Filter
Conference contribution

Search results

  • 2023

    A Tagging Solution to Discover IoT Devices in Apartments

    Kaplan, B., Lopez-Toledo, I. J., Gunter, C. & Qian, J., Dec 4 2023, Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023. Association for Computing Machinery, p. 205-215 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • EDoG: Adversarial Edge Detection for Graph Neural Networks

    Xu, X., Wang, H., Lal, A., Gunter, C. A. & Li, B., 2023, Proceedings - 2023 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2023. Institute of Electrical and Electronics Engineers Inc., p. 291-305 15 p. (Proceedings - 2023 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Evaluating User Behavior in Smartphone Security: A Psychometric Perspective

    Huang, H. Y., Demetriou, S., Hassan, M., Tuncay, G. S., Gunter, C. A. & Bashir, M., 2023, Proceedings of the 19th Symposium on Usable Privacy and Security, SOUPS 2023. USENIX Association, p. 509-524 16 p. (Proceedings of the 19th Symposium on Usable Privacy and Security, SOUPS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to Cover up Anomalous Accesses to Electronic Health Records

    Xu, X., Hao, Q., Yang, Z., Li, B., Liebovitz, D., Wang, G. & Gunter, C. A., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 229-246 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The HandyTech's Coming between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson

    Anthony, D., Gunter, C. A., He, W., Khanafer, M., Landau, S., Mangar, R. & Reitinger, N., Nov 26 2023, WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society. Association for Computing Machinery, p. 129-134 6 p. (WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2021

    Detecting AI trojans using meta neural analysis

    Xu, X., Wang, Q., Li, H., Borisov, N., Gunter, C. A. & Li, B., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 103-120 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DOVE: A Data-Oblivious Virtual Environment

    Lee, H. B., Jois, T. M., Fletcher, C. W. & Gunter, C. A., 2021, 28th Annual Network and Distributed System Security Symposium, NDSS 2021. The Internet Society, (28th Annual Network and Distributed System Security Symposium, NDSS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators

    Long, Y., Wang, B., Yang, Z., Kailkhura, B., Zhang, A., Gunter, C. A. & Li, B., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, M., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (eds.). Neural information processing systems foundation, p. 2965-2977 13 p. (Advances in Neural Information Processing Systems; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    A Hypothesis Testing Approach to Sharing Logs with Confidence

    Long, Y., Xu, L. & Gunter, C. A., Mar 16 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 307-318 12 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Pragmatic Approach to Membership Inferences on Machine Learning Models

    Long, Y., Wang, L., Bu, D., Bindschaedler, V., Wang, X., Tang, H., Gunter, C. A. & Chen, K., Sep 2020, Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020. Institute of Electrical and Electronics Engineers Inc., p. 521-534 14 p. 9230385. (Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • See no evil: Phishing for permissions with false transparency

    Tuncay, G. S., Qian, J. & Gunter, C. A., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 415-432 18 p. (Proceedings of the 29th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis

    Wang, Q., Ul Hassan, W., Li, D., Jee, K., Yu, X., Zou, K., Rhee, J., Chen, Z., Cheng, W., Gunter, C. A. & Chen, H., 2020, 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society, (27th Annual Network and Distributed System Security Symposium, NDSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2019

    Beeer: Distributed record and replay for medical devices in hospital operating rooms

    Hojjati, A., Demetriou, S., Long, Y. & Gunter, C. A., Apr 1 2019, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019. Association for Computing Machinery, a1. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Charting the atack surface of trigger-action IoT platforms

    Wang, Q., Datta, P., Yang, W., Liu, S., Bates, A. & Gunter, C. A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1439-1453 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2018

    CommanderSong: A systematic approach for practical adversarial voice recognition

    Yuan, X., Chen, Y., Zhao, Y., Long, Y., Liu, X., Chen, K., Zhang, S., Huang, H., Wang, X. F. & Gunter, C. A., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 49-64 16 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fear and Logging in the Internet of Things

    Wang, Q., Ul Hassan, W., Bates, A. & Gunter, C., 2018, 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society, (25th Annual Network and Distributed System Security Symposium, NDSS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • NRF: A naive re-identification framework

    Santu, S. K. K., Bindschadler, V., Zhai, C. X. & Gunter, C. A., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 121-132 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Property inference attacks on fully connected neural networks using permutation invariant representations

    Ganju, K., Wang, Q., Yang, W., Gunter, C. A. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Resolving the Predicament of Android Custom Permissions

    Tuncay, G. S., Demetriou, S., Ganju, K. & Gunter, C. A., 2018, 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society, (25th Annual Network and Distributed System Security Symposium, NDSS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Response: Real-time, secure, and privacy-aware video redaction system

    Chen, B., Nahrstedt, K. & Gunter, C., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 39-48 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

    Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C. A., Zhou, X. & Grace, M., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, p. 122-133 12 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

    Wang, W., Chen, G., Pan, X., Zhang, Y., Wang, X. F., Bindschaedler, V., Tang, H. & Gunter, C. A., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2421-2434 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps

    Yang, W., Kong, D., Xie, T. & Gunter, C. A., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 288-302 15 p. (ACM International Conference Proceeding Series; vol. Part F132521).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

    Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    Draco: A system for uniform and fine-grained access control for web code on Android

    Tuncay, G. S., Demetriou, S. & Gunter, C. A., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 104-115 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Free for All! Assessing User Data Exposure to Advertising Libraries on Android

    Demetriou, S., Merrill, W., Yang, W., Zhang, A. & Gunter, C. A., 2016, 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society, (23rd Annual Network and Distributed System Security Symposium, NDSS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Leave your phone at the door: Side channels that reveal factory floor secrets

    Hojjati, A., Adhikari, A., Struckmann, K., Chou, E. J., Nguyen, T. N. T., Madan, K., Winslett, M. S., Gunter, C. A. & King, W. P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 883-894 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards mobile query auto-completion: An efficient mobile application-Aware approach

    Zhang, A., Goyal, A., Baeza-Yates, R., Chang, Y., Han, J., Gunter, C. A. & Deng, H., 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 579-590 12 p. (25th International World Wide Web Conference, WWW 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    AdaQAC: Adaptive query auto-completion via implicit negative feedback

    Zhang, A., Goyal, A., Kong, W., Deng, H., Dong, A., Chang, Y., Gunter, C. A. & Han, J., Aug 9 2015, SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. Association for Computing Machinery, p. 143-152 10 p. (SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Discovering de facto diagnosis specialties

    Lu, X., Zhang, A., Gunter, C., Fabbri, D., Liebovitz, D. & Malin, B., Sep 9 2015, BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, p. 7-16 10 p. (BCB 2015 - 6th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Network-on-chip firewall: Countering defective and malicious system-on-chip hardware

    LeMay, M. & Gunter, C. A., 2015, Logic, Rewriting and Concurrency - Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Ölveczky, P. C., Talcott, C. & Martí-Oliet, N. (eds.). Springer, p. 404-426 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9200).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Controlled functional encryption

    Naveed, M., Agrawal, S., Prabhakaran, M., Wang, X., Ayday, E., Hubaux, J. P. & Gunter, C. A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1280-1291 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions

    Zhang, W., Chen, Y., Cybulski, T. R., Fabbri, D., Gunter, C. A., Lawlor, P., Liebovitz, D. & Malin, B., Nov 3 2014, CCS 2014 - Proceedings of the 21st ACM Conference on Computer and Communications Security. November ed. Association for Computing Machinery, p. 1182-1192 11 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions

    Zhang, W., Chen, Y., Cybulski, T. R., Fabbri, D., Gunter, C. A., Lawlor, P., Liebovitz, D. & Malin, B., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1182-1192 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Detecting privacy-sensitive events in medical text

    Jindal, P., Gunter, C. A. & Roth, D., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, p. 617-620 4 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Dynamic searchable encryption via blind storage

    Naveed, M., Prabhakaran, M. & Gunter, C. A., Nov 13 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 639-654 16 p. 6956592. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Joint inference for end-to-end coreference resolution for clinical notes

    Jindal, P., Roth, D. & Gunter, C. A., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, p. 192-201 10 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy risk in anonymized heterogeneous information networks

    Zhang, A., Gunter, C. A., Xie, X., Han, J., Chang, K. C. C. & Wang, X., 2014, Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings. Leroy, V., Christophides, V., Christophides, V., Idreos, S., Kementsietsidis, A., Garofalakis, M. & Amer-Yahia, S. (eds.). OpenProceedings.org, University of Konstanz, University Library, p. 595-606 12 p. (Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    Evolving role definitions through permission invocation patterns

    Zhang, W., Chen, Y., Gunter, C. A., Liebovitz, D. & Malin, B., 2013, SACMAT 2013 - Proceedings of the 18th ACM Symposium on Access Control Models and Technologies. p. 37-47 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identity, location, disease and more: Inferring your secrets from android public resources

    Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X. F., Gunter, C. A. & Nahrstedt, K., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1017-1028 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and detecting anomalous topic access

    Gupta, S., Hanson, C., Gunter, C. A., Frank, M., Liebovitz, D. & Malin, B., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 100-105 6 p. 6578795. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Distributed non-intrusive load monitoring

    Bergman, D. C., Jin, D., Juen, J. P., Tanaka, N., Gunter, C. A. & Wright, A. K., 2011, 2011 IEEE PES Innovative Smart Grid Technologies, ISGT 2011. 5759180. (IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enforcing executing-implies-verified with the integrity-aware processor

    LeMay, M. & Gunter, C. A., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer, p. 202-216 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Making DTNs robust against spoofing attacks with localized countermeasures

    Uddin, M. Y. S., Khurshid, A., Jung, H. D., Gunter, C., Caesar, M. C. & Abdelzaher, T., 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 332-340 9 p. 5984915. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • MyABDAC: Compiling XACML policies for attribute-based database access control

    Jahid, S., Gunter, C., Hoque, I. & Okhravi, H., 2011, CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. p. 97-108 12 p. (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reliable telemetry in white spaces using remote attestation

    Fatemieh, O., LeMay, M. & Gunter, C. A., 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 323-332 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2010

    Diagnostic powertracing for sensor node failure analysis

    Khan, M. M. H., Le, H. K., LeMay, M., Moinzadeh, P., Wang, L., Yang, Y., Noh, D. K., Abdelzaher, T., Gunter, C. A., Han, J. & Jin, X., 2010, Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10. p. 117-128 12 p. (Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Low cost and secure smart meter communications using the TV white spaces

    Fatemieh, O., Chandra, R. & Gunter, C. A., 2010, Proceedings - ISRCS 2010 - 3rd International Symposium on Resilient Control Systems. p. 37-42 6 p. 5602162. (Proceedings - ISRCS 2010 - 3rd International Symposium on Resilient Control Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure collaborative sensing for crowdsourcing spectrum data in white space networks

    Fatemieh, O., Chandra, R. & Gunter, C. A., 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, DySPAN 2010. 5457893. (2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, DySPAN 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    A medical database case study for reflective database access control

    Olson, L. E., Gunter, C. A. & Olson, S. P., 2009, Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, SPIMACS '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 41-51 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access