- Symposium Organizers
- Registration Information
- Registration Discounts
- At a Glance
- Technical Sessions
- Birds-of-a-Feather Sessions
- Poster Session
- Hotel and Travel Information
- Help Promote!
- Flyer PDF
- For Participants
- Call for Papers
- Past Symposia
You are here
Home » Media Coverage
Zakir Durumeric on "ZMap: Fast Internet-wide Scanning and Its Security Applications"
- ZMap: Scanning the Entire Internet in an Hour (WashingtonPost.com, 8.18.13)
Kevin Springborn on "Impression Fraud in On-line Advertising via Pay-Per-View Networks"
- Advertisers Waste Over 180 Million a Year to Reach Robots (Examiner.com, 8.11.13)
- How Pay-per-view Networks Cost Advertisers $180 Million a Year in Impression Fraud (MarketingLand.com, 8.13.13)
- AOLs New Video Audience May Consist Largely of Robots (BusinessWeek.com, 8.16.13)
Tielei Wang on "Jekyll on iOS: When Benign Apps Become Evil"
- Researchers Demo How Apps, Chargers Can Circumvent Security (NetworkWorld.com, 7.31.13)
- Apple iOS Security Defeated by Sneaky App (InformationWeek.com, 8.16.13)
- Apple Store's Malware Problem Exposed by Researchers (TGDaily.com, 8.16.13)
- Remotely Assembled Malware Blows Past Apple's Screening Process (TechnologyReview.com, 8.16.13)
- Researchers Show How to Slip Malware into Apple's App Store (GigaOm.com, 8.16.13)
- Researchers Slip Malware onto Apple's App Store Again (News.CNET.com, 8.16.13)
- Researchers Snuck Malware onto the App Store by Making it a Transformer (Gizmodo.com, 8.16.13)
- Researchers Successfully Sneak Malware Through Apple's App Review Process (redOrbit.com, 8.18.13)
- Fooling the Appstore One Code-chuck at a Time (TheRegister.co.uk, 8.19.13)
Kurt Thomas on "Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"
- Researchers Explore Underground Market of Twitter Spam and Abuse (CSOonline.com, 8.14.13)
- The Underground Market for Spam Twitter Accounts (FastCompany.com, 8.14.13)
- Twitter Scammers Earned Upwards of $459,000 in 10 Month Period (SocialNewsDaily.com, 8.15.13)
- Buying Battles in the War on Twitter Spam (KrebsonSecurity.com, 8.16.13)
- Researchers Put a Dent in the Twitter Underground (ThreatPost.com, 8.16.13)
- Twitter Accounts Created to Spread Spam Malware are Easy to Create and Sell (SCMagazine.com, 8.16.13)
Andy Ozmet on "The White House's Priorities for Cybersecurity"
- Don't Expect a Unicorn with Cybersecurity Standards, Ozment Says (MainJustice.com, 8.15.13)
Jiyong Jang on "Towards Automatic Software Lineage Inference"
- Researchers Seek Better Ways to Track Malware's Family Tree (DarkReading.com, 8.15.13)
Terry Nelms on "ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates"
- USENIX: Researchers Propose Security that Adapts to Combat Malware that Morphs (NetworkWorld.com, 8.14.13)
Devdatta Akhawe on "Alice in Warningland: A Large–Scale Field Student of Browser Security Warning Effectiveness"
- Admins Warned: Drill SSL Knowledge into Your Chrome Users (TheRegister.co.uk, 8.10.13)
Nan Jiang on "Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space"
- New Security Scheme Whacks Test Spammers in Hours (NetworkWorld.com, 8.8.13)
Roel Verdult on "Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer"
- Car Hacking Scientists Agree to Delay Paper that Could Unlock Porsches (TheGuardian.com, 7.30.13)
- Volkswagen Sues UK University After it Hacked Sports Cars (Telegraphy.co.uk, 7.30.13)
- White Hat Luxury Car Hacker to Speak at USENIX Security Event Despite Injunction (NetworkWorld.com, 8.2.13)
- Speculation Trumps Academic Freedom (EFF.org, 8.6.13)