Conferences

Search results

    TitleConferenceSpeaker(s)
    Secure Outsourced Garbled Circuit Evaluation for Mobile DevicesUSENIX Security '13Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
    On the Security of RC4 in TLSUSENIX Security '13Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
    PCF: A Portable Circuit Format for Scalable Two-Party Secure ComputationUSENIX Security '13Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin Butler
    Control Flow Integrity for COTS BinariesUSENIX Security '13Mingwei Zhang, R. Sekar
    Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow StructuringUSENIX Security '13David Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo
    Strato: A Retargetable Framework for Low-Level Inlined-Reference MonitorsUSENIX Security '13Bin Zeng, Gang Tan, Úlfar Erlingsson
    On the Security of Picture Gesture AuthenticationUSENIX Security '13Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu
    Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and AuthorizationUSENIX Security '13Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich
    Enabling Fine-Grained Permissions for Augmented Reality Applications with RecognizersUSENIX Security '13Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek
    CacheAudit: A Tool for the Static Analysis of Cache Side ChannelsUSENIX Security '13Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke
    Transparent ROP Exploit Mitigation Using Indirect Branch TracingUSENIX Security '13Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
    FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic ExecutionUSENIX Security '13Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha
    Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing BaseUSENIX Security '13Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens
    Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for ObfuscationUSENIX Security '13Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh Tripunitara
    KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel ObjectUSENIX Security '13Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang
    Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle ImmobilizerUSENIX Security '13Roel Verdult, Flavio D. Garcia, Baris Ege
    Take This Personally: Pollution Attacks on Personalized ServicesUSENIX Security '13Xingyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee
    Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media ServicesUSENIX Security '13Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    Measuring the Practical Impact of DNSSEC DeploymentUSENIX Security '13Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage
    ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol TemplatesUSENIX Security '13Terry Nelms, Roberto Perdisci, Mustaque Ahamad
    ZMap: Fast Internet-wide Scanning and Its Security ApplicationsUSENIX Security '13Zakir Durumeric, Eric Wustrow, J. Alex Halderman
    Eradicating DNS Rebinding with the Extended Same-origin PolicyUSENIX Security '13Martin Johns, Sebastian Lekies, Ben Stock
    Revolver: An Automated Approach to the Detection of Evasive Web-based MalwareUSENIX Security '13Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna
    Language-based Defenses Against Untrusted Browser OriginsUSENIX Security '13Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis
    WHYPER: Towards Automating Risk Assessment of Mobile ApplicationsUSENIX Security '13Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie

Pages