11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography[172] D. Evans. Top 25 technology p<strong>red</strong>ictions. Technical report, CISCO, 2009.[173] Face<strong>book</strong>. Social Authentication. 2011. http://www.face<strong>book</strong>.com/blog.php?post=486790652130.[174] Face<strong>book</strong>. Social Plugins. 2013. http://developers.face<strong>book</strong>.com/docs/plugins/.[175] N. Falliere. Sality: Story of a Peer-to-Peer Viral Network, 2011. Technical Report bySymantec Labs.[176] N. Falliere, L. O. Murchu, and E. Chien. W32. stuxnet dossier. Technical report, SymantecCorporation, 2011.[177] A. Felt and D. Evans. Privacy protection for social networking platforms. In Proceedings ofthe 2008 Workshop on Web 2.0 Security and Privacy.[178] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified.In CCS, 2011.[179] J. Fildes. Stuxnet worm ’targeted high-value iranian assets’. http://www.bbc.co.uk/news/technology-11388018, September 2010.[180] J. Fildes. Stuxnet virus targets and spread revealed. http://www.bbc.co.uk/news/technology-12465688, February 2011.[181] D. Florencio and C. Herley. A large-scale study of web password habits. In Proceedings ofthe 16th international conference on World Wide Web, WWW ’07, pages 657–666, New York,NY, USA, 2007. ACM.[182] D. Florencio and C. Herley. Is everything we know about password stealing wrong? IEEESecurity & Privacy, 10(6):63–69, 2012.[183] S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In Proceedingsof the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), 1997.[184] M. Frantzen and M. Shuey. Stackghost: Hardware facilitated stack protection. In Proceedingsof the 10 th USENIX Security Symposium, August 2001.[185] M. F<strong>red</strong>rikson and B. Livshits. RePriv: Re-envisioning in-browser privacy. In IEEESymposium on Security and Privacy, May 2011.[186] G. Fresi Roglia, L. Martignoni, R. Paleari, and D. Bruschi. Surgically returning to randomizedlib(c). In Proceedings of the 25th Annual Computer Security Applications Conference(ACSAC), 2009.[187] T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture forIntrusion Detection. In Proc. of NDSS, 2003.[188] S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazières, and H. Yu. RE: ReliableEmail. 3rd Symposium on Networked Systems Design and Implementation, 2006.[189] S. Gaw and E. W. Felten. Password management strategies for online accounts. InProceedings of the second symposium on Usable privacy and security, SOUPS ’06, pages 44–55,New York, NY, USA, 2006. ACM.[190] M. Gegick, L. Williams, J. Osborne, and M. Vouk. Prioritizing software security fortificationthrough code-level metrics. In Proc. of the 4th ACM workshop on Quality of protection, QoP’08.ACM Press, Oct. 2008.[191] B. Genge, C. Siaterlis, and M. Hohenadel. AMICI: An Assessment Platform for Multi-Domain Security Experimentation on Critical Infrastructures. ibs.ro, 2012.[192] B. Genge, C. Siaterlis, I. Nai Fovino, and M. Masera. A cyber-physical experimentationenvironment for the security analysis of networked industrial control systems. Computers& Electrical Engineering, 38(5):1146–1161, Sept. 2012.[193] GeogiaTech Research Institute and GeorgiaTech Information Security Center. Emergingcyber threats report 2013. Internet. http://www.gatech.edu/newsroom/release.html?nid=170981, 2012.173

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!