Conferences

Search results

    TitleConferenceSpeaker(s)
    Robots and PrivacyUSENIX Security '12
    Cyber Security Education in a Time of ChangeUSENIX Security '12
    Life as a Target—Welcome to the ClubUSENIX Security '12
    Nature is a Language; Can't You Read?USENIX Security '12
    Emerging Trends and Their Security ImplicationsUSENIX Security '12Doug Burger
    Securing Early Software DevelopmentUSENIX Security '12
    New Attacks on Timing-based Network Flow WatermarksUSENIX Security '12Zi Lin, Nicholas Hopper
    Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose AttacksUSENIX Security '12Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
    Taking Proof-Based Verified Computation a Few Steps Closer to PracticalityUSENIX Security '12Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish
    PUBCRAWL: Protecting Users and Businesses from CRAWLersUSENIX Security '12Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna
    Clickjacking: Attacks and DefensesUSENIX Security '12Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson
    On the Feasibility of Side-Channel Attacks with Brain-Computer InterfacesUSENIX Security '12Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song
    B@bel: Leveraging Email Delivery for Spam MitigationUSENIX Security '12Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
    Aurasium: Practical Policy Enforcement for Android ApplicationsUSENIX Security '12Rubin Xu, Hassen Saïdi, Ross Anderson
    Social Networking with Frientegrity: Privacy and Integrity with an Untrusted ProviderUSENIX Security '12Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten
    TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without ClocksUSENIX Security '12Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu
    Fuzzing with Code FragmentsUSENIX Security '12Christian Holler, Kim Herzig, Andreas Zeller
    Data Node Encrypted File System: Efficient Secure Deletion for Flash MemoryUSENIX Security '12Joel Reardon, Srdjan Capkun, David Basin
    STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the CloudUSENIX Security '12Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz
    Efficient and Scalable Socware Detection in Online Social NetworksUSENIX Security '12Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
    Optimally Robust Private Information RetrievalUSENIX Security '12Casey Devet, Ian Goldberg, Nadia Heninger
    On Breaking SAML: Be Whoever You Want to BeUSENIX Security '12Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
    Gone in 360 Seconds: Hijacking with Hitag2USENIX Security '12Roel Verdult, Flavio D. Garcia, Josep Balasch
    Whispers in the Hyper-space: High-speed Covert Channel Attacks in the CloudUSENIX Security '12Zhenyu Wu, Zhang Xu, Haining Wang
    AdSplit: Separating Smartphone Advertising from ApplicationsUSENIX Security '12Shashi Shekhar, Michael Dietz, Dan S. Wallach

Pages