Conferences

Search results

    TitleConferenceSpeaker(s)
    The Three Cyber-War FallaciesUSENIX Security '11Dave Aitel
    WelcomeHotSec '11Patrick McDaniel
    Building Secure Robot ApplicationsHotSec '11Murph Finnicum, Samuel T. King
    Security Fusion: A New Security Architecture for Resource-Constrained EnvironmentsHotSec '11Suku Nair, Subil Abraham, Omar Al Ibrahim
    DISTROY: Detecting Integrated Circuit Trojans with Compressive MeasurementsHotSec '11Youngjune L. Gwon, H.T. Kung, Dario Vlah
    Privacy-Preserving Applications on SmartphonesHotSec '11Yan Huang, Peter Chapman, David Evans
    Public vs. Publicized: Content Use Trends and Privacy ExpectationsHotSec '11Jessica Staddon, Andrew Swerdlow
    Herbert West—DeanonymizerHotSec '11Mihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield
    Towards Practical Avoidance of Information Leakage in Enterprise NetworksHotSec '11Jason Croft, Matthew Caesar
    Towards Client-side HTML Security PoliciesHotSec '11Joel Weinberger, Adam Barth, Dawn Song
    TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone MotionHotSec '11Liang Cai, Hao Chen
    On Dynamic Malware Payloads Aimed at Programmable Logic ControllersHotSec '11Stephen McLaughlin
    Effective Digital Forensics Research Is Investigator-CentricHotSec '11Robert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields
    Putting Out a HIT: Crowdsourcing Malware InstallsWOOT '11Chris Kanich, Stephen Checkoway
    All Your Droid Are Belong to Us: A Survey of Current Android AttacksWOOT '11Timothy Vidas, Daniel Votipka, Nicolas Christin
    Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable CodeWOOT '11James Oakley
    DieHarder: Securing the HeapWOOT '11Gene Novark, Emery D. Berger
    Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine LearningWOOT '11Fabian Yamaguchi, Felix "FX" Lindner, Konrad Rieck
    Exposing iClass Key DiversificationWOOT '11Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult
    Media Access Control Address Spoofing Attacks against Port SecurityWOOT '11Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl
    Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding FragmentsWOOT '11Yossi Gilad, Amir Herzberg
    Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode DesignWOOT '11Ang Cui, Jatin Kataria, Salvatore J. Stolfo
    SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth BotmasterWOOT '11Theodore Reed, Joseph Geis, Sven Dietrich
    Getting the Face Behind the Squares: Reconstructing Pixelized Video StreamsWOOT '11Ludovico Cavedon, Luca Foschini, Giovanni Vigna
    Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based AttacksWOOT '11Keaton Mowery, Sarah Meiklejohn, Stefan Savage

Pages