11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography[387] D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automateddetection of buffer overrun vulnerabilities. In Proceedings of the Network and DistributedSystems Security Symposium (NDSS), 2000.[388] D. Wang, L. Kaplan, H. Le, and T. Abdelzaher. On truth discovery in social sensing. InProceedings of the 11th international conference on Information Processing in Sensor Networks -IPSN ’12, page 233. ACM Press, 2012.[389] H. J. Wang, X. Fan, J. Howell, and C. Jackson. Protection and Communication Abstractionsfor Web Browsers in MashupOS. In T. C. Bressoud and M. F. Kaashoek, editors, SOSP,pages 1–16. ACM, 2007.[390] H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The Multi-Principal OS Construction of the Gazelle Web Browser. In Proceedings of the 18th USENIXSecurity Symposium, Montreal, Canada, August 2009.[391] R. Wang, S. Chen, and X. Wang. Signing me onto your accounts through face<strong>book</strong> andgoogle: A traffic-guided security study of commercially deployed single-sign-on webservices. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP ’12, pages365–379, Washington, DC, USA, 2012. IEEE Computer Society.[392] W. Wang and Z. Lu. Cyber security in the Smart Grid: Survey and challenges. ComputerNetworks, Jan. 2013.[393] Websense. 2013 threat report. Internet. http://www.websense.com/content/websense-2013-threat-report.aspx?intcmp=hp-promo-pod-en-2013-threat-reportpreorder,2012.[394] WEF. Global Risk 2012 Report. Seventh Edition. Technical report, World Economic Forum -WEF, 2012.[395] D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. S. G. I. T. o. Rohde. Protecting Smart GridAutomation Systems Against Cyberattacks. Smart Grid, IEEE Transactions on, 2(4), 2011.[396] M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creationpolicies by attacking large sets of revealed passwords. In Proceedings of the 17th ACMconference on Computer and communications security, CCS ’10, pages 162–175, New York, NY,USA, 2010. ACM.[397] T. Werner. Botnet Shutdown Success Story: How Kaspersky Lab Disabled the Hlux/KelihosBotnet, 2011. Technical Report: http://www.securelist.com/en/blog/208193137/.[398] K. Wilhoit. Who’s Really Attacking Your ICS Equipment? pages 1–18, Mar. 2013.[399] H. Wimberly and L. M. Liebrock. Using fingerprint authentication to <strong>red</strong>uce systemsecurity: An empirical study. In Proceedings of the 2011 IEEE Symposium on Security andPrivacy, pages 32–46, 2011.[400] J. Wyke. ZeroAccess, 2012. Technical Report by SophosLabs.[401] L. Xu, F. Sun, and Z. Su. Constructing precise control flow graphs from binaries. Technicalreport, Department of Computer Science, UC Davis, 2009.[402] R. Xu, H. Saıdi, and R. Anderson. Aurasium: Practical policy enforcement for androidapplications. In Proc. of USENIX Security, 2012.[403] G. Yan, S. Chen, and S. Eidenbenz. RatBot: Anti-enumeration Peer-to-Peer Botnets. InLecture Notes in Computer Science, vol. 7001, 2011.[404] G. Yan, D. T. Ha, and S. Eidenbenz. AntBot: Anti-Pollution Peer-to-Peer Botnets. In Journalof Computer Networks, vol. 55, 2011.[405] L.-K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing OS and Dalvik SemanticViews for Dynamic Android Malware Analysis. In Proc. of USENIX Security, 2012.[406] C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers’ social networksfor fun and profit. In Proceedings of the 21st international conference on World Wide Web -WWW ’12, page 71. ACM Press, 2012.184

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!