Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 16 Issue 2, September 2013

Modelling Access Propagation in Dynamic Systems
Thomas Leonard, Martin Hall-May, Mike Surridge
Article No.: 5
DOI: 10.1145/2516951.2516952

Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often...

DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows
Yueqiang Cheng, Xuhua Ding, Robert H. Deng
Article No.: 6
DOI: 10.1145/2505123

Most commodity peripheral devices and their drivers are geared to achieve high performance with security functions being opted out. The absence of strong security measures invites attacks on the I/O data and consequently posts threats to those...

Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Yangchun Fu, Zhiqiang Lin
Article No.: 7
DOI: 10.1145/2505124

It is generally believed to be a tedious, time-consuming, and error-prone process to develop a virtual machine introspection (VMI) tool because of the semantic gap. Recent advance shows that the semantic-gap can be largely narrowed by reusing the...

Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
Abdul Serwadda, Vir V. Phoha
Article No.: 8
DOI: 10.1145/2516960

Research on keystroke-based authentication has traditionally assumed human impostors who generate forgeries by physically typing on the keyboard. With bots now well understood to have the capacity to originate precisely timed keystroke sequences,...