Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '10Fighting Coercion Attacks in Key Generation using Skin ConductancePayas Gupta, Debin Gao
    USENIX Security '12Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu
    USENIX Security '12Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose AttacksHristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
    USENIX Security '12Taking Proof-Based Verified Computation a Few Steps Closer to PracticalitySrinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish
    USENIX Security '12PUBCRAWL: Protecting Users and Businesses from CRAWLersGregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna
    USENIX Security '12Clickjacking: Attacks and DefensesLin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson
    USENIX Security '12On the Feasibility of Side-Channel Attacks with Brain-Computer InterfacesIvan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song
    USENIX Security '12B@bel: Leveraging Email Delivery for Spam MitigationGianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
    USENIX Security '12Aurasium: Practical Policy Enforcement for Android ApplicationsRubin Xu, Hassen Saïdi, Ross Anderson
    USENIX Security '12Social Networking with Frientegrity: Privacy and Integrity with an Untrusted ProviderAriel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten
    USENIX Security '12TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without ClocksAmir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu
    USENIX Security '12Fuzzing with Code FragmentsChristian Holler, Kim Herzig, Andreas Zeller
    USENIX Security '12Data Node Encrypted File System: Efficient Secure Deletion for Flash MemoryJoel Reardon, Srdjan Capkun, David Basin
    USENIX Security '12STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the CloudTaesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz
    USENIX Security '12Efficient and Scalable Socware Detection in Online Social NetworksMd Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
    USENIX Security '12Optimally Robust Private Information RetrievalCasey Devet, Ian Goldberg, Nadia Heninger
    USENIX Security '12On Breaking SAML: Be Whoever You Want to BeJuraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
    USENIX Security '12Gone in 360 Seconds: Hijacking with Hitag2Roel Verdult, Flavio D. Garcia, Josep Balasch
    USENIX Security '12Whispers in the Hyper-space: High-speed Covert Channel Attacks in the CloudZhenyu Wu, Zhang Xu, Haining Wang
    USENIX Security '12AdSplit: Separating Smartphone Advertising from ApplicationsShashi Shekhar, Michael Dietz, Dan S. Wallach
    USENIX Security '12DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware AnalysisLok Kwong Yan, Heng Yin
    USENIX Security '12Chimera: A Declarative Language for Streaming Network Traffic AnalysisKevin Borders, Jonathan Springer, Matthew Burnside
    USENIX Security '12Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in MotionY Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot
    USENIX Security '12Impact of Spam Exposure on User EngagementAnirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang
    USENIX Security '12From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based MalwareManos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon

    Pages