11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography[150] D. Desai. Malware Analysis Report: Trojan: AndroidOS/Zitmo, Semptember2011. http://www.kindsight.net/sites/default/files/android_trojan_zitmo_final_pdf_17585.pdf.[151] S. Designer. Non-executable user stack. http://www.openwall.com/linux/.[152] A. Dey and S. Weis. Pseudoid: Enhancing privacy in federated login. In Hot Topics inPrivacy Enhancing Technologies, 2010.[153] R. Dhamija, J. Tygar, and M. Hearst. Why Phishing Works. In Proceedings of the SIGCHIConference on Human Factors in Computing Systems, pages 581–590. ACM New York, NY,USA, 2006.[154] R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHIconference on Human Factors in computing systems. ACM, 2006.[155] T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF,August 2008. https://tools.ietf.org/html/rfc5246.[156] Q. Ding, N. Katenka, P. Barford, E. Kolaczyk, and M. Crovella. Intrusion as (anti)socialcommunication. In Proceedings of the 18th ACM SIGKDD conference on Knowledge discoveryand data mining - KDD ’12, page 886, 2012.[157] D. Dittrich. So You Want to Take Over a Botnet. In Proceedings of the 5th USENIX conferenceon Large-Scale Exploits and Emergent Threats, 2012.[158] P. Durance and M. Godet. Scenario building: Uses and abuse. Technological Forecasting andSocial Change, 77:1488–1492, 2010.[159] T. Durden. Bypassing PaX ASLR protection. Phrack, 11(59), 2002.[160] P. Eckersley. How unique is your web browser? In Proceedings of the Privacy EnhancingTechnologies Symposium (PETS), 2010.[161] M. Egele. Invited talk: The state of mobile security. In DIMVA, 2012.[162] M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting privacy leaks in iosapplications. In NDSS, 2011.[163] M. Egele, A. Moser, C. Kruegel, and E. Kirda. Pox: Protecting users from maliciousface<strong>book</strong> applications. In Proceedings of 3rd Workshop on Security and Social Networking, 2011.[164] M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. Compa: Detecting compromisedaccounts on social networks. In ISOC Network and Distributed System Security Symposium(NDSS), 2013.[165] M. W. Eichin and J. A. Rochlis. With Microscope and Tweezers: An Analysis of the InternetVirus of November 1988. In Proceedings of the IEEE Symposium on Security & Privacy, pages326–344, 1989.[166] EMC. The Digital Universe is Still Growing. http://www.emc.com/leadership/programs/digital-universe.htm, 2009.[167] W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: aninformation-flow tracking system for realtime privacy monitoring on smartphones. In Proc.of USENIX OSDI, 2010.[168] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android applicationsecurity. In USENIX Security, Berkeley, CA, USA, 2011.[169] W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification.In CCS, 2009.[170] Ú. Erlingsson. Low-level software security: Attack and defenses. Technical Report MSR-TR-07-153, Microsoft Research, 2007. http://research.microsoft.com/pubs/64363/tr-2007-153.pdf.[171] European Commission. Cybersecurity Strategy of the European Union: An Open, Safe andSecure Cyberspace, Feb. 2013.172

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!