Search results

    Report of the California Voting Systems ReviewUSENIX Security '07David Wagner
    Binary Obfuscation Using SignalsUSENIX Security '07Igor V. Popov, Saumya K. Debray, Gregory R. Andrews
    Active Hardware Metering for Intellectual Property Protection and SecurityUSENIX Security '07Yousra M. Alkabani, Farinaz Koushanfar
    Advanced RootkitsUSENIX Security '07Greg Hoglund
    On Attack Causality in Internet-Connected Cellular NetworksUSENIX Security '07Patrick McDaniel
    Proximity Breeds Danger: Emerging Threats in Metro-area Wireless NetworksUSENIX Security '07P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis
    On Web Browsing Privacy in Anonymized NetFlowsUSENIX Security '07S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter
    Covering Computer Security in The New York TimesUSENIX Security '07John Schwartz
    Work-in-Progress Reports (WiPs) and Closing RemarksUSENIX Security '07
    Spamscatter: Characterizing Internet Scam Hosting InfrastructureUSENIX Security '07David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
    Exploiting Network Structure for Proactive Spam MitigationUSENIX Security '07Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog CorrelationUSENIX Security '07Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong
    Exploiting Online Games USENIX Security '07Gary McGraw
    Computer Security in a Large EnterpriseUSENIX Security '07Jerry Brady
    How the iPod Shuffled the World as We Know ItUSENIX Security '07Steven Levy
    SIF: Enforcing Confidentiality and Integrity in Web ApplicationsUSENIX Security '07Stephen Chong, K. Vikram, Andrew C. Myers
    Combating Click Fraud via Premium ClicksUSENIX Security '07Ari Juels, Sid Stamm, Markus Jakobsson
    SpyProxy: Execution-based Detection of Malicious Web ContentUSENIX Security '07Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
    The Human Factor in Online FraudUSENIX Security '07Markus Jakobsson
    Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?USENIX Security '07Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson
    Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingUSENIX Security '07T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
    Web-Based Inference DetectionUSENIX Security '07Jessica Staddon, Philippe Golle, Bryce Zimny
    Keep Your Enemies Close: Distance Bounding Against Smartcard Relay AttacksUSENIX Security '07Saar Drimer, Steven J. Murdoch
    Human-Seeded Attacks and Exploiting Hot-Spots in Graphical PasswordsUSENIX Security '07Julie Thorpe, P.C. van Oorschot
    Halting Password Puzzles: Hard-to-break Encryption from Human-memorable KeysUSENIX Security '07Xavier Boyen