HotSec '10 | Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks | Stuart Schechter, Cormac Herley, Michael Mitzenmacher |
HotSec '10 | Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine | Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh, Cyrille Artho, Yoshihito Watanebe |
HotSec '10 | Embedded Firmware Diversity for Smart Electric Meters | Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, Patrick McDaniel |
HotSec '10 | Evading Cellular Data Monitoring with Human Movement Networks | Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith |
HotSec '10 | Challenges in Access Right Assignment for Secure Home Networks | Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker |
HotSec '10 | Scalable Anonymous Communication with Provable Security | Prateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial |
HotSec '10 | Retroactive Detection of Malware with Applications to Mobile Platforms | Markus Jakobsson, Karl-Anders Johansson |
HotSec '10 | Scalable Web Object Inspection and Malfease Collection | Charalampos Andrianakis, Paul Seymer, Angelos Stavrou |
HotSec '08 | Towards Application Security on Untrusted Operating Systems | Dan R.K. Ports, Tal Garfinkel |
HotSec '08 | Digital Objects as Passwords | Mohammad Mannan, P.C. van Oorschot |
HotSec '08 | Security Benchmarking using Partial Verification | Thomas E. Hart, Marsha Chechik, David Lie |
HotSec '08 | Securing Provenance | Uri Braun, Avraham Shinnar, Margo Seltzer |
HotSec '08 | Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security | Tamara Denning, Kevin Fu, Tadayoshi Kohno |
HotSec '08 | Research Challenges for the Security of Control Systems | Alvaro A. Cárdenas, Saurabh Amin, Shankar Sastry |
HotSec '08 | Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications | Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Bruce Schneier |
HotSec '08 | Panic Passwords: Authenticating under Duress | Jeremy Clark, Urs Hengartner |
HotSec '08 | Bootstrapping Trust in a "Trusted" Platform | Bryan Parno |
HotSec '08 | Towards Quantification of Network-Based Information Leaks via HTTP | Kevin Borders, Atul Prakash |
HotSec '08 | Principles for Developing Comprehensive Network Visibility | Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver |
HotSec '08 | Challenges and Directions for Monitoring P2P File Sharing Networks—or—Why My Printer Received a DMCA Takedown Notice | Michael Piatek, Arvind Krishnamurthy |
HotSec '07 | Transaction Generators: Root Kits for Web | Collin Jackson, Dan Boneh, John Mitchell |
HotSec '07 | Delegating Responsibility in Digital Systems: Horton's "Who Done It?" | Mark S. Miller, James E. Donnelley, Alan H. Karp |
HotSec '07 | Quantifying the Strength of Security Systems | David Lie, M. Satyanarayanan |
HotSec '07 | Towards Application-Aware Anonymous Routing | Micah Sherr, Boon Thau Loo, Matt Blaze |
HotSec '07 | Rethinking Antivirus: Executable Analysis in the Network Cloud | Jon Oberheide, Evan Cooke, Farnam Jahanian |