w/in this Title
1-3 of 3 reviews
The case for in-the-lab botnet experimentation: creating and taking down a 3,000-node botnet
Calvet J., Davis C., Fernandez J., Marion J., St-Onge P., Guizani W., Bureau P., Somayaji A. ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, Dec 6-10, 2010) 141-150, 2010. Type: Proceedings
The battle against botnets drives the need for specific studies aimed at achieving an in-depth understanding of the dynamics of their diffusion and operation. This is an essential prerequisite to the development of effective countermeasures....
Jun 17 2011
Exploiting smart-phone USB connectivity for fun and profit
Wang Z., Stavrou A. ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, Dec 6-10, 2010) 357-366, 2010. Type: Proceedings
Wang and Stavrou describe new attack vectors that use mobile phones. The basic idea is that, even though people are increasingly aware that wireless communication needs security mechanisms such as authentication or encryption, they implicitly trus...
Jun 14 2011
Porscha: policy oriented secure content handling in Android
Ongtang M., Butler K., McDaniel P. ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX, Dec 6-10, 2010) 221-230, 2010. Type: Proceedings
There is little protection for the content downloaded to cell phones. In Android, it is up to the programmers to define what their applications can access--malicious applications can exploit this in order to access unauthorized data. The Open...
Apr 1 2011
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.