Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACSAC 2010
ACM
 
   
 
Options:
 
  1-3 of 3 reviews Date Reviewed 
  The case for in-the-lab botnet experimentation: creating and taking down a 3,000-node botnet
Calvet J., Davis C., Fernandez J., Marion J., St-Onge P., Guizani W., Bureau P., Somayaji A.  ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX,  Dec 6-10, 2010) 141-150, 2010. Type: Proceedings

The battle against botnets drives the need for specific studies aimed at achieving an in-depth understanding of the dynamics of their diffusion and operation. This is an essential prerequisite to the development of effective countermeasures....

Jun 17 2011
  Exploiting smart-phone USB connectivity for fun and profit
Wang Z., Stavrou A.  ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX,  Dec 6-10, 2010) 357-366, 2010. Type: Proceedings

Wang and Stavrou describe new attack vectors that use mobile phones. The basic idea is that, even though people are increasingly aware that wireless communication needs security mechanisms such as authentication or encryption, they implicitly trus...

Jun 14 2011
  Porscha: policy oriented secure content handling in Android
Ongtang M., Butler K., McDaniel P.  ACSAC 2010 (Proceedings of the 26th Annual Computer Security Applications Conference, Austin, TX,  Dec 6-10, 2010) 221-230, 2010. Type: Proceedings

There is little protection for the content downloaded to cell phones. In Android, it is up to the programmers to define what their applications can access--malicious applications can exploit this in order to access unauthorized data. The Open...

Apr 1 2011
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy