Conferences

Search results

    TitleConferenceSpeaker(s)
    VoteBox: A Tamper-evident, Verifiable Electronic Voting SystemUSENIX Security '08Daniel Sandler, Kyle Derr, Dan S. Wallach
    The Ghost in the Browser and Other Frightening Stories About Web MalwareUSENIX Security '08Niels Provos
    An Empirical Security Study of the Native Code in the JDKUSENIX Security '08Gang Tan, Jason Croft
    AutoISES: Automatically Inferring Security Specification and Detecting ViolationsUSENIX Security '08Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou
    Real-World Buffer Overflow Protection for Userspace & KernelspaceUSENIX Security '08Michael Dalton, Hari Kannan, Christos Kozyrakis
    Managing Insecurity: Practitioner Reflections on Social Costs of SecurityUSENIX Security '08Darren Lacey
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet DetectionUSENIX Security '08Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee
    Measurement and Classification of Humans and Bots in Internet ChatUSENIX Security '08Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang
    To Catch a Predator: A Natural Language Approach for Eliciting Malicious PayloadsUSENIX Security '08Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield
    Security Analysis of Network ProtocolsUSENIX Security '08John Mitchell
    Reverse-Engineering a Cryptographic RFID TagUSENIX Security '08Starbug , Henryk Plötz
    Practical Symmetric Key Cryptography on Modern Graphics HardwareUSENIX Security '08Owen Harrison, John Waldron
    An Improved Clock-skew Measurement Technique for Revealing Hidden ServicesUSENIX Security '08Sebastian Zander, Steven J. Murdoch
    Enterprise Security in the Brave New (Virtual) WorldUSENIX Security '08Tal Garfinkel
    NetAuth: Supporting User-Based Network ServicesUSENIX Security '08Manigandan Radhakrishnan, Jon A. Solworth
    Hypervisor Support for Identifying Covertly Executing BinariesUSENIX Security '08Lionel Litty, H. Andrés Lagar-Cavilla, David Lie
    Selective Versioning in a Secure Disk SystemUSENIX Security '08Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok
    HackernomicsUSENIX Security '08Hugh Thompson
    Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTsUSENIX Security '08Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy
    Panalyst: Privacy-Aware Remote Error Analysis on Commodity SoftwareUSENIX Security '08Rui Wang, XiaoFeng Wang, Zhuowei Li
    Multi-flow Attacks Against Network Flow Watermarking SchemesUSENIX Security '08Negar Kiyavash, Amir Houmansadr, Nikita Borisov
    Setting DNS's Hair on FireUSENIX Security '08David Dagon, Paul Vixie
    All Your iFRAMEs Point to UsUSENIX Security '08Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose
    Securing Frame Communication in BrowsersUSENIX Security '08Adam Barth, Collin Jackson, John C. Mitchell
    Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model CheckingUSENIX Security '08Michael Martin, Monica S. Lam

Pages