Journal: ACM Trans. Inf. Syst. Secur.

Volume 16, Issue 4

13 -- 0Yossi Gilad, Amir Herzberg. Off-Path TCP Injection Attacks
14 -- 0Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel. Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains
15 -- 0Liqun Chen, Hoon Wei Lim, Guomin Yang. Cross-Domain Password-Based Authenticated Key Exchange Revisited
16 -- 0Teh-Chung Chen, Torin Stepan, Scott Dick, James Miller. An Anti-Phishing System Employing Diffused Information
17 -- 0Konstantine Arkoudas, Ritu Chadha, Cho-Yu Jason Chiang. Sophisticated Access Control via SMT and Logical Frameworks

Volume 16, Issue 3

9 -- 0Mengtao Sun, Gang Tan, Joseph Siefers, Bin Zeng 0004, Greg Morrisett. Bringing java's wild native world under control
10 -- 0Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz. An experimental security analysis of two satphone standards
11 -- 0Marina Blanton, Yihua Zhang, Keith B. Frikken. Secure and verifiable outsourcing of large-scale biometric computations
12 -- 0Peter Williams, Radu Sion. Access privacy and correctness on untrusted storage

Volume 16, Issue 2

5 -- 0Thomas Leonard, Martin Hall-May, Mike Surridge. Modelling Access Propagation in Dynamic Systems
6 -- 0Yueqiang Cheng, Xuhua Ding, Robert H. Deng. DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows
7 -- 0Yangchun Fu, Zhiqiang Lin. Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
8 -- 0Abdul Serwadda, Vir V. Phoha. Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings

Volume 16, Issue 1

1 -- 0Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter. CPM: Masking Code Pointers to Prevent Code Injection Attacks
2 -- 0William E. Cobb, Rusty O. Baldwin, Eric D. Laspe. Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations
3 -- 0David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu. Enforceable Security Policies Revisited
4 -- 0Jason Crampton, Gregory Gutin, Anders Yeo. On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem