Conferences

Search results

    TitleConferenceSpeaker(s)
    The Benefits of Understanding PasswordsHotSec '12
    How to Ask for PermissionHotSec '12
    Impeding Automated Malware Analysis with Environment-sensitive MalwareHotSec '12
    Software Diversity: Security, Entropy and Game TheoryHotSec '12
    PeerSec: Towards Peer Production and Crowdsourcing for Enhanced SecurityHotSec '12
    When Good Services Go Wild: Reassembling Web Services for Unintended PurposesHotSec '12
    Functional Privacy or Why Cookies Are Better with MilkHotSec '12
    Context-centric SecurityHotSec '12
    HotSec'12 9am Session Q & AHotSec '12
    HotSec'12 11am Session Q & AHotSec '12
    HotSec'12 2pm Session Q & AHotSec '12
    HotSec'12 4pm Session Q & AHotSec '12
    Neuroimage Data Sets: Rethinking Privacy PoliciesHealthSec '12
    Who Wears Me? Bioimpedance as a Passive BiometricHealthSec '12
    Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical RecordsHealthSec '12
    Body Area Network Security: Robust Key Establishment Using Human Body ChannelHealthSec '12
    Vis-à-vis Cryptography: Private and Trustworthy In-Person CertificationsHealthSec '12
    Under New Management: Practical Attacks on SNMPv3WOOT '12
    Abusing Notification Services on Smartphones for Phishing and SpammingWOOT '12
    Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol StacksWOOT '12
    Security Analysis of Smartphone Point-of-Sale SystemsWOOT '12
    WAFFle: Fingerprinting Filter Rules of Web Application FirewallsWOOT '12
    Off-Path Attacking the WebWOOT '12
    On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection SchemesWOOT '12
    Microgadgets: Size Does Matter in Turing-Complete Return-Oriented ProgrammingWOOT '12

Pages