Search
w/in this Title
for Titles
All Reviews
ACSAC 2010
ACM
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-3 of 3 reviews
Date Reviewed
The case for in-the-lab botnet experimentation: creating and taking down a 3,000-node botnet
Calvet J., Davis C., Fernandez J., Marion J., St-Onge P., Guizani W., Bureau P., Somayaji A. ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, Dec 6-10, 2010) 141-150, 2010. Type: Proceedings
The battle against botnets drives the need for specific studies aimed at achieving an in-depth understanding of the dynamics of their diffusion and operation. This is an essential prerequisite to the development of effective countermea...
Jun 17 2011
Exploiting smart-phone USB connectivity for fun and profit
Wang Z., Stavrou A. ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, Dec 6-10, 2010) 357-366, 2010. Type: Proceedings
Wang and Stavrou describe new attack vectors that use mobile phones. The basic idea is that, even though people are increasingly aware that wireless communication needs security mechanisms such as authentication or encryption, they imp...
Jun 14 2011
Porscha: policy oriented secure content handling in Android
Ongtang M., Butler K., McDaniel P. ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, Dec 6-10, 2010) 221-230, 2010. Type: Proceedings
There is little protection for the content downloaded to cell phones. In Android, it is up to the programmers to define what their applications can access--malicious applications can exploit this in order to access unauthorize...
Apr 1 2011
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy