Export 9 results:
Filters: Author is John C. Mitchell  [Clear All Filters]
Bursztein E, Aigrain J, Moscicki A, Mitchell JC.  2014.  The End is Nigh: Generic Solving of Text-based CAPTCHAs. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
Chan EM, Lam PE, Mitchell JC.  2013.  Understanding the Challenges with Medical Data Segmentation for Privacy. 2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13).
Giffin DB, Levy A, Stefan D, Terei D, Mazières D, Mitchell JC, Russo A.  2012.  Hails: Protecting Data Privacy in Untrusted Web Applications. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :47--60.
Briesemeister L, Dawson S, Lincoln P, Saïdi H, Thornton J, Durfee G, Kwan P, Stinson E, Oliner AJ, Mitchell JC.  2010.  Homogeneity as an Advantage: It Takes a Community to Protect an Application. 2010 Workshop on Collaborative Methods for Security and Privacy (CollSec 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test ({CSET} 10).
Barth A, Jackson C, Mitchell JC.  2008.  Securing Frame Communication in Browsers. 17th {USENIX} Security Symposium ({USENIX} Security 08).
Stinson E, Mitchell JC.  2008.  Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. 2nd {USENIX} Workshop on Offensive Technologies ({WOOT} 08).
Mitchell JC.  2002.  Formal Methods and Computer Security. 11th {USENIX} Security Symposium ({USENIX} Security 02).
Mitchell JC, Shmatikov V, Stern U.  1998.  Finite-State Analysis of SSL 3.0. 7th {USENIX} Security Symposium ({USENIX} Security 98).