↓ Skip to main content

Computer Security – ESORICS 2009

Overview of attention for book
Cover of 'Computer Security – ESORICS 2009'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
  3. Altmetric Badge
    Chapter 2 User-Centric Handling of Identity Agent Compromise
  4. Altmetric Badge
    Chapter 3 The Coremelt Attack
  5. Altmetric Badge
    Chapter 4 Type-Based Analysis of PIN Processing APIs
  6. Altmetric Badge
    Chapter 5 Declassification with Explicit Reference Points
  7. Altmetric Badge
    Chapter 6 Tracking Information Flow in Dynamic Tree Structures
  8. Altmetric Badge
    Chapter 7 Lightweight Opportunistic Tunneling (LOT)
  9. Altmetric Badge
    Chapter 8 Hide and Seek in Time — Robust Covert Timing Channels
  10. Altmetric Badge
    Chapter 9 Authentic Time-Stamps for Archival Storage
  11. Altmetric Badge
    Chapter 10 Towards a Theory of Accountability and Audit
  12. Altmetric Badge
    Chapter 11 Reliable Evidence: Auditability by Typing
  13. Altmetric Badge
    Chapter 12 PCAL: Language Support for Proof-Carrying Authorization Systems
  14. Altmetric Badge
    Chapter 13 ReFormat: Automatic Reverse Engineering of Encrypted Messages
  15. Altmetric Badge
    Chapter 14 Protocol Normalization Using Attribute Grammars
  16. Altmetric Badge
    Chapter 15 Automatically Generating Models for Botnet Detection
  17. Altmetric Badge
    Chapter 16 Dynamic Enforcement of Abstract Separation of Duty Constraints
  18. Altmetric Badge
    Chapter 17 Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging
  19. Altmetric Badge
    Chapter 18 Requirements and Protocols for Inference-Proof Interactions in Information Systems
  20. Altmetric Badge
    Chapter 19 A Privacy Preservation Model for Facebook-Style Social Network Systems
  21. Altmetric Badge
    Chapter 20 New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
  22. Altmetric Badge
    Chapter 21 Secure Pseudonymous Channels
  23. Altmetric Badge
    Chapter 22 Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
  24. Altmetric Badge
    Chapter 23 Content Delivery Networks: Protection or Threat?
  25. Altmetric Badge
    Chapter 24 Model-Checking DoS Amplification for VoIP Session Initiation
  26. Altmetric Badge
    Chapter 25 The Wisdom of Crowds: Attacks and Optimal Constructions
  27. Altmetric Badge
    Chapter 26 Secure Evaluation of Private Linear Branching Programs with Medical Applications
  28. Altmetric Badge
    Chapter 27 Keep a Few: Outsourcing Data While Maintaining Confidentiality
  29. Altmetric Badge
    Chapter 28 Data Structures with Unpredictable Timing
  30. Altmetric Badge
    Chapter 29 WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
  31. Altmetric Badge
    Chapter 30 Corruption-Localizing Hashing
  32. Altmetric Badge
    Chapter 31 Isolating JavaScript with Filters, Rewriting, and Wrappers
  33. Altmetric Badge
    Chapter 32 An Effective Method for Combating Malicious Scripts Clickbots
  34. Altmetric Badge
    Chapter 33 Client-Side Detection of XSS Worms by Monitoring Payload Propagation
  35. Altmetric Badge
    Chapter 34 Formal Indistinguishability Extended to the Random Oracle Model
  36. Altmetric Badge
    Chapter 35 Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
  37. Altmetric Badge
    Chapter 36 Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
  38. Altmetric Badge
    Chapter 37 A Generic Security API for Symmetric Key Management on Cryptographic Devices
  39. Altmetric Badge
    Chapter 38 ID-Based Secure Distance Bounding and Localization
  40. Altmetric Badge
    Chapter 39 Secure Ownership and Ownership Transfer in RFID Systems
  41. Altmetric Badge
    Chapter 40 Cumulative Attestation Kernels for Embedded Systems
  42. Altmetric Badge
    Chapter 41 Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
  43. Altmetric Badge
    Chapter 42 Computer Security – ESORICS 2009
Attention for Chapter 1: Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
Altmetric Badge

Mentioned by

news
1 news outlet

Citations

dimensions_citation
6 Dimensions

Readers on

mendeley
132 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
Chapter number 1
Book title
Computer Security – ESORICS 2009
Published by
Springer, Berlin, Heidelberg, September 2009
DOI 10.1007/978-3-642-04444-1_1
Book ISBNs
978-3-64-204443-4, 978-3-64-204444-1
Authors

Thorsten Holz, Markus Engelberth, Felix Freiling, Holz, Thorsten, Engelberth, Markus, Freiling, Felix

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 132 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 3 2%
United Kingdom 2 2%
Italy 1 <1%
Australia 1 <1%
Netherlands 1 <1%
India 1 <1%
South Africa 1 <1%
China 1 <1%
United States 1 <1%
Other 0 0%
Unknown 120 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 39 30%
Student > Master 23 17%
Researcher 20 15%
Student > Bachelor 13 10%
Student > Doctoral Student 7 5%
Other 20 15%
Unknown 10 8%
Readers by discipline Count As %
Computer Science 92 70%
Engineering 7 5%
Social Sciences 4 3%
Economics, Econometrics and Finance 4 3%
Business, Management and Accounting 2 2%
Other 7 5%
Unknown 16 12%