Proceedings of the Acm Conference on Computer and Communications Security
-
Publication Venue For
- Trusted platform-as-a-service: A foundation for trustworthy cloud-hosted applications. 15-20. 2011
- Secure control of portable images in a virtual computing utility. 1-8. 2008
- BFT Protocol Forensics 2021
- RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication 2021
- On the Optimality of Optimistic Responsiveness 2020
- Efficient verifiable secret sharing with share recovery in BFT protocols 2019
- Flexible Byzantine fault tolerance 2019
- BEAT: Asynchronous BFT made practical 2018
- 8th ACM Cloud computing security workshop 2016
- A software approach to defeating side channels in last-level caches 2016
- Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition 2016
- Measurement and analysis of private key sharing in the HTTPS ecosystem 2016
- Mitigating storage side channels using statistical privacy mechanisms 2015
- Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration 2015
- An epidemiological study of malware encounters in a large enterprise 2014
- Cross-tenant side-channel attacks in PaaS clouds 2014
- Oblivious data structures 2014
- Uncovering large groups of active malicious accounts in online social networks 2014
- Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud 2013
- The post anachronism: The temporal dimension of Facebook privacy 2013
- Cross-VM side channels and their use to extract private keys 2012
- The security of modern password expiration: An algorithmic framework and empirical analysis 2010
- False data injection attacks against state estimation in electric power grids 2009
- Privacy-preserving genomic computation through program specialization 2009
- Towards practical biometric key generation with randomized biometric templates 2008
- Packet vaccine: Black-box exploit detection and signature generation 2006
- Fragile mixing 2004
- Mitigating bandwidth-exhaustion attacks using congestion puzzles 2004
- Automatic generation of two-party computations 2003
- Delegation of cryptographic servers for capture-resilient devices 2001