Papers

Search results

    ConferenceTitleAuthor(s)
    HotSec '10Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing AttacksStuart Schechter, Cormac Herley, Michael Mitzenmacher
    HotSec '10Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual MachineKuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Nguyen Anh Quynh, Cyrille Artho, Yoshihito Watanebe
    HotSec '10Embedded Firmware Diversity for Smart Electric MetersStephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, Patrick McDaniel
    HotSec '10Evading Cellular Data Monitoring with Human Movement NetworksAdam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
    HotSec '10Challenges in Access Right Assignment for Secure Home NetworksTiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker
    HotSec '10Scalable Anonymous Communication with Provable SecurityPrateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial
    HotSec '10Retroactive Detection of Malware with Applications to Mobile PlatformsMarkus Jakobsson, Karl-Anders Johansson
    HotSec '10Scalable Web Object Inspection and Malfease CollectionCharalampos Andrianakis, Paul Seymer, Angelos Stavrou
    HotSec '08Towards Application Security on Untrusted Operating SystemsDan R.K. Ports, Tal Garfinkel
    HotSec '08Digital Objects as PasswordsMohammad Mannan, P.C. van Oorschot
    HotSec '08Security Benchmarking using Partial VerificationThomas E. Hart, Marsha Chechik, David Lie
    HotSec '08Securing ProvenanceUri Braun, Avraham Shinnar, Margo Seltzer
    HotSec '08Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device SecurityTamara Denning, Kevin Fu, Tadayoshi Kohno
    HotSec '08Research Challenges for the Security of Control SystemsAlvaro A. Cárdenas, Saurabh Amin, Shankar Sastry
    HotSec '08Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and ApplicationsAlexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Bruce Schneier
    HotSec '08Panic Passwords: Authenticating under DuressJeremy Clark, Urs Hengartner
    HotSec '08Bootstrapping Trust in a "Trusted" PlatformBryan Parno
    HotSec '08Towards Quantification of Network-Based Information Leaks via HTTPKevin Borders, Atul Prakash
    HotSec '08Principles for Developing Comprehensive Network VisibilityMark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver
    HotSec '08Challenges and Directions for Monitoring P2P File Sharing Networks—or—Why My Printer Received a DMCA Takedown NoticeMichael Piatek, Arvind Krishnamurthy
    HotSec '07Transaction Generators: Root Kits for Web Collin Jackson, Dan Boneh, John Mitchell
    HotSec '07Delegating Responsibility in Digital Systems: Horton's "Who Done It?"Mark S. Miller, James E. Donnelley, Alan H. Karp
    HotSec '07Quantifying the Strength of Security SystemsDavid Lie, M. Satyanarayanan
    HotSec '07Towards Application-Aware Anonymous Routing Micah Sherr, Boon Thau Loo, Matt Blaze
    HotSec '07Rethinking Antivirus: Executable Analysis in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian

Pages