Conferences

Search results

    TitleConferenceSpeaker(s)
    DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware AnalysisUSENIX Security '12Lok Kwong Yan, Heng Yin
    Chimera: A Declarative Language for Streaming Network Traffic AnalysisUSENIX Security '12Kevin Borders, Jonathan Springer, Matthew Burnside
    Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in MotionUSENIX Security '12Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot
    Impact of Spam Exposure on User EngagementUSENIX Security '12Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang
    kGuard: Lightweight Kernel Protection against Return-to-User AttacksUSENIX Security '12Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis
    Privacy-Preserving Social PluginsUSENIX Security '12Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos
    Progressive Authentication: Deciding When to Authenticate on Mobile PhonesUSENIX Security '12Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
    Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebUSENIX Security '12Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach
    Privilege Separation in HTML5 ApplicationsUSENIX Security '12Devdatta Akhawe, Prateek Saxena, Dawn Song
    Throttling Tor Bandwidth ParasitesUSENIX Security '12Rob Jansen, Paul Syverson, Nicholas Hopper
    Enhanced Operating System Security Through Efficient and Fine-grained Address Space RandomizationUSENIX Security '12Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum
    STING: Finding Name Resolution Vulnerabilities in ProgramsUSENIX Security '12Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
    Tracking Rootkit Footprints with a Practical Memory Analysis SystemUSENIX Security '12Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan
    Billion-Gate Secure Computation with Malicious AdversariesUSENIX Security '12Benjamin Kreuter, Abhi Shelat, Chih-hao Shen
    PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsUSENIX Security '12Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko
    How Does Your Password Measure Up? The Effect of Strength Meters on Password CreationUSENIX Security '12Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    Establishing Browser Security Guarantees through Formal Shim VerificationUSENIX Security '12Dongseok Jang, Zachary Tatlock, Sorin Lerner
    I Forgot Your Password: Randomness Attacks Against PHP ApplicationsUSENIX Security '12George Argyros, Aggelos Kiayias
    Enemy of the State: A State-Aware Black-Box Web Vulnerability ScannerUSENIX Security '12Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
    Tachyon: Tandem Execution for Efficient Live Patch TestingUSENIX Security '12Matthew Maurer, David Brumley
    Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network DevicesUSENIX Security '12Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman
    Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services USENIX Security '12Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu
    An Evaluation of the Google Chrome Extension Security ArchitectureUSENIX Security '12Nicholas Carlini, Adrienne Porter Felt, David Wagner
    HotSec'12 9am Session Q & AHotSec '12
    HotSec'12 11am Session Q & AHotSec '12

Pages