Export 9 results:
Filters: Author is John C. Mitchell  [Clear All Filters]
Bursztein E, Aigrain J, Moscicki A, Mitchell JC.  2014.  The End is Nigh: Generic Solving of Text-based CAPTCHAs. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Chan EM, Lam PE, Mitchell JC.  2013.  Understanding the Challenges with Medical Data Segmentation for Privacy. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
Giffin DB, Levy A, Stefan D, Terei D, Mazières D, Mitchell JC, Russo A.  2012.  Hails: Protecting Data Privacy in Untrusted Web Applications. 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). :47--60.
Briesemeister L, Dawson S, Lincoln P, Saïdi H, Thornton J, Durfee G, Kwan P, Stinson E, Oliner AJ, Mitchell JC.  2010.  Homogeneity as an Advantage: It Takes a Community to Protect an Application. 2010 Workshop on Collaborative Methods for Security and Privacy (CollSec 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test (CSET 10).
Barth A, Jackson C, Mitchell JC.  2008.  Securing Frame Communication in Browsers. 17th USENIX Security Symposium (USENIX Security 08).
Stinson E, Mitchell JC.  2008.  Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. 2nd USENIX Workshop on Offensive Technologies (WOOT 08).
Mitchell JC.  2002.  Formal Methods and Computer Security. 11th USENIX Security Symposium (USENIX Security 02).
Mitchell JC, Shmatikov V, Stern U.  1998.  Finite-State Analysis of SSL 3.0. 7th USENIX Security Symposium (USENIX Security 98).