Search results

    P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious UsersUSENIX Security '10Yitao Duan, John Canny, Justin Zhan
    SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and StatisticsUSENIX Security '10Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos
    The Evolution of the Flash Security ModelUSENIX Security '10Peleus Uhley
    Dude, Where's That IP? Circumventing Measurement-based IP GeolocationUSENIX Security '10Phillipa Gill, Yashar Ganjali, Bernard Wong
    Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model CheckingUSENIX Security '10Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall
    Building a Dynamic Reputation System for DNSUSENIX Security '10Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster
    Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot PrivacyUSENIX Security '10Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora
    Acoustic Side-Channel Attacks on PrintersUSENIX Security '10Michael Backes, Saarland University, Max Planck Institute for Software Systems (MPI-SWS), Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder
    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case StudyUSENIX Security '10Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar
    Vulnerable ComplianceUSENIX Security '10Dan Geer
    VEX: Vetting Browser Extensions for Security VulnerabilitiesUSENIX Security '10Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett
    Securing Script-Based Extensibility in Web BrowsersUSENIX Security '10Vladan Djeric, Ashvin Goel
    AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web AdvertisementsUSENIX Security '10Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan
    Realization of RF Distance BoundingUSENIX Security '10Kasper Bonne Rasmussen, Srdjan Capkun
    The Case for Ubiquitous Transport-Level EncryptionUSENIX Security '10Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh
    Automatic Generation of Remediation Procedures for Malware InfectionsUSENIX Security '10Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha
    Grid, PhD: Smart Grid, Cyber Security, and the Future of Keeping the Lights OnUSENIX Security '10Kelly Ziegler
    Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic ContextUSENIX Security '10Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
    Chipping Away at Censorship Firewalls with User-Generated ContentUSENIX Security '10Sam Burnett, Nick Feamster, Santosh Vempala
    Fighting Coercion Attacks in Key Generation using Skin ConductanceUSENIX Security '10Payas Gupta, Debin Gao
    End-to-End Arguments: The Internet and BeyondUSENIX Security '10David P. Reed
    Medical Device Security and PrivacyHealthSec '10John F. Murray Jr., Software Compliance Expert, United States Food, Drug Administration, Nathanael Paul, Karen Sandler
    Protecting E-healthcare Client Devices against Malware and Physical TheftHealthSec '10Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, Mustaque Ahamad
    Can I access your data? Privacy Management in mHealthHealthSec '10David Kotz, Dartmouth College, ISTS
    Using Trusted Sensors to Monitor Patients' HabitsHealthSec '10Alec Wolman, Stefan Saroiu, Victor Bahl