11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography[370] T. Telegraph. Bogus’ ap tweet about explosion at the white house wipes billions off usmarkets. http://www.telegraph.co.uk/finance/markets/10013768/Bogus-AP-tweetabout-explosion-at-the-White-House-wipes-billions-off-US-markets.html.[371] M. Ter Louw and V. Venkatakrishnan. Blueprint: Precise Browser-neutral Prevention ofCross-site Scripting Attacks. In Proceedings of the 30th IEEE Symposium on Security & Privacy,Oakland, CA, May 2009.[372] The Honeynet Project. Droidbox. https://code.google.com/p/droidbox/.[373] The SysSec Consortium. Deliverable D7.1: Review of the state-of-the-art in cyberattacks,June 2011.[374] K. Theocharoulis, I. Papaefstathiou, and C. Manifavas. Implementing rainbow tables inhigh-end fpgas for super-fast password cracking. In Proceedings of the 2010 InternationalConference on Field Programmable Logic and Applications, pages 145–150, 2010.[375] K. Thomas, C. Grier, and V. Paxson. Adapting social spam infrastructure for politicalcensorship. In Proceedings of the USENIX Workshop on Large-Scale Exploits and EmergentThreats (LEET), 2012.[376] O. Thonnard, L. Bilge, G. O’Gorman, S. Kiernan, and M. Lee. Industrial espionage andtargeted attacks: understanding the characteristics of an escalating threat. In RAID’12:Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses.Springer-Verlag, Sept. 2012.[377] Tim Rains - Microsoft. Using the past to p<strong>red</strong>ict the future: Top 5 threat p<strong>red</strong>ictions for2013. Internet. http://blogs.technet.com/b/security/archive/2012/12/13/usingthe-past-to-p<strong>red</strong>ict-the-future-top-5-threat-p<strong>red</strong>ictions-for-2013.aspx?Redirected=true, 2012.[378] V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacypreserving targeted advertising. In Proceedings of the 17th Network and Distributed SystemSecurity Symposium, 2010.[379] N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient online content voting. InProceedings of the 6th USENIX symposium on Networked systems design and implementation,pages 15–28, 2009.[380] C.-Y. Tseng and M.-S. Chen. Incremental SVM Model for Spam Detection on Dynamic EmailSocial Networks. 2009 International Conference on Computational Science and Engineering,pages 128–135, 2009.[381] K.-Y. Tseng, D. Chen, Z. Kalbarczyk, and R. K. Iyer. Characterization of the error resiliencyof power grid substation devices. In International Conference on Dependable Systems andNetworks. IEEE Computer Society, June 2012.[382] V. van der Veen, N. dutt Sharma, L. Cavallaro, and H. Bos. Memory Errors: The Past, thePresent, and the Future. In In Proceedings of the 15th International Symposium on Research inAttacks Intrusions and Defenses (RAID), September 2012.[383] R. Vigo. The Cyber-Physical Attacker. In dl.acm.org, pages 347–356. Springer BerlinHeidelberg, Berlin, Heidelberg, 2012.[384] B. Viswanath, M. Mondal, K. P. Gummadi, A. Mislove, and A. Post. Canal: scaling socialnetwork-based Sybil tolerance schemes. In Proceedings of the 7th ACM european conference onComputer Systems - EuroSys ’12, page 309. ACM Press, 2012.[385] B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An Analysis of Social Network-Based Sybil Defenses. In Proceedings of the ACM SIGCOMM 2010 conference, page 363, NewYork, New York, USA, 2010. ACM Press.[386] P. Vreugdenhil. Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit. http://vreugdenhilresearch.nl/Pwn2Own-2010-Windows7-InternetExplorer8.pdf.183

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!