Conferences

Search results

    TitleConferenceSpeaker(s)
    A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating ThemEVT/WOTE '12
    A Bayesian Method for Auditing ElectionsEVT/WOTE '12
    BRAVO: Ballot-polling Risk-limiting Audits to Verify OutcomesEVT/WOTE '12
    Keynote AddressEVT/WOTE '12
    Lightning DebatesEVT/WOTE '12
    Read It Twice! A Mass-Storage-Based TOCTTOU AttackWOOT '12
    Under New Management: Practical Attacks on SNMPv3WOOT '12
    Abusing Notification Services on Smartphones for Phishing and SpammingWOOT '12
    Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol StacksWOOT '12
    Security Analysis of Smartphone Point-of-Sale SystemsWOOT '12
    WAFFle: Fingerprinting Filter Rules of Web Application FirewallsWOOT '12
    Off-Path Attacking the WebWOOT '12
    On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection SchemesWOOT '12
    Microgadgets: Size Does Matter in Turing-Complete Return-Oriented ProgrammingWOOT '12
    Frankenstein: Stitching Malware from Benign BinariesWOOT '12
    SMT Solvers in Software SecurityWOOT '12
    Web-based Attacks on Host-Proof Encrypted StorageWOOT '12
    The Future of HTTPSWOOT '12
    iOS and the Rising Cost of Reliable ExploitationWOOT '12
    Neuroimage Data Sets: Rethinking Privacy PoliciesHealthSec '12
    Who Wears Me? Bioimpedance as a Passive BiometricHealthSec '12
    Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical RecordsHealthSec '12
    Body Area Network Security: Robust Key Establishment Using Human Body ChannelHealthSec '12
    Vis-à-vis Cryptography: Private and Trustworthy In-Person CertificationsHealthSec '12
    Why We Built BOSH, a Release Engineering and Service Deployment Tool-ChainHealthSec '12

Pages