Conferences

Search results

    TitleConferenceSpeaker(s)
    Progressive Authentication: Deciding When to Authenticate on Mobile PhonesUSENIX Security '12Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
    Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebUSENIX Security '12Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach
    Privilege Separation in HTML5 ApplicationsUSENIX Security '12Devdatta Akhawe, Prateek Saxena, Dawn Song
    Throttling Tor Bandwidth ParasitesUSENIX Security '12Rob Jansen, Paul Syverson, Nicholas Hopper
    An Evaluation of the Google Chrome Extension Security ArchitectureUSENIX Security '12Nicholas Carlini, Adrienne Porter Felt, David Wagner
    Enhanced Operating System Security Through Efficient and Fine-grained Address Space RandomizationUSENIX Security '12Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum
    STING: Finding Name Resolution Vulnerabilities in ProgramsUSENIX Security '12Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
    Tracking Rootkit Footprints with a Practical Memory Analysis SystemUSENIX Security '12Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan
    Billion-Gate Secure Computation with Malicious AdversariesUSENIX Security '12Benjamin Kreuter, Abhi Shelat, Chih-hao Shen
    PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsUSENIX Security '12Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko
    How Does Your Password Measure Up? The Effect of Strength Meters on Password CreationUSENIX Security '12Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    Establishing Browser Security Guarantees through Formal Shim VerificationUSENIX Security '12Dongseok Jang, Zachary Tatlock, Sorin Lerner
    I Forgot Your Password: Randomness Attacks Against PHP ApplicationsUSENIX Security '12George Argyros, Aggelos Kiayias
    Enemy of the State: A State-Aware Black-Box Web Vulnerability ScannerUSENIX Security '12Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
    Tachyon: Tandem Execution for Efficient Live Patch TestingUSENIX Security '12Matthew Maurer, David Brumley
    Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network DevicesUSENIX Security '12Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman
    New Attacks on Timing-based Network Flow WatermarksUSENIX Security '12Zi Lin, Nicholas Hopper
    Welcome and AwardsUSENIX Security '12
    The Evolution of Information AssuranceUSENIX Security '12
    Robots and PrivacyUSENIX Security '12
    Cyber Security Education in a Time of ChangeUSENIX Security '12
    Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services USENIX Security '12Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu
    Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose AttacksUSENIX Security '12Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
    Taking Proof-Based Verified Computation a Few Steps Closer to PracticalityUSENIX Security '12Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish
    PUBCRAWL: Protecting Users and Businesses from CRAWLersUSENIX Security '12Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna

Pages