Papers

Search results

    ConferenceTitleAuthor(s)
    HotSec '12GANGRENE: Exploring the Mortality of Flash Memory
    HotSec '12NoisyKey: Tolerating Keyloggers via Keystrokes Hiding
    HotSec '12Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing
    HotSec '12The Benefits of Understanding Passwords
    HotSec '12How to Ask for Permission
    HotSec '12Impeding Automated Malware Analysis with Environment-sensitive Malware
    HotSec '12Software Diversity: Security, Entropy and Game Theory
    HotSec '12PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security
    HotSec '12When Good Services Go Wild: Reassembling Web Services for Unintended Purposes
    HotSec '12Functional Privacy or Why Cookies Are Better with Milk
    HotSec '12Context-centric Security
    HotSec '11Building Secure Robot ApplicationsMurph Finnicum, Samuel T. King
    HotSec '11Security Fusion: A New Security Architecture for Resource-Constrained EnvironmentsSuku Nair, Subil Abraham, Omar Al Ibrahim
    HotSec '11DISTROY: Detecting Integrated Circuit Trojans with Compressive MeasurementsYoungjune L. Gwon, H.T. Kung, Dario Vlah
    HotSec '11Privacy-Preserving Applications on SmartphonesYan Huang, Peter Chapman, David Evans
    HotSec '11Public vs. Publicized: Content Use Trends and Privacy ExpectationsJessica Staddon, Andrew Swerdlow
    HotSec '11Herbert West—DeanonymizerMihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield
    HotSec '11Towards Practical Avoidance of Information Leakage in Enterprise NetworksJason Croft, Matthew Caesar
    HotSec '11Towards Client-side HTML Security PoliciesJoel Weinberger, Adam Barth, Dawn Song
    HotSec '11TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone MotionLiang Cai, Hao Chen
    HotSec '11On Dynamic Malware Payloads Aimed at Programmable Logic ControllersStephen McLaughlin
    HotSec '11Effective Digital Forensics Research Is Investigator-CentricRobert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields
    HotSec '10Visual Security Policy for the WebTerri Oda, Anil Somayaji
    HotSec '10Cybercasing the Joint: On the Privacy Implications of Geo-TaggingGerald Friedland, Robin Sommer, International Computer Science Institute, Lawrence Berkeley National Laboratory
    HotSec '10On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud ComputingMarten van Dijk, Ari Juels

Pages