Conferences

Search results

    TitleConferenceSpeaker(s)
    Faster Secure Two-Party Computation Using Garbled CircuitsUSENIX Security '11Yan Huang, David Evans, Jonathan Katz, Lior Malka
    The Cloud-y Future of Security TechnologiesUSENIX Security '11Adam O'Donnell
    Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio SystemUSENIX Security '11Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze
    Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack SpaceUSENIX Security '11Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl
    Comprehensive Experimental Analyses of Automotive Attack SurfacesUSENIX Security '11Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno
    Forensic Triage for Mobile Phones with DEC0DEUSENIX Security '11Robert J. Walls, Erik Learned-Miller, Brian Neil Levine
    mCarve: Carving Attributed Dump SetsUSENIX Security '11Ton van Deursen, Sjouke Mauw, Saša Radomirović
    SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection AttacksUSENIX Security '11Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos
    Crossing the Chasm: Pitching Security Research to Mainstream Browser VendorsUSENIX Security '11Collin Jackson
    MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability DiscoveryUSENIX Security '11Chia Yuan Cho, Domagoj Babić, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song
    Static Detection of Access Control Vulnerabilities in Web ApplicationsUSENIX Security '11Fangqi Sun, Liang Xu, Zhendong Su
    ADsafety: Type-Based Verification of JavaScript SandboxingUSENIX Security '11Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi
    I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech WonkUSENIX Security '11Tara Whalen
    Measuring Pay-per-Install: The Commoditization of Malware DistributionUSENIX Security '11Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson
    Dirty Jobs: The Role of Freelance Labor in Web Service AbuseUSENIX Security '11Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker
    Show Me the Money: Characterizing Spam-advertised RevenueUSENIX Security '11Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
    Privacy in the Age of Augmented RealityUSENIX Security '11Alessandro Acquisti
    Secure In-Band Wireless PairingUSENIX Security '11Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi
    TRESOR Runs Encryption Securely Outside RAMUSENIX Security '11Tilo Müller, Felix C. Freiling, Andreas Dewald
    Bubble Trouble: Off-Line De-Anonymization of Bubble FormsUSENIX Security '11Joseph A. Calandrino, William Clarkson, Edward W. Felten
    Opening Remarks, Awards, and Keynote AddressUSENIX Security '11David Wagner
    Network Security in the Medium Term: 2061–2561 ADUSENIX Security '11Charles Stross
    Fast and Precise Sanitizer Analysis with BEKUSENIX Security '11Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes
    Toward Secure Embedded Web InterfacesUSENIX Security '11Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein
    ZOZZLE: Fast and Precise In-Browser JavaScript Malware DetectionUSENIX Security '11Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert

Pages