credit Networks

Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15) , 2015

International Cryptology Conference [Crypto]

#362 Efficient Pseudorandom Functions via On-the-Fly Adaptation

Proceedings of the 35th International Cryptology Conference (CRYPTO '15) , 2015

IEEE Computer Security Foundations Symposium [CSF]

#361 Program Actions as Actual Causes: A Building Block for Accountability

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#360 Information Flow Control for Event Handling and the DOM in Web Browsers

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#359 A Logic of Programs with Interface-Confined Code

Proceedings of the 28th Computer Security Foundations Symposium (CSF '15) , 2015

#358 Symbolic Malleable Zero-knowledge Proofs

Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15) , 2015

Others

#357 Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

Proceedings on Privacy Enhancing Technologies , 2015

#356 AmpPot: Monitoring and Defending Against Amplification DDoS Attacks

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings , 2015

#355 Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

ACM Computer Communication Review (Journal) , 2015

#354 Mining Android Apps for Anomalies

The Art and Science of Analyzing Software Data (Journal) , 2015

#353 Affine Refinement Types for Secure Distributed Programming

ACM Transactions on Programming Languages and Systems , 2015

#352 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

13th International Conference on Applied Cryptography and Network Security (ACNS) , 2015

#351 Foundations of Reconfigurable PUFs

Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015 , 2015

#350 The elephant in the room: getting value from Big Data

Proceedings of the 18th International Workshop on Web and Databases (WebDB '15) , 2015

#349 Generalized Task Parallelism

ACM Transactions on Architecture and Code Optimization (TACO) (Journal) , 2015

#348 Knowledge Bases for Web Content Analytics

Proccedings of the 24th International Conference on World Wide Web (WWW '15), Companion Volume , 2015

#347 Mining Apps for Abnormal Usage of Sensitive Data

Proceedings of the 37th International Conference on Software Engineering , 2015

#346 Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing

Proceedings of the Eighth International Workshop on Search-Based Software Testing , 2015

#345 Test Complement Exclusion: Guarantees from Dynamic Analysis

Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension , 2015

#344 Guardat: enforcing data policies at the storage layer

Proceedings of the 10th European Conference on Computer Systems (EuroSys '15) , 2015

#343 PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

Proceedings of the 4th Conference on Principles of Security and Trust (POST) , 2015

#342 Refinement Types for Incremental Computational Complexity

Proceedings of the 24th European Symposium on Programming (ESOP '15) , 2015

#341 It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction

Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI) , 2015

#340 Learning How to Prevent Return-Oriented Programming Efficiently

Engineering Secure Software and Systems , 2015

#339 How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

CoRR (Journal) , 2015

#338 Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

ACM ASIACCS Security in Cloud Computing Workshop 2015 , 2015

#337 Data Lineage in Malicious Environments

IEEE Transactions on Dependable and Secure Computing (Journal) , 2015

#336 System M: A Program Logic for Code Sandboxing and Identification

The Computing Research Repository (CoRR) (Journal) , 2015

#335 Quantifying Information Flow in Cryptographic Systems

Mathematical Structures in Computer Science (Journal) , 2015

#334 Achieving Optimal Utility for Distributed Differential Privacy Using SMPC

Applications of Secure Multiparty Computation , 2015

#333 Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte

Zeitschrift für Schadensrecht (Journal) , 2015

#332 Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS"

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#331 Ein Plädoyer für e-Klausuren im Jurastudium

JurPC (Journal) , 2015

#330 A Reputation System supporting Unlinkable, yet Authorized Expert Ratings

Proceedings of The 30th ACM/SIGAPP Symposium On Applied Computing , 2015

#329 Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades

Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS) , 2015

#328 Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics

9th USENIX Workshop on Offensive Technologies (WOOT 15) , 2015

#327 Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#326 jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications

Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings , 2015

#325 Save Our Passwords

Proceedings of The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , 2015

#324 Bargeld und andere Bezahlverfahren

Wirtschaftsdienst (Journal) , 2015

#323 E-Akte, elektronischer Rechtsverkehr und Barrierefreiheit

Neue Juristische Wochenschrift (Journal) , 2015

#322 Elektronische Akten: Anforderungen und technische Lösungsmöglichkeiten

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#321 Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources

Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15) , 2015

#320 Computational Soundness for Interactive Primitves

Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15) , 2015

#319 Hausautomationssysteme im Datenschutzrecht

Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015 , 2015

#318 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

CoRR (Journal) , 2015

#317 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

IACR Cryptology ePrint Archive (Journal) , 2015

#316 Type-Based Verification of Electronic Voting Protocols

Proceedings of the 4th International Conference on Principles of Security and Trust (POST) , 2015

Year: 2014 (Total: 115)

ACM Conference on Computer and Communications Security [CCS]

#315 (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#314 DEMO: Enhancing Security and Privacy with Google Glass

Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14) , 2014

#313 Poster: Quasi-ID: In fact, I am a human

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#312 You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14) , 2014

#311 Private-by-Design Advertising Meets the Real World

Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014) , 2014

Usenix Security Symposium [Usenix]

#310 A Look at Targeted Attacks Through the Lense of an NGO

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#309 Exit from Hell? Reducing the Impact of Amplification DDoS Attacks

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#308 Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#307 SDDR: Light-Weight, Secure Mobile Encounters

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

#306 Towards Detecting Anomalous User Behavior in Online Social Networks

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

International Cryptology Conference [Crypto]

#305 Feasibility and Infeasibility of Secure Computation with Malicious PUFs

Proceedings of the 34th International Cryptology Conference (Crypto '14) , 2014

IEEE Computer Security Foundations Symposium [CSF]

#304 TUC: Time-sensitive and Modular Analysis of Anonymous Communication

Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

#303 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

Others

#302 Android Security Framework: Extensible Multi-Layered Access Control on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#301 Scippa: System-Centric IPC Provenance on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#300 XMLMate: Evolutionary XML Test Generation

Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering , 2014

#299 Probabilistic Prediction of Privacy Risks in User Search Histories

Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14) , 2014

#298 Lime: Data Lineage in the Malicious Environment

Proceedings of 10th International Workshopon Security and Trust Management (STM) , 2014

#297 Asynchronous MPC with a Strict Honest Majority Using Non-equivocation

ACM Symposium on Principles of Distributed Computing 2014 , 2014

#296 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , 2014

#295 BackRef: Accountability in Anonymous Communication Networks

Applied Cryptography and Network Security , 2014

#294 X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.

29th ACM Symposium on Applied Computing (SAC 2014) , 2014

#293 A Compiler Optimization to Increase the Efficiency of WCET Analysis

22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014 , 2014

#292 Automating the Choice of Consistency Levels in Replicated Systems

2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014. , 2014

#291 An SMT-based Approach to Coverability Analysis

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#290 A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors

ACM Computing Surveys (Journal) , 2014

#289 Building timing predictable embedded systems

ACM Transactions on Embedded Computing Systems (Journal) , 2014

#288 Bridging the Gap Between Digital Cryptography and the Physical World

European Symposium on Research in Computer Security (ESORICS) , 2014

#287 Bounds on mobility

Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014) , 2014

#286 Blocking Optimality in Distributed Real-Time Locking Protocols

LITES (Journal) , 2014

#285 Beyond Access Control: Managing Online Privacy via Exposure

Proceedings of the Workshop on Useable Security (USEC'14) , 2014

#284 Basic Problems in Multi-View Modeling

Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS , 2014

#283 Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity

Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , 2014

#282 Dynamic package interfaces

Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014) , 2014

#281 Discovering Emerging Entities with Ambiguous Names

Proc. of the 23rd International Conference on World Wide Web (WWW 2014) , 2014

#280 Detection and Tracking of Occluded People

International Journal of Computer Vision (IJCV) (Journal) , 2014

#279 Deductive control synthesis for alternating-time logics

Proc. of the International Conference on Embedded Software (EMSOFT 2014) , 2014

#278 Formal Specification of a Generic Separation Kernel

Archive of Formal Proofs (Journal) , 2014

#277 Estimation of Human Body Shape and Posture Under Clothing

Computer Vision and Image Understanding (Journal) , 2014

#276 EnCore: Private, Context-based Communication for Mobile Social Apps

Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services , 2014

#275 Edit Distance for Timed Automata

Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014) , 2014

#274 Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task

Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI) , 2014

#273 Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users

Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI) , 2014

#272 Interacting with 3D Content on Stereoscopic Displays

Proceedings of the International Symposium on Pervasive Displays (PerDis) , 2014

#271 Main Memory Adaptive Indexing for Multi-core Systems

Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN) , 2014

#270 Kuai: A model checker for software-defined networks

Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014) , 2014

#269 KnowLife: a Knowledge Graph for Health and Life Sciences

Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14) , 2014

#268 Privacy-preserving audit for broker-based health information exchange

Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14) , 2014

#267 People on Drugs: Credibility of User Statements in Health Communities.

Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14) , 2014

#266 Paint it Black: Evaluating the Effectiveness of Malware Blacklists

Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses , 2014

#265 On Measuring the Impact of DDoS Botnets

Proceedings of the Seventh European Workshop on System Security (EuroSec '14) , 2014

#264 On Advanced Monitoring in Resilient and Unstructured P2P Botnets

Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014) , 2014

#263 Race Detection for Android Applications

Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) , 2014

#262 Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation

2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014 , 2014

#261 Regression Test Selection for Distributed Software Histories

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#260 Synthesis of Geometry Proof Problems

Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014) , 2014

#259 SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction

Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario , 2014

#258 Scalable Multitask Representation Learning for Scene Classification

2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014 , 2014

#257 Understanding and Specifying Social Access Control Lists

Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014) , 2014

#256 Unary Pushdown Automata and Straight-Line Programs

Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014) , 2014

#255 Ubic: Bridging the Gap between Digital Cryptography and the Physical World

Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I , 2014

#254 Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Proc. 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#253 Verification of Certifying Computations through AutoCorres and Simpl

Proc. 6th NASA Formal Methods Symposium (NFM 2014) , 2014

#252 (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings , 2014

#251 Differentially Private Data Aggregation with Optimal Utility

30th Annual Computer Security Applications Conference (ACSAC) , 2014

#250 Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication

7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2014) , 2014

#249 Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte

Zeitschrift für Schadensrecht (Journal) , 2014

#248 Blut und Boden: Die NS-Agrarideologie und die Extreme Rechte heute

Forum Recht (Journal) , 2014

#247 A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers

International Journal of Mobile Human Computer Interaction (IJMHCI) (Journal) , 2014

#246 A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof

, 2014

#245 Analysis of the Current State in Website Certificate Validation

Security and Communication Networks (Journal) , 2014

#244 Automated Fixing of Programs with Contracts

IEEE Transactions on Software Engineering (Journal) , 2014

#243 Automatic Compositional Synthesis of Distributed Systems

Proceedings of the 19th International Symposium on Formal Methods (FM'14) , 2014

#242 Automatismen in einem verteilten System: Das Beispiel Bitcoin

Logiken strukturbildender Prozesse: Automatismen , 2014

#241 Bitcoin im deutschen Vollstreckungsrecht

Multimedia und Recht (Journal) , 2014

#240 Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting

Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing , 2014

#239 Causal Termination of Multi-threaded Programs

Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014) , 2014

#238 Checking App Behavior Against App Descriptions

Proc. of the 36th International Conference on Software Engineering (ICSE 2014) , 2014

#237 CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin

Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014) , 2014

#236 Counting Models of Linear-Time Temporal Logic

8th International Conference on Language and Automata Theory and Applications (LATA 2014) , 2014

#235 Cross-checking oracles from intrinsic software redundancy

36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014 , 2014

#234 Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen

Tagungsband des 17. Internationalen Rechtsinformatik Symposions , 2014

#233 Declarative Design and Enforcement for Secure Cloud Applications

, 2014

#232 Detecting Unrealizable Specifications of Distributed Systems

Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14) , 2014

#231 Establishing user trust in Automated Teller Machine Integrity

IET Information Security (Journal) , 2014

#230 Exception Handling for Dynamic Information Flow Control

Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition) , 2014

#229 Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines

Companion Proceedings of the 36th International Conference on Software Engineering , 2014

#228 Fast DQBF refutation

Theory and Applications of Satisfiability Testing (SAT 2014) , 2014

#227 Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis

Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security , 2014

#226 Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks

Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14) , 2014

#225 Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services

International Journal On Advances in Intelligent Systems (Journal) , 2014

#224 JTACO: Test Execution for Faster Bounded Verification

Proc. of the 8th International Conference on Tests and Proofs (TAP 2014) , 2014

#223 Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching

Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet , 2014

#222 Mining Bug Data: A Practitioner’s Guide

Recommendation Systems in Software Engineering , 2014

#221 Monitoring Parametric Temporal Logic

Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14) , 2014

#220 On Tight Security Proofs for Schnorr Signatures

Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014) , 2014

#219 Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles

Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (Journal) , 2014

#218 Petri Games: Synthesis of Distributed Systems with Causal Memory

Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014) , 2014

#217 PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks

Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security , 2014

#216 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract

Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS , 2014

#215 Privacy-Preserving Digital Rights Management based on Attribute-based Encryption

Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security , 2014

#214 Privacy-Preserving Multiparty Digital Rights Management

, 2014

#213 Privacy-Preserving Reputation Management

Procceedings of the 29th Symposium On Applied Computing , 2014

#212 ProCrawl: Mining Test Models from Multi-user Web Applications

Proc. International Symposium on Software Testing and Analysis (ISSTA 2014) , 2014

#211 Reconstructing AES Key Schedules from Decayed Memory with FPGAs

Proceedings of the 22nd IEEE International Symposium on Field-Programmable Custom Computing Machines May 11-13, Boston, Massachusetts , 2014

#210 Information Flow Control in WebKit's JavaScript Bytecode

, 2014

#209 Search-based Security Testing of Web Applications

Proceedings of the 7th International Workshop on Search-Based Software Testing , 2014

#208 Security and Privacy Challenges in On-The-Fly Computing

Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014) , 2014

#207 Temporal Logics for Hyperproperties

Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014) , 2014

#206 Test Generation Across Multiple Layers

Proceedings of the 7th International Workshop on Search-Based Software Testing , 2014

#205 The German electronic identity card: Lessons learned

Advances in Electronic Government, Digital Divide, and Regional Development , 2014

#204 The Legal Classification of Identity-Based Signatures

Computer Law and Security Review (Journal) , 2014

#203 Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services

Proceedings of The Sixth International Conferences on Advanced Service Computing , 2014

#202 WebMate: Web Application Test Generation in the Real World

Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014) , 2014

#201 Zero-Communication Seed Establishment for Anti-Jamming Techniques

Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT) , 2014

Year: 2013 (Total: 83)

ACM Conference on Computer and Communications Security [CCS]

#200 Verifiable Delegation of Computation on Outsourced Data

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11) , 2013

#199 Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13) , 2013

#198 Poster: Identity-Based Steganography and Its Applications to Censorship Resistance

Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13) , 2013

Usenix Security Symposium [Usenix]

#197 CacheAudit: A Tool for the Static Analysis of Cache Side Channels

Proceedings of the 22th USENIX Security Symposium (USENIX '13) , 2013

Network and Distributed System Security Symposium [NDSS]

#196 Preventing Side-Channel Leaks in Web Traffic: A Formal Approach

Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13) , 2013

European Cryptology Conference [Eurocrypt]

#195 Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures

Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13) , 2013

IEEE Computer Security Foundations Symposium [CSF]

#194 AnoA: A Framework For Analyzing Anonymous Communication Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

#193 Differential Privacy by Typing in Security Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

#192 Security and Privacy by Declarative Design

Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16) , 2013

Others

#191 Using Mobile Device Communication to Strengthen e-Voting Protocols

Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013 , 2013

#190 AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications

8th International Workshop on Data Privacy Management (DPM'13) , 2013

#189 Differentially Private Smart Metering with Battery Recharging

Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013) , 2013

#188 A Privacy-aware Shopping Scenario

Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic , 2013

#187 Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

Principles of Security and Trust 2013 , 2013

#186 A Comparison of Knives for Bread Slicing

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#185 A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications

25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013 , 2013

#184 A Framework for the Verification of Certifying Computations

Journal of Automated Reasoning (Journal) , 2013

#183 Asynchronous Computational VSS with Reduced Communication Complexity

Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013) , 2013

#182 Approximate Transient Analysis of Queuing Networks by Quasi Product Forms

Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings , 2013

#181 AppGuard - Enforcing User Requirements on Android Apps

19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , 2013

#180 An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis

SIGBED Review (Journal) , 2013

#179 Advances in Mobile Security

8th Future Security - Security Research Conference , 2013

#178 A Uniformization Theorem for Nested Word to Word Transductions

Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013) , 2013

#177 A Theory of Partitioned Global Address Spaces

Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013) , 2013

#176 A Theory of Name Boundedness

Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013) , 2013

#175 A study on icon arrangement by smartphone users

Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI) , 2013

#174 A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism

Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK , 2013

#173 Bisimilar finite abstractions of stochastic control systems

Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013) , 2013

#172 Compositional Equivalence Checking for Models and Code of Control Systems

Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013) , 2013

#171 CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency

Journal of the ACM (Journal) , 2013

#170 Discovering semantic relations from the web and organizing them with PATTY

ACM SIGMOD Record (Journal) , 2013

#169 Detecting Deadlock in Programs with Data-Centric Synchronization

ICSE '13: Proceedings of the 35th International Conference on Software Engineering , 2013

#168 Dependent Type Theory for Verification of Information Flow and Access Control Policies

ACM Transactions on Programming Languages and Systems (Journal) , 2013

#167 Flexible Access Control for JavaScript

Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications , 2013

#166 Fine-grained Semantic Typing of Emerging Entities

Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51) , 2013

#165 Expand, Enlarge, and Check for Branching Vector Addition Systems

Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013) , 2013

#164 Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge

Journal of Graph Theory (Journal) , 2013

#163 Entwicklung sicherer Software durch Security by Design

SIT-TR-2013-01 , 2013

#162 Efficient partitioning of sporadic real-time tasks with shared resources and spin locks

8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013 , 2013

#161 Efficient Algorithms for Control Closures

1st International Workshop on Interference and Dependence , 2013

#160 Incremental Inductive Coverability

Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013) , 2013

#159 Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling

19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013 , 2013

#158 HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text

Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51) , 2013

#157 Gem-based Entity-Knowledge Maintenance

Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13) , 2013

#156 Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities

Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013 , 2013

#155 MrCrypt: Static Analysis for Secure Cloud Computations

Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013) , 2013

#154 Model Checking Database Applications

Proc. of the 20th International Symposium on Static Analysis (SAS 2013) , 2013

#153 Measurement-based modeling of the cache replacement policy

19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013 , 2013

#152 Logical Foundations of Secure Resource Management

Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013) , 2013

#151 Learning People Detectors for Tracking in Crowded Scenes

IEEE International Conference on Computer Vision (ICCV) , 2013

#150 Privacy-Preserving Accountable Computation

Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , 2013

#149 Precise timing analysis for direct-mapped caches

The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013 , 2013

#148 Peer-assisted Content Distribution in Akamai Netsession

Proc. of the 2013 Internet Measurement Conference (IMC'13) , 2013

#147 Parameterized verification of asynchronous shared-memory systems

Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013) , 2013

#146 On-the-fly verification and optimization of DTA-properties for large Markov chains

Formal Methods in System Design (Journal) , 2013

#145 On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks

Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013 , 2013

#144 On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream

Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13) , 2013

#143 Synthesis of fixed-point programs

Proc. of the International Conference on Embedded Software (EMSOFT 2013) , 2013

#142 Supervisor Synthesis for Controller Upgrades

Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013) , 2013

#141 Strong Appearance and Expressive Spatial Models for Human Pose Estimation

IEEE International Conference on Computer Vision (ICCV) , 2013

#140 Static Provenance Verification for Message Passing Programs

Proc. of the 20th International Symposium on Static Analysis (SAS 2013) , 2013

#139 SplitX: high-performance private analytics

Proc. of the ACM SIGCOMM 2013 Conference , 2013

#138 Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities

25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013 , 2013

#137 Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations

Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo (Journal) , 2013

#136 Towards Practical Communication in Byzantine-Resistant DHTs

Networking, IEEE/ACM Transactions on (Journal) , 2013

#135 Towards Efficient Traffic-analysis Resistant Anonymity Networks

Proc. of the ACM SIGCOMM 2013 Conference , 2013

#134 The OMLP family of optimal multiprocessor real-time locking protocols

Design Automation for Embedded Systems (Journal) , 2013

#133 Where Next in Object Recognition and how much Supervision Do We Need?

Advanced Topics in Computer Vision , 2013

#132 What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness

Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland , 2013

#131 Callee-site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#130 Client-controlled Cryptography-as-a-Service in the Cloud

11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 2013

#129 Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) , 2013

#128 Constrained fractional set programs and their application in local clustering and community detection

Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013 , 2013

#127 Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets

Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD) , 2013

#126 Formal Verification of Cryptographic Security Proofs

, 2013

#125 Mosquito: Another One Bites the Data Upload STream

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#124 Sambamba: Runtime Adaptive Parallel Execution

Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems , 2013

#123 The Uncracked Pieces in Database Cracking

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2013

#122 Towards realistic team formation in social networks based on densest subgraphs

22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013 , 2013

#121 Towards Zero-Overhead Static and Adaptive Indexing in Hadoop

VLDB Journal (Journal) , 2013

#120 WWHow! Freeing Data Storage from Cages

Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR) , 2013

#119 Identity-Based Steganography and Its Applications to Censorship Resistance

6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013) , 2013

#118 Idea: Callee-Site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

Year: 2012 (Total: 67)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#117 ObliviAd: Provably Secure and Practical Online Behavioral Advertising

Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012) , 2012

ACM Conference on Computer and Communications Security [CCS]

#116 Computational Soundness without Protocol Restrictions

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

#115 Non-tracking Web Analytics

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

Usenix Security Symposium [Usenix]

#114 Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services

Proceedings of the 21st Usenix Security Symposium (USENIX '12) , 2012

Network and Distributed System Security Symposium [NDSS]

#113 Automated Synthesis of Secure Distributed Applications

Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12) , 2012

#112 MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) , 2012

IEEE Computer Security Foundations Symposium [CSF]

#111 Verified Security of Merkle-Damgård

Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012 , 2012

#110 Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12) , 2012

#109 Provably Secure and Practical Onion Routing

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , 2012

Others

#108 A comparative analysis of decentralized power grid stabilization strategies

Proceedings of the Winter Simulation Conference , 2012

#107 Ace: An Efficient Key-Exchange Protocol for Onion Routing

Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , 2012

#106 Brief announcement: distributed cryptography using trinc

ACM Symposium on Principles of Distributed Computing 2012 , 2012

#105 Dependability Results for Power Grids with Decentralized Stabilization Strategies

AVACS Technical Report (Journal) , 2012

#104 A dynamic program analysis to find floating-point accuracy problems

ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012 , 2012

#103 A data-centric approach to synchronization

ACM Trans. Program. Lang. Syst. (Journal) , 2012

#102 Automatically Generating Test Cases for Specification Mining

IEEE Transactions on Software Engineering (Journal) , 2012

#101 Articulated People Detection and Pose Estimation: Reshaping the Future

Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2012

#100 Approximately Bisimilar Symbolic Models for Digital Control Systems

Proc. of the 24th International Conference on Computer Aided Verification (CAV 2012) , 2012

#99 An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs

Algorithmica (Journal) , 2012

#98 An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis

12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, July 10, 2012, Pisa, Italy , 2012

#97 Algorithmic Verification of Asynchronous Programs

ACM Transactions on Programming Languages and Systems (Journal) , 2012

#96 Adding query privacy to robust DHTs

Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012) , 2012

#95 Accountability and Trust in Cooperative Information Systems

Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12) , 2012

#94 A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts

Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12) , 2012

#93 A Perfect Model for Bounded Verification

Proc. of the 27th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2012) , 2012

#92 Big Data Methods for Computational Linguistics

IEEE Data Engineering Bulletin (Journal) , 2012

#91 Countermodels from Sequent Calculi in Multi-Modal Logics

Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012) , 2012

#90 CLSE: Closed-Loop Symbolic Execution

Proc. of the 4th International Symposium on NASA Formal Methods (NFM 2012) , 2012

#89 Discovering and Exploring Relations on the Web

Proc. of the Very Large Database Endowment (PVLDB) (Journal) , 2012

#88 Diffusion-Based Image Compression in Steganography

Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012 , 2012

#87 Defending Against Large-scale Crawls in Online Social Networks

, 2012

#86 Exploring the design space of social network-based Sybil defense

Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012) , 2012

#85 Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games

Proc. of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA 2012) , 2012

#84 Engage: A Deployment Management System

Proc. of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012) , 2012

#83 Efficient May Happen in Parallel Analysis for Async-finish Parallelism

Proc. of the 19th International Symposium on Static Analysis (SAS 2012) , 2012

#82 Input-Output stability for discrete systems

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#81 History-Free Sequential Aggregate Signatures

Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012) , 2012

#80 Harmony and dissonance: organizing the people's voices on political controversies

Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12) , 2012

#79 Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE

Sicherheit 2012 -- Beiträge der 6-ten Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. V. , 2012

#78 Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs

RV'11: Proc. 2nd International Conference on Runtime Verification , 2012

#77 LINDA: distributed web-of-data-scale entity matching

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#76 Language-Theoretic Abstraction Refinement

Proc. of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012) , 2012

#75 Labeled Goal-Directed Search in Access Control Logic

Proc. of the 8th International Workshop on Security and Trust Management (STM 2012) , 2012

#74 KORE: keyphrase overlap relatedness for entity disambiguation

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#73 Predicting emerging social conventions in online social networks

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#72 PolariCQ: polarity classification of political quotations

Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) , 2012

#71 PATTY: A Taxonomy of Relational Patterns with Semantic Types

Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012) , 2012

#70 OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions

Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12) , 2012

#69 On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols

Proc. 4th NASA Formal Methods Symposium (NFM 2012) , 2012

#68 On the (limited) power of non-equivocation

Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012) , 2012

#67 Reliable Client Accounting for P2P-infrastructure Hybrids

Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012) , 2012

#66 Synthesis of minimal-error control software

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#65 Superficially substructural types

ACM SIGPLAN International Conference on Functional Programming (ICFP 2012) , 2012

#64 Stateful authorization logic - Proof theory and a case study

Journal of Computer Security (Journal) , 2012

#63 Scalable Testing of File System Checkers

Proc. of the 7th ACM European Conference on Computer Systems (EuroSys 2012) , 2012

#62 Sambamba: A Runtime System for Online Adaptive Parallelization

Proc. of the 21st International Conference Compiler Construction (CC 2012) , 2012

#61 SAFE Extensibility of Data-Driven Web Applications

WWW~'12: Proceedings of the 21st International World Wide Web Conference , 2012

#60 Understanding and combating link farming in the twitter social network

Proc. of the 21st International Conference on World Wide Web (WWW 2012) , 2012

#59 Trusted Storage

Presented at USENIX FAST'12 WiP , 2012

#58 Trigger memoization in self-triggered control

Proc. of the International Conference on Embedded Software (EMSOFT 2012) , 2012

#57 Towards Statistical Queries over Distributed Private User Data

Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012) , 2012

#56 Three-valued abstraction for probabilistic systems

Journal of Logic and Algebraic Programming (Journal) , 2012

#55 Affine Refinement Types for Authentication and Authorization

Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2012) , 2012

#54 XIFER: A Software Diversity Tool Against Code-Reuse Attacks

4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3) , 2012

#53 Efficient Big Data Processing in Hadoop MapReduce

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2012

#52 Only Aggressive Elephants are Fast Elephants

The Proceedings of the VLDB Endowment (PVLDB) (Journal) , 2012

#51 Rational Cryptography

, 2012

Year: 2011 (Total: 48)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#50 Verification of Information Flow and Access Control Policies with Dependent Types

Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11) , 2011

#49 On Adversary Models and Compositional Security

IEEE Security & Privacy (Journal) , 2011

ACM Conference on Computer and Communications Security [CCS]

#48 AmazonIA: When Elasticity Snaps Back

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#47 Auctions in do-not-track compliant internet advertising

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#46 Policy auditing over incomplete logs: theory, implementation and applications

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#45 Poster: Control-flow Integrity for Smartphones

18th ACM conference on Computer and communications security (ACM CCS 2012) , 2011

Network and Distributed System Security Symposium [NDSS]

#44 A Security API for Distributed Social Networks

Proceedings of the Network and Distributed System Security Symposium (NDSS '11) , 2011

IEEE Computer Security Foundations Symposium [CSF]

#43 Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols

Proceedings of the 24th IEEE Computer Security Foundations Symposium , 2011

Others

#42 Twin Clouds: An Architecture for Secure Cloud Computing

Workshop on Cryptography and Security in Clouds (CSC) , 2011

#41 Automatically Verifying Typing Constraints for a Data Processing Language

Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011) , 2011

#40 Analyzing facebook privacy settings: user expectations vs. reality

Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011) , 2011

#39 A Template for Predictability Definitions with Supporting Evidence

Bringing Theory to Practice: Predictability and Performance in Embedded Systems, DATE Workshop PPES 2011, March 18, 2011, Grenoble, France. , 2011

#38 A Lyapunov approach in incremental stability

50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011) , 2011

#37 A Local Cross-Site Scripting Attack against Android Phones

, 2011

#36 Bug-Assist: Assisting Fault Localization in ANSI-C Programs

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#35 Branch target buffers: WCET analysis framework and timing predictability

Journal of Systems Architecture - Embedded Systems Design (Journal) , 2011

#34 Cryptographically sound security proofs for basic and public-key Kerberos

International Journal of Information Security (Journal) , 2011

#33 Cause Clue Clauses: Error Localization Using Maximum Satisfiability

Proc. of the 32rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011) , 2011

#32 CAMA: A Predictable Cache-Aware Memory Allocator

23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011 , 2011

#31 Designing next-generation real-time streaming systems

Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201 , 2011

#30 Formalisms for Specifying Markovian Population Models

International Journal of Foundations of Computer Science (Journal) , 2011

#29 Efficient calculation of rare event probabilities in Markovian queueing networks

5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011 , 2011

#28 HMC: Verifying Functional Programs Using Abstract Interpreters

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#27 G2C: Cryptographic Protocols from Goal-Driven Specifications

TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011 , 2011

#26 Minimum Attention Controller Synthesis for Omega-regular Objectives

Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11) , 2011

#25 Non-Uniform Distributions in Quantitative Information-Flow

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) , 2011

#24 PRET DRAM controller: bank privatization for predictability and temporal isolation

Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201 , 2011

#23 Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems

Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011) , 2011

#22 Performance-aware Scheduler Synthesis for Control Systems

Proc. of the International Conference on Embedded Software (EMSOFT 2011) , 2011

#21 Robust Discrete Synthesis Against Unspecified Disturbances

Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011) , 2011

#20 Relaxed-memory concurrency and verified compilation

Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, Austin, TX, USA, January 26-28, 2011 , 2011

#19 Survey: Certifying Algorithms

Computer Science Review (Journal) , 2011

#18 SHAVE: stochastic hybrid analysis of markov population models

Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011 , 2011

#17 Securing social networks

Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011 , 2011

#16 Union and Intersection Types for Secure Protocol Implementations

Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers , 2011

#15 Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

Proc. of the 7th International Conference Information Systems Security (ICISS 2011) , 2011

#14 Temporal isolation on multiprocessing architectures

Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011 , 2011

#13 X-pire! - A digital expiration date for images in social networks

CoRR (Journal) , 2011

#12 Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors

IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) (Journal) , 2011

#11 Verification of Certifying Computations

Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011) , 2011

#10 Twin Clouds: Secure Cloud Computing with Low Latency

Communications and Multimedia Security Conference (CMS'11) , 2011

#9 CFI Goes Mobile: Control-Flow Integrity for Smartphones

International Workshop on Trustworthy Embedded Devices (TrustED) (Journal) , 2011

#8 RAFT at work: speeding-up mapreduce applications under task and node failures

Proceedings of the ACM SIGMOD International Conference on Management of data , 2011

#7 RAFTing MapReduce: Fast recovery on the RAFT

Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE) , 2011

#6 Relax and Let the Database Do the Partitioning Online

Enabling Real-Time Business Intelligence (BIRTE) , 2011

#5 Towards a One Size Fits All Database Architecture

Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR) , 2011

#4 Trojan data layouts: right shoes for a running elephant

Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC) , 2011

#3 Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis

, 2011

Year: 1970 (Total: 2)

Others

#2 A type theory for incremental computational complexity with control flow changes

Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16) , 1970

#1 You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users

IEEE SecDev 2016 , 1970