Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Symposium Organizers
  • Registration Information
  • Registration Discounts
  • At a Glance
  • Calendar
  • Technical Sessions
  • Birds-of-a-Feather Sessions
  • Poster Session
  • Sponsorship
  • Workshops
  • Activities
  • Hotel and Travel Information
  • Services
  • Students
  • Questions
  • Help Promote!
  • Flyer PDF
  • For Participants
  • Call for Papers
  • Past Symposia

sponsors

Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner

twitter

Tweets by USENIXSecurity

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Media Coverage
Tweet

connect with us

http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Media Coverage

Zakir Durumeric on "ZMap: Fast Internet-wide Scanning and Its Security Applications"

Watch or listen to this presentation

  • ZMap: Scanning the Entire Internet in an Hour (WashingtonPost.com, 8.18.13)

Kevin Springborn on "Impression Fraud in On-line Advertising via Pay-Per-View Networks"

Watch or listen to this presentation

  • Advertisers Waste Over 180 Million a Year to Reach Robots (Examiner.com, 8.11.13)
  • How Pay-per-view Networks Cost Advertisers $180 Million a Year in Impression Fraud (MarketingLand.com, 8.13.13)
  • AOLs New Video Audience May Consist Largely of Robots (BusinessWeek.com, 8.16.13)

Tielei Wang on "Jekyll on iOS: When Benign Apps Become Evil"

Watch or listen to this presentation

  • Researchers Demo How Apps, Chargers Can Circumvent Security (NetworkWorld.com, 7.31.13)
  • Apple iOS Security Defeated by Sneaky App (InformationWeek.com, 8.16.13)
  • Apple Store's Malware Problem Exposed by Researchers (TGDaily.com, 8.16.13)
  • Remotely Assembled Malware Blows Past Apple's Screening Process (TechnologyReview.com, 8.16.13)
  • Researchers Show How to Slip Malware into Apple's App Store (GigaOm.com, 8.16.13)
  • Researchers Slip Malware onto Apple's App Store Again (News.CNET.com, 8.16.13)
  • Researchers Snuck Malware onto the App Store by Making it a Transformer (Gizmodo.com, 8.16.13)
  • Researchers Successfully Sneak Malware Through Apple's App Review Process (redOrbit.com, 8.18.13)
  • Fooling the Appstore One Code-chuck at a Time (TheRegister.co.uk, 8.19.13)

Kurt Thomas on "Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse"

Watch or listen to this presentation

  • Researchers Explore Underground Market of Twitter Spam and Abuse (CSOonline.com, 8.14.13)
  • The Underground Market for Spam Twitter Accounts (FastCompany.com, 8.14.13)
  • Twitter Scammers Earned Upwards of $459,000 in 10 Month Period (SocialNewsDaily.com, 8.15.13)
  • Buying Battles in the War on Twitter Spam (KrebsonSecurity.com, 8.16.13)
  • Researchers Put a Dent in the Twitter Underground (ThreatPost.com, 8.16.13)
  • Twitter Accounts Created to Spread Spam Malware are Easy to Create and Sell (SCMagazine.com, 8.16.13)

Andy Ozmet on "The White House's Priorities for Cybersecurity"

Watch or listen to this presentation

  • Don't Expect a Unicorn with Cybersecurity Standards, Ozment Says (MainJustice.com, 8.15.13)

Jiyong Jang on "Towards Automatic Software Lineage Inference"

Watch or listen to this presentation

  • Researchers Seek Better Ways to Track Malware's Family Tree (DarkReading.com, 8.15.13)

Terry Nelms on "ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates"

Watch or listen to this presentation

  • USENIX: Researchers Propose Security that Adapts to Combat Malware that Morphs (NetworkWorld.com, 8.14.13)

Devdatta Akhawe on "Alice in Warningland: A Large–Scale Field Student of Browser Security Warning Effectiveness"

Watch or listen to this presentation

  • Admins Warned: Drill SSL Knowledge into Your Chrome Users (TheRegister.co.uk, 8.10.13)

Nan Jiang on "Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space"

Watch or listen to this presentation

  • New Security Scheme Whacks Test Spammers in Hours (NetworkWorld.com, 8.8.13)

Roel Verdult on "Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer"

Watch or listen to this presentation

  • Car Hacking Scientists Agree to Delay Paper that Could Unlock Porsches (TheGuardian.com, 7.30.13)
  • Volkswagen Sues UK University After it Hacked Sports Cars (Telegraphy.co.uk, 7.30.13)
  • White Hat Luxury Car Hacker to Speak at USENIX Security Event Despite Injunction (NetworkWorld.com, 8.2.13)
  • Speculation Trumps Academic Freedom (EFF.org, 8.6.13)

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us