×
This is the old CCSL page (no longer maintained). For the new site, click here .
Software Protection and Application Security
Security Issues in Instant Messaging
- M. Mannan, P.C. van Oorschot.
A Protocol for Secure Public Instant Messaging.
Financial Cryptography and Data Security (FC'06), Feb.27-Mar.2 2006, Anguilla,
British West Indies.
- M. Mannan, P.C. van Oorschot.
On Instant Messaging Worms, Analysis and Countermeasures.
ACM Workshop on Rapid Malcode (WORM'05), Nov. 2005, Fairfax, VA, USA.
- M. Mannan, P.C. van Oorschot.
Secure Public Instant Messaging: A Survey.
Privacy, Security and Trust (PST'04), Oct. 2004, Fredericton, New Brunswick,
Canada.
Software Protection and Application Security
-
G. Wurster, P.C. van Oorschot. System Configuration as a Privilege. USENIX HotSec'09, Montreal, Canada, Aug. 2009.
- G. Wurster, P.C. van Oorschot.
The Developer is the Enemy.
New Security Paradigms Workshop 2008 (NSPW'08), Lake Tahoe, California, USA,
Sept. 22-25, 2008.
- G. Wurster, P.C. van Oorschot. Self-signed
Executables: Restricting Replacement of Program Binaries by Malware. USENIX
HotSec'07 (2nd Workshop on Hot Topics in Security), Aug. 2007, Boston, MA, USA.
- A. Main, P.C. van Oorschot.
Software Protection and Application Security: Understanding the Battleground (Version of Dec. 31, 2003).
International Course on State of the Art and Evolution of
Computer Security and Industrial Cryptography, Heverlee, Belgium, June 2003.
Proceedings (revised papers): Springer LNCS (to appear).
- P.C. van Oorschot.
Revisiting Software Protection (invited paper) (Version of July 30, 2003).
6th International Information Security Conference (ISC 2003), Bristol, UK, October 2003.
Proceedings: pp.1-13, Springer LNCS 2851 (2003).
Whitebox Cryptography
- S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot.
White-Box Cryptography and an AES Implementation.
SAC 2002 - 9th Annual Workshop on Selected Areas in Cryptography,
Aug.15-16 2002, St. John's, Canada. Proceedings (revised papers):
pp.250-270, Springer LNCS 2595 (2003).
- S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot.
A White-Box DES Implementation for DRM Applications.
ACM CCS-9 Workshop DRM 2002 - 2nd ACM Workshop on Digital Rights Management,
Nov.18 2002, Wash. D.C. Proceedings (revised papers): pp.1-15, Springer LNCS 2696 (2003).
Software Tamper Resistance
- P.C. van Oorschot, A. Somayaji, G. Wurster.
Hardware-assisted Circumvention of Self-hashing Software Tamper Resistance.
IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 2, April-June
2005.
- G. Wurster, P. van Oorschot, A. Somayaji.
A Generic Attack on Checksumming-based Software Tamper Resistance.
IEEE Symposium on Security and Privacy, May. 2005, Oakland, CA, USA.