Conferences

Search results

    TitleConferenceSpeaker(s)
    Clickjacking: Attacks and DefensesUSENIX Security '12Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson
    On the Feasibility of Side-Channel Attacks with Brain-Computer InterfacesUSENIX Security '12Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song
    Life as a Target—Welcome to the ClubUSENIX Security '12
    Nature is a Language; Can't You Read?USENIX Security '12
    Emerging Trends and Their Security ImplicationsUSENIX Security '12Doug Burger
    Securing Early Software DevelopmentUSENIX Security '12
    B@bel: Leveraging Email Delivery for Spam MitigationUSENIX Security '12Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
    Aurasium: Practical Policy Enforcement for Android ApplicationsUSENIX Security '12Rubin Xu, Hassen Saïdi, Ross Anderson
    Social Networking with Frientegrity: Privacy and Integrity with an Untrusted ProviderUSENIX Security '12Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten
    TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without ClocksUSENIX Security '12Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu
    Fuzzing with Code FragmentsUSENIX Security '12Christian Holler, Kim Herzig, Andreas Zeller
    Data Node Encrypted File System: Efficient Secure Deletion for Flash MemoryUSENIX Security '12Joel Reardon, Srdjan Capkun, David Basin
    STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the CloudUSENIX Security '12Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz
    Efficient and Scalable Socware Detection in Online Social NetworksUSENIX Security '12Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
    Optimally Robust Private Information RetrievalUSENIX Security '12Casey Devet, Ian Goldberg, Nadia Heninger
    On Breaking SAML: Be Whoever You Want to BeUSENIX Security '12Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
    Gone in 360 Seconds: Hijacking with Hitag2USENIX Security '12Roel Verdult, Flavio D. Garcia, Josep Balasch
    Whispers in the Hyper-space: High-speed Covert Channel Attacks in the CloudUSENIX Security '12Zhenyu Wu, Zhang Xu, Haining Wang
    AdSplit: Separating Smartphone Advertising from ApplicationsUSENIX Security '12Shashi Shekhar, Michael Dietz, Dan S. Wallach
    DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware AnalysisUSENIX Security '12Lok Kwong Yan, Heng Yin
    Chimera: A Declarative Language for Streaming Network Traffic AnalysisUSENIX Security '12Kevin Borders, Jonathan Springer, Matthew Burnside
    Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in MotionUSENIX Security '12Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot
    GANGRENE: Exploring the Mortality of Flash MemoryHotSec '12
    NoisyKey: Tolerating Keyloggers via Keystrokes HidingHotSec '12
    Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional ComputingHotSec '12

Pages