USENIX Security '10 | Fighting Coercion Attacks in Key Generation using Skin Conductance | Payas Gupta, Debin Gao |
USENIX Security '12 | Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services | Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu |
USENIX Security '12 | Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln |
USENIX Security '12 | Taking Proof-Based Verified Computation a Few Steps Closer to Practicality | Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish |
USENIX Security '12 | PUBCRAWL: Protecting Users and Businesses from CRAWLers | Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
USENIX Security '12 | Clickjacking: Attacks and Defenses | Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson |
USENIX Security '12 | On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces | Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song |
USENIX Security '12 | B@bel: Leveraging Email Delivery for Spam Mitigation | Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna |
USENIX Security '12 | Aurasium: Practical Policy Enforcement for Android Applications | Rubin Xu, Hassen Saïdi, Ross Anderson |
USENIX Security '12 | Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider | Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten |
USENIX Security '12 | TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks | Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu |
USENIX Security '12 | Fuzzing with Code Fragments | Christian Holler, Kim Herzig, Andreas Zeller |
USENIX Security '12 | Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory | Joel Reardon, Srdjan Capkun, David Basin |
USENIX Security '12 | STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud | Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz |
USENIX Security '12 | Efficient and Scalable Socware Detection in Online Social Networks | Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos |
USENIX Security '12 | Optimally Robust Private Information Retrieval | Casey Devet, Ian Goldberg, Nadia Heninger |
USENIX Security '12 | On Breaking SAML: Be Whoever You Want to Be | Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen |
USENIX Security '12 | Gone in 360 Seconds: Hijacking with Hitag2 | Roel Verdult, Flavio D. Garcia, Josep Balasch |
USENIX Security '12 | Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud | Zhenyu Wu, Zhang Xu, Haining Wang |
USENIX Security '12 | AdSplit: Separating Smartphone Advertising from Applications | Shashi Shekhar, Michael Dietz, Dan S. Wallach |
USENIX Security '12 | DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis | Lok Kwong Yan, Heng Yin |
USENIX Security '12 | Chimera: A Declarative Language for Streaming Network Traffic Analysis | Kevin Borders, Jonathan Springer, Matthew Burnside |
USENIX Security '12 | Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion | Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot |
USENIX Security '12 | Impact of Spam Exposure on User Engagement | Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang |
USENIX Security '12 | From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware | Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon |