11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography[233] G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks withinstruction-set randomization. In Proceedings of the 10th ACM conference on Computer andcommunications security (CCS), pages 272–280, 2003.[234] P. G. Kelley, S. Komanduri, M. L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L. F.Cranor, and J. Lopez. Guess again (and again and again): Measuring password strengthby simulating password-cracking algorithms. In Proceedings of the 2012 IEEE Symposiumon Security and Privacy, Oakland ’12, pages 523–537, Washington, DC, USA, 2012. IEEEComputer Society.[235] V. P. Kemerlis, G. Portokalidis, K. Jee, and A. D. Keromytis. libdft: Practical Dynamic DataFlow Tracking for Commodity Systems. In Proc. of VEE, 2012.[236] A. Ki-Chan and H. Dong-Joo. Malware migrating to gaming consoles, 2010.http://defcon.org/images/defcon-18/dc-18-presentations/Chan-Joo/DEFCON-18-Chan-Joo-Malware-to-Gaming-Consoles.pdf.[237] J. Kinder, F. Zuleger, and H. Veith. An abstract interpretation-based framework for controlflow reconstruction from binaries. In Proceedings of the 10th International Conference onVerification, Model Checking, and Abstract Interpretation, VMCAI’09, 2009.[238] V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding.In Proceedings of the 11th USENIX Security Symposium, 2002.[239] G. Kontaxis, M. Polychronakis, A. D. Keromytis, and E. P. Markatos. Privacy-PreservingSocial Plugins. In Security’12 Proceedings of the 21st USENIX conference on Security symposium,2012.[240] J. Koo, X. Lin, and S. Bagchi. PRIVATUS: Wallet-Friendly Privacy Protection for SmartMeters. pages 343–360. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012.[241] M. Kosinski, D. Stillwell, and T. Graepel. Private traits and attributes are p<strong>red</strong>ictable fromdigital records of human behavior. Proceedings of the National Academy of Sciences, pages2–5, Mar. 2013.[242] B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. InProceeedings of the Workshop on Online Social Networks, 2008.[243] N. Kroes. Internet security: everyone’s responsibility, Feb. 2012. http://europa.eu/rapid/press-release_SPEECH-12-68_en.htm.[244] N. Kshetri. The Global Cybercrime Industry. Springer, 2010.[245] S. Kuo. Execute disable bit functionality blocks malware code execution, 2005. Intel Corp.http://cache-www.intel.com/cd/00/00/14/93/149307_149307.pdf.[246] M. La Polla, F. Martinelli, and D. Sgandurra. A survey on security for mobile devices.Communications Surveys Tutorials, IEEE, 15(1):446 –471, quarter 2013.[247] H.-y. Lam and D.-y. Yeung. A Learning Approach to Spam Detection based on SocialNetworks. In Conference on Email and Anti-Spam (CEAS), 2007.[248] L. Lamport. Password authentication with insecure communication. Commun. ACM,24(11):770–772, Nov 1981.[249] S. Landau, M. R. Stytz, C. E. Landwehr, and F. B. Schneider. Overview of Cyber Security:A Crisis of Prioritization. IEEE Security and Privacy, 03(3):9–11, 2005.[250] R. Langner. Enumerating Stuxnet’s exploits, 2011. http://www.langner.com/en/2011/06/07/enumerating-stuxnet%E2%80%99s-exploits/.[251] A. Lelli. Zeusbot/Spyeye P2P Updated, Fortifying the Botnet, 2012. Technical Reportby Symantec Labs: http://www.symantec.com/connect/node/2135671.[252] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs Over Time: Densification Laws,Shrinking Diameters and Possible Explanations. In Proceeding of the eleventh ACM SIGKDDinternational conference on Knowledge discovery in data mining - KDD ’05, page 177. ACMPress, 2005.176

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!