Journal: ACM Trans. Inf. Syst. Secur.

Volume 21, Issue 4

0 -- 0Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim. Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption
0 -- 0Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz. Verifiable Graph Processing
0 -- 0Guixin Ye, Zhanyong Tang, Dingyi Fang, XiaoJiang Chen, Willy Wolff, Adam J. Aviv, Zheng Wang 0001. A Video-based Attack for Android Pattern Lock
0 -- 0Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia. VULCON: A System for Vulnerability Prioritization, Mitigation, and Management
0 -- 0Fanny Lalonde Lévesque, Sonia Chiasson, Anil Somayaji, José M. Fernandez. Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach

Volume 21, Issue 3

0 -- 0Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero. Security Evaluation of a Banking Fraud Analysis System
0 -- 0Elizabeth Stobert, Robert Biddle. The Password Life Cycle
0 -- 0Siqi Zhao, Xuhua Ding. FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems
0 -- 0Florian Kelbert, Alexander Pretschner. Data Usage Control for Distributed Systems
0 -- 0Fengguo Wei, Sankardas Roy, Xinming Ou, Robby. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps

Volume 21, Issue 2

0 -- 0Saed Alrabaee, Paria Shirani, Lingyu Wang 0001, Mourad Debbabi. FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
0 -- 0Benny Pinkas, Thomas Schneider 0003, Michael Zohner. Scalable Private Set Intersection Based on OT Extension
0 -- 0Roberto Giacobazzi, Isabella Mastroeni. Abstract Non-Interference: A Unifying Framework for Weakening Information-flow
0 -- 0Yihua Zhang, Marina Blanton, Ghada Almashaqbeh. Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler
0 -- 0Yunmok Son, Juhwan Noh, Jaeyeong Choi, Yongdae Kim. GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes

Volume 21, Issue 1

0 -- 0AbdelRahman Abdou, Paul C. van Oorschot. Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication
0 -- 0Hao Shi, Jelena Mirkovic, Abdulla Alwabel. Handling Anti-Virtual Machine Techniques in Malicious Software
0 -- 0Neil Zhenqiang Gong, Bin Liu. Attribute Inference Attacks in Online Social Networks
0 -- 0Sarani Bhattacharya, Debdeep Mukhopadhyay. Utilizing Performance Counters for Compromising Public Key Ciphers
0 -- 0Marcus Botacin, Paulo Lício de Geus, André Grégio. Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging