11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography[69] Obama Order Sped Up Wave of Cyberattacks Against Iran, June 2012.http://www.nytimes.com/2012/06/01/world/middleeast/obama-orde<strong>red</strong>-waveof-cyberattacks-against-iran.html?pagewanted=all&_r=1&.[70] U.S. Team and Israel Developed Iran Worm, June 2012. http://online.wsj.com/article/SB10001424052702304821304577440703810436564.html.[71] Cyberattack leaves natural gas pipelines vulnerable to sabotage, Feb. 2013.http://www.csmonitor.com/Environment/2013/0227/Exclusive-Cyberattackleaves-natural-gas-pipelines-vulnerable-to-sabotage.[72] Hello, Unit 61398, Feb. 2013. http://www.economist.com/blogs/analects/2013/02/chinese-cyber-attacks.[73] McAfee Threats Report: First Quarter 2013. http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf, 2013.[74] SANS SCADA and Process Control Security Survey, Feb. 2013. https://www.sans.org/reading_room/analysts_program/sans_survey_scada_2013.pdf.[75] Symantec Internet Security Threat Report 2013. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.enus.pdf,2013.[76] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In Proceedings ofthe 12th ACM conference on Computer and Communications Security (CCS), 2005.[77] B. Adida. Beamauth: two-factor web authentication with a <strong>book</strong>mark. In Proceedings of the14th ACM conference on Computer and communications security, CCS ’07, pages 48–57, NewYork, NY, USA, 2007. ACM.[78] G. Aggrawal, E. Bursztein, C. Jackson, and D. Boneh. An analysis of private browsingmodes in modern browsers. In Proceedings of 19th Usenix Security Symposium, 2010.[79] D. Akhawe and A. P. Felt. Alice in warningland: A large-scale field study of browsersecurity warning effectiveness. In Proceedings of the 22th USENIX Security Symposium, 2013.[80] P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory errorexploits with WIT. In Proceedings of the 2008 IEEE Symposium on Security and Privacy,S&P’08, 2008.[81] C. Albanesius. Google: Wi-Fi Sniffing Collected Whole E-Mails, URLs, Passwords. PC-MAG.COM, October 2010. http://www.pcmag.com/author-bio/chloe-albanesius.[82] S. Alexander. Defeating compiler-level buffer overflow protection. USENIX ;login:, 30(3):59–71, June 2005.[83] S. Anand, M. Naik, H. Yang, and M. Harrold. Automated concolic testing of smartphoneapps. In Proc. of FSE, 2012.[84] Anonymous. Why we protest. http://whyweprotest.net/community/.[85] M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon.From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In Proceedingsof the 21st USENIX Security Symposium, 2012.[86] C. Arthur. Conficker is a lesson for MPs - especially over ID cards. The Guardian,http://www.guardian.co.uk/technology/2009/apr/02/conficker-parliamentsecurity-charles-arthur,2009.[87] E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. G.Anagnostakis, and E. P. Markatos. Information Security. In T.-C. Wu, C.-L. Lei, V. Rijmen,and D.-T. Lee, editors, ISC ’08 Proceedings of the 11th international conference on InformationSecurity, volume 5222 of Lecture Notes in Computer Science, pages 146–160. Springer BerlinHeidelberg, 2008.168

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!