Biblio

Export 9 results:
Filters: Author is John C. Mitchell  [Clear All Filters]
2014
Bursztein E, Aigrain J, Moscicki A, Mitchell JC.  2014.  The End is Nigh: Generic Solving of Text-based CAPTCHAs. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
2013
Chan EM, Lam PE, Mitchell JC.  2013.  Understanding the Challenges with Medical Data Segmentation for Privacy. 2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13).
2012
Giffin DB, Levy A, Stefan D, Terei D, Mazières D, Mitchell JC, Russo A.  2012.  Hails: Protecting Data Privacy in Untrusted Web Applications. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :47--60.
2010
Briesemeister L, Dawson S, Lincoln P, Saïdi H, Thornton J, Durfee G, Kwan P, Stinson E, Oliner AJ, Mitchell JC.  2010.  Homogeneity as an Advantage: It Takes a Community to Protect an Application. 2010 Workshop on Collaborative Methods for Security and Privacy (CollSec 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test ({CSET} 10).
2008
Barth A, Jackson C, Mitchell JC.  2008.  Securing Frame Communication in Browsers. 17th {USENIX} Security Symposium ({USENIX} Security 08).
Stinson E, Mitchell JC.  2008.  Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. 2nd {USENIX} Workshop on Offensive Technologies ({WOOT} 08).
2002
Mitchell JC.  2002.  Formal Methods and Computer Security. 11th {USENIX} Security Symposium ({USENIX} Security 02).
1998
Mitchell JC, Shmatikov V, Stern U.  1998.  Finite-State Analysis of SSL 3.0. 7th {USENIX} Security Symposium ({USENIX} Security 98).