| Poncho: Enabling Smart Administration of Full Private Clouds | LISA '13 | Scott Devoid, Narayan Desai, Lorin Hochstein |
| Making Problem Diagnosis Work for Large-Scale, Production Storage Systems | LISA '13 | Michael P. Kasick, Priya Narasimhan, Kevin Harms |
| dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data | LISA '13 | Thomas Knauth, Christof Fetzer |
| Surveillance, the NSA, and Everything | LISA '13 | Bruce Schneier |
| Why Attend LISA '13? | LISA '13 | |
| OSv: A New Open Source Operating System Designed for the Cloud | LISA '13 | |
| Systems Performance | LISA '13 | Brendan Gregg |
| LISA '13 Opening Remarks and Awards | LISA '13 | Narayan Desai, Kent Skaar |
| Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space | USENIX Security '13 | Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang |
| Practical Comprehensive Bounds on Surreptitious Communication over DNS | USENIX Security '13 | Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula Rao, Reiner Sailer, Douglas Lee Schales, Mark Stoecklin, Kurt Thomas, Wietse Venema, Nicholas Weaver |
| Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks | USENIX Security '13 | Nico Golde, Kevin Redon, Jean-Pierre Seifert |
| Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse | USENIX Security '13 | Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson |
| Impression Fraud in On-line Advertising via Pay-Per-View Networks | USENIX Security '13 | Kevin Springborn, Paul Barford |
| The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions | USENIX Security '13 | Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach |
| Securing Embedded User Interfaces: Android and Beyond | USENIX Security '13 | Franziska Roesner, Tadayoshi Kohno |
| Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies | USENIX Security '13 | Sven Bugiel, Stephen Heuser, Ahmad-Reza Sadeghi |
| Proactively Accountable Anonymous Messaging in Verdict | USENIX Security '13 | Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford |
| ZQL: A Compiler for Privacy-Preserving Data Processing | USENIX Security '13 | Cedric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo |
| DupLESS: Server-Aided Encryption for Deduplicated Storage | USENIX Security '13 | Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart |
| Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations | USENIX Security '13 | Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos |
| MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis | USENIX Security '13 | Ruowen Wang, Peng Ning, Tao Xie, Quan Chen |
| Towards Automatic Software Lineage Inference | USENIX Security '13 | Jiyong Jang, Maverick Woo, David Brumley |
| You Are How You Click: Clickstream Analysis for Sybil Detection | USENIX Security '13 | Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao |
| Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness | USENIX Security '13 | Devdatta Akhawe, Adrienne Porter Felt |
| An Empirical Study of Vulnerability Rewards Programs | USENIX Security '13 | Matthew Finifter, Devdatta Akhawe, David Wagner |