ACM Techpack (Security)

download ACM Techpack (Security)

of 18

Transcript of ACM Techpack (Security)

  • 8/12/2019 ACM Techpack (Security)

    1/18

  • 8/12/2019 ACM Techpack (Security)

    2/18

  • 8/12/2019 ACM Techpack (Security)

    3/18

  • 8/12/2019 ACM Techpack (Security)

    4/18

    http://doi.acm.org/10.1145/347057.347560http://dl.acm.org/citation.cfm?id=347560http://dx.doi.org/10.1016/S1389-1286(99)00112-7http://people.scs.carleton.ca/~soma/id-2007w/readings/bro-paxson.pdfhttp://dx.doi.org/10.1109/CSAC.2004.3http://www.cs.columbia.edu/~smb/papers/acsac-ipext.pdfhttp://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.html
  • 8/12/2019 ACM Techpack (Security)

    5/18

    http://dl.acm.org/citation.cfm?id=1408349http://doi.acm.org/10.1145/1132026.1132027http://dl.acm.org/citation.cfm?id=1132027
  • 8/12/2019 ACM Techpack (Security)

    6/18

    http://dl.acm.org/citation.cfm?id=361268.361275http://dl.acm.org/citation.cfm?id=361268.361275http://www.acsac.org/secshelf/papers/protection_information.pdfhttp://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.html
  • 8/12/2019 ACM Techpack (Security)

    7/18

    http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.198http://doi.acm.org/10.1145/359168.359172http://dl.acm.org/citation.cfm?id=359168.359172http://doi.acm.org/10.1145/361268.361275
  • 8/12/2019 ACM Techpack (Security)

    8/18

    http://dl.acm.org/citation.cfm?id=1653662.1653687http://dl.acm.org/citation.cfm?id=1653662.1653687http://css.csail.mit.edu/6.858/2012/readings/android.pdfhttp://dx.doi.org/10.1109/MSP.2009.26http://dl.acm.org/citation.cfm?id=1512324http://doi.acm.org/10.1145/1165389.945464http://dl.acm.org/citation.cfm?id=945464http://dl.acm.org/citation.cfm?id=945464
  • 8/12/2019 ACM Techpack (Security)

    9/18

    http://www.ece.cmu.edu/~ece732/readings/cowan-vulnerability.pdfhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=821514&isnumber=17794http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=821514http://doi.acm.org/10.1145/358198.358210http://dl.acm.org/citation.cfm?id=358198.358210http://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.htmlhttp://doi.acm.org/10.1145/1653662.1653687
  • 8/12/2019 ACM Techpack (Security)

    10/18

    http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.6553http://dl.acm.org/citation.cfm?id=830533http://www.phrack.com/issues.html?issue=49&id=14%23article
  • 8/12/2019 ACM Techpack (Security)

    11/18

    http://crypto.stanford.edu/SpyBlock/spyblock.pdfhttp://dl.acm.org/citation.cfm?id=830533http://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.htmlhttp://dl.acm.org/citation.cfm?id=2073530
  • 8/12/2019 ACM Techpack (Security)

    12/18

    http://dl.acm.org/citation.cfm?id=1516046.1516066http://www.adambarth.com/papers/2008/barth-jackson-reis.pdfhttp://doi.acm.org/10.1145/1135777.1135884http://dl.acm.org/citation.cfm?id=1135884
  • 8/12/2019 ACM Techpack (Security)

    13/18

    http://dl.acm.org/citation.cfm?id=1214959http://dl.acm.org/citation.cfm?id=1214959http://dl.acm.org/citation.cfm?id=358346http://doi.acm.org/10.1145/1516046.1516066
  • 8/12/2019 ACM Techpack (Security)

    14/18

    http://css.csail.mit.edu/6.858/2012/readings/slammer.pdfhttp://dx.doi.org/10.1109/MSECP.2003.1219056http://dl.acm.org/citation.cfm?id=939954http://doi.acm.org/10.1145/66093.66095http://dl.acm.org/citation.cfm?id=66095http://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.html
  • 8/12/2019 ACM Techpack (Security)

    15/18

    http://dl.acm.org/citation.cfm?id=1951792http://dl.acm.org/citation.cfm?id=1211085http://static.usenix.org/event/hotbots07/tech/full_papers/daswani/daswani.pdfhttp://dl.acm.org/citation.cfm?id=1323139
  • 8/12/2019 ACM Techpack (Security)

    16/18

    http://doi.acm.org/10.1145/168588.168615http://dl.acm.org/citation.cfm?id=1951792http://crypto.stanford.edu/~dabo/pubs/abstracts/RSAattack-survey.htmlhttp://www.cs.ucdavis.edu/~rogaway/papers/cc.pdfhttp://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.html
  • 8/12/2019 ACM Techpack (Security)

    17/18

    http://people.csail.mit.edu/rivest/Rivest-Cryptography.pdfhttp://dl.acm.org/citation.cfm?id=114885http://dl.acm.org/citation.cfm?id=1206501http://dl.acm.org/citation.cfm?id=1206501
  • 8/12/2019 ACM Techpack (Security)

    18/18

    http://doi.acm.org/10.1145/1455770.1455774http://dl.acm.org/citation.cfm?id=1455770.1455774http://hqfs01/acmshr/Yan/Tech%20Packs/Security/security.html