Conferences

Website Maintenance Alert

Due to scheduled maintenance, the USENIX website may not be available on Monday, March 17, from 10:00 am–6:00 pm Pacific Daylight Time (UTC -7). We apologize for the inconvenience and thank you for your patience.

If you would like to register for NSDI '25, SREcon25 Americas, or PEPR '25, please complete your registration before or after this time period.

Search results

    TitleConferenceSpeaker(s)
    End-to-End Arguments: The Internet and BeyondUSENIX Security '10David P. Reed
    Toward an Open and Secure Platform for Using the WebUSENIX Security '10Will Drewry
    Structuring Protocol Implementations to Protect Sensitive DataUSENIX Security '10Petr Marchenko, Brad Karp
    PrETP: Privacy-Preserving Electronic Toll PricingUSENIX Security '10Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens
    An Analysis of Private Browsing Modes in Modern BrowsersUSENIX Security '10Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh
    Windows 7 Security from a UNIX PerspectiveUSENIX Security '10Crispin Cowan
    BotGrep: Finding P2P Bots with Structured Graph AnalysisUSENIX Security '10Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov
    Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention SystemsUSENIX Security '10Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, Alex X. Liu
    Searching the Searchers with SearchAuditUSENIX Security '10John P. John, University of Washington, Microsoft Research Silicon Valley, Fang Yu, Yinglian Xie, Martín Abadi, Microsoft Research Silicon Valley, University of California, Arvind Krishnamurthy
    Docile No More: The Tussle to Redefine the InternetUSENIX Security '10Program Director at the Center for Strategic, James Lewis, Senior Fellow, International Studies
    Toward Automated Detection of Logic Vulnerabilities in Web ApplicationsUSENIX Security '10Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
    Baaz: A System for Detecting Access Control MisconfigurationsUSENIX Security '10Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
    Cling: A Memory Allocator to Mitigate Dangling PointersUSENIX Security '10Periklis Akritidis, Niometrics , Singapore , University of Cambridge
    Staying Safe on the Web Yesterday, Today, and TomorrowUSENIX Security '10Sid Stamm, Privacy Nut at Mozilla
    ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic CashUSENIX Security '10C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
    P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious UsersUSENIX Security '10Yitao Duan, John Canny, Justin Zhan
    SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and StatisticsUSENIX Security '10Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos
    The Evolution of the Flash Security ModelUSENIX Security '10Peleus Uhley
    Dude, Where's That IP? Circumventing Measurement-based IP GeolocationUSENIX Security '10Phillipa Gill, Yashar Ganjali, Bernard Wong
    Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model CheckingUSENIX Security '10Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall
    Proving Voltaire Right: Security Blunders Dumber Than Dog SnotUSENIX Security '10Roger G. Johnston
    Adapting Software Fault Isolation to Contemporary CPU ArchitecturesUSENIX Security '10David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen
    Making Linux Protection Mechanisms Egalitarian with UserFSUSENIX Security '10Taesoo Kim, Nickolai Zeldovich
    Capsicum: Practical Capabilities for UNIXUSENIX Security '10Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway
    Protecting E-healthcare Client Devices against Malware and Physical TheftHealthSec '10Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, Mustaque Ahamad

Pages