Conferences

Search results

    TitleConferenceSpeaker(s)
    Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security AnalysisUSENIX Security '13Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon
    Jekyll on iOS: When Benign Apps Become EvilUSENIX Security '13Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee
    Dr. Felten Goes To Washington: Lessons from 18 Months in GovernmentUSENIX Security '13Edward W. Felten
    The White House's Priorities for CybersecurityUSENIX Security '13Andy Ozment
    Security Team 2.0USENIX Security '13Chris Evans
    Confessions of a "Recovering" Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet TerminatorsUSENIX Security '13Jim Adler
    Windows 8 Security: Supporting User ConfidenceUSENIX Security '13Crispin Cowan
    Building Securable Infrastructure: Open-Source Private CloudsUSENIX Security '13Pravir Chandra
    Tracking the Casino Computer Wars: Who’s Winning—the Casino or the Cheat?USENIX Security '13Richard Marcus
    Truncating TLS Connections to Violate Beliefs in Web ApplicationsWOOT '13Ben Smyth, Alfredo Pironti
    FireDrill: Interactive DNS RebindingWOOT '13Yunxing Dai, Ryan Resig
    Illuminating the Security Issues Surrounding Lights-Out Server ManagementWOOT '13Anthony Bonkoski, Russ Bielawski, J. Alex Halderman
    Bluetooth: With Low Energy Comes Low SecurityWOOT '13Mike Ryan
    Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and AndroidWOOT '13Jethro Beekman, Christopher Thompson
    Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV ContactlessWOOT '13Michael Roland, Josef Langer
    Subverting BIND's SRTT Algorithm Derandomizing NS SelectionWOOT '13Roee Hay, Jonathan Kalechstein, Gabi Nakibly
    Leveraging Honest Users: Stealth Command-and-Control of BotnetsWOOT '13Diogo Mónica, Carlos Ribeiro
    From an IP Address to a Street Address: Using Wireless Signals to Locate a TargetWOOT '13Craig A. Shue, Nathanael Paul, Curtis R. Taylor
    Looking Inside the (Drop) BoxWOOT '13Dhiru Kholia, Przemysław Węgrzyn
    “Weird Machines” in ELF: A Spotlight on the Underappreciated MetadataWOOT '13Rebecca Shapiro, Sergey Bratus, Sean W. Smith
    Introducing Die Datenkrake: Programmable Logic for Hardware Security AnalysisWOOT '13Dmitry Nedospasov, Thorsten Schroder
    The Page-Fault Weird Machine: Lessons in Instruction-less ComputationWOOT '13Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith
    Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of ProtestFOCI '13John-Paul Verkamp, Minaxi Gupta
    The Anatomy of Web Censorship in PakistanFOCI '13Zubair Nabi
    Internet Censorship in Iran: A First LookFOCI '13Simurgh Aryan, Homa Aryan, J. Alex Halderman

Pages