HotSec '12 | GANGRENE: Exploring the Mortality of Flash Memory | |
HotSec '12 | NoisyKey: Tolerating Keyloggers via Keystrokes Hiding | |
HotSec '12 | Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing | |
HotSec '12 | The Benefits of Understanding Passwords | |
HotSec '12 | How to Ask for Permission | |
HotSec '12 | Impeding Automated Malware Analysis with Environment-sensitive Malware | |
HotSec '12 | Software Diversity: Security, Entropy and Game Theory | |
HotSec '12 | PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security | |
HotSec '12 | When Good Services Go Wild: Reassembling Web Services for Unintended Purposes | |
HotSec '12 | Functional Privacy or Why Cookies Are Better with Milk | |
HotSec '12 | Context-centric Security | |
HotSec '11 | Building Secure Robot Applications | Murph Finnicum, Samuel T. King |
HotSec '11 | Security Fusion: A New Security Architecture for Resource-Constrained Environments | Suku Nair, Subil Abraham, Omar Al Ibrahim |
HotSec '11 | DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements | Youngjune L. Gwon, H.T. Kung, Dario Vlah |
HotSec '11 | Privacy-Preserving Applications on Smartphones | Yan Huang, Peter Chapman, David Evans |
HotSec '11 | Public vs. Publicized: Content Use Trends and Privacy Expectations | Jessica Staddon, Andrew Swerdlow |
HotSec '11 | Herbert West—Deanonymizer | Mihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield |
HotSec '11 | Towards Practical Avoidance of Information Leakage in Enterprise Networks | Jason Croft, Matthew Caesar |
HotSec '11 | Towards Client-side HTML Security Policies | Joel Weinberger, Adam Barth, Dawn Song |
HotSec '11 | TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion | Liang Cai, Hao Chen |
HotSec '11 | On Dynamic Malware Payloads Aimed at Programmable Logic Controllers | Stephen McLaughlin |
HotSec '11 | Effective Digital Forensics Research Is Investigator-Centric | Robert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields |
HotSec '10 | Visual Security Policy for the Web | Terri Oda, Anil Somayaji |
HotSec '10 | Cybercasing the Joint: On the Privacy Implications of Geo-Tagging | Gerald Friedland, Robin Sommer, International Computer Science Institute, Lawrence Berkeley National Laboratory |
HotSec '10 | On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing | Marten van Dijk, Ari Juels |