Conferences

Search results

    TitleConferenceSpeaker(s)
    Spyglass: Demand-Provisioned Linux Containers for Private Network AccessLISA15Patrick T. Cable II, Nabil Schear
    Q&A Video OnlyLISA15James Mickens
    Perspectives on Securing CyberspaceUSENIX Security '15Deborah A. Frincke
    Using Formal Methods to Eliminate Exploitable BugsUSENIX Security '15Kathleen Fisher
    EVILCOHORT: Detecting Communities of Malicious Accounts on Online ServicesUSENIX Security '15Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna
    Preventing Security Bugs through Software DesignUSENIX Security '15Christoph Kern
    Why Johnny and Janie Can’t Code Safely: Bringing Software Assurance to the MassesUSENIX Security '15Bart Miller
    Conducting Usable Security Studies: It's ComplicatedUSENIX Security '15Lorrie Faith Cranor
    De-anonymizing Programmers via Code StylometryUSENIX Security '15Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, Rachel Greenstadt
    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLSUSENIX Security '15Christina Garman, Kenneth G. Paterson, Thyla Van der Merwe
    Transforming Innovative Security Concepts into Disruptive Security CompaniesUSENIX Security '15Rick Gordon
    Machine vs. Machine: Lessons from the First Year of Cyber Grand ChallengeUSENIX Security '15Mike Walker
    Inherent Cyber Insecurity and Our National Security: Surviving on a Diet of Poisoned FruitUSENIX Security '15Dr. Richard J. Danzig
    Post-Mortem of a Zombie: Conficker Cleanup After Six YearsUSENIX Security '15Hadi Asghari, Michael Ciere, Michel J.G. van Eeten
    Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing WorldUSENIX Security '15Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R.B. Butler
    Measuring the Longitudinal Evolution of the Online Anonymous Marketplace EcosystemUSENIX Security '15Kyle Soska, Nicolas Christin
    All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLSUSENIX Security '15Mathy Vanhoef, Frank Piessens
    Eclipse Attacks on Bitcoin’s Peer-to-Peer NetworkUSENIX Security '15Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
    Protocol State Fuzzing of TLS ImplementationsUSENIX Security '15Joeri de Ruiter, Erik Poll
    Verified Correctness and Security of OpenSSL HMACUSENIX Security '15Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel
    Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and ImplementationUSENIX Security '15David Kaloper-Meršinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell
    To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS ConnectionsUSENIX Security '15Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl
    Trustworthy Whole-System Provenance for the Linux KernelUSENIX Security '15Adam Bates, Dave (Jing) Tian, Kevin R.B. Butler, Thomas Moyer
    Securing Self-Virtualizing Ethernet DevicesUSENIX Security '15Igor Smolyar, Muli Ben-Yehuda, Dan Tsafrir
    EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised LearningUSENIX Security '15Ruowen Wang, William Enck, Douglas Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab

Pages