Conferences

Search results

    TitleConferenceSpeaker(s)
    BOTMAGNIFIER: Locating Spambots on the InternetUSENIX Security '11Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna
    JACKSTRAWS: Picking Command and Control Connections from Bot TrafficUSENIX Security '11Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz
    SSL/TLS Certificates: Threat or Menace?USENIX Security '11Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent
    Telex: Anticensorship in the Network InfrastructureUSENIX Security '11Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
    PIR-Tor: Scalable Anonymous Communication Using Private Information RetrievalUSENIX Security '11Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg
    The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver CollusionUSENIX Security '11Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham
    Pico: No More Passwords!USENIX Security '11Frank Stajano
    Differential Privacy Under FireUSENIX Security '11Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan
    Outsourcing the Decryption of ABE CiphertextsUSENIX Security '11Matthew Green, Susan Hohenberger, Brent Waters
    Faster Secure Two-Party Computation Using Garbled CircuitsUSENIX Security '11Yan Huang, David Evans, Jonathan Katz, Lior Malka
    The Cloud-y Future of Security TechnologiesUSENIX Security '11Adam O'Donnell
    Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio SystemUSENIX Security '11Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze
    Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack SpaceUSENIX Security '11Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl
    Comprehensive Experimental Analyses of Automotive Attack SurfacesUSENIX Security '11Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno
    Forensic Triage for Mobile Phones with DEC0DEUSENIX Security '11Robert J. Walls, Erik Learned-Miller, Brian Neil Levine
    mCarve: Carving Attributed Dump SetsUSENIX Security '11Ton van Deursen, Sjouke Mauw, Saša Radomirović
    SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection AttacksUSENIX Security '11Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos
    Crossing the Chasm: Pitching Security Research to Mainstream Browser VendorsUSENIX Security '11Collin Jackson
    MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability DiscoveryUSENIX Security '11Chia Yuan Cho, Domagoj Babić, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song
    Static Detection of Access Control Vulnerabilities in Web ApplicationsUSENIX Security '11Fangqi Sun, Liang Xu, Zhendong Su
    ADsafety: Type-Based Verification of JavaScript SandboxingUSENIX Security '11Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi
    I'm from the Government and I'm Here to Help: Perspectives from a Privacy Tech WonkUSENIX Security '11Tara Whalen
    Measuring Pay-per-Install: The Commoditization of Malware DistributionUSENIX Security '11Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson
    Dirty Jobs: The Role of Freelance Labor in Web Service AbuseUSENIX Security '11Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker
    Show Me the Money: Characterizing Spam-advertised RevenueUSENIX Security '11Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage

Pages