EVT '07 | An Analysis of the Hart Intercivic DAU eSlate | Elliot Proebstel, Sean Riddle, Francis Hsu, Justin Cummins, Freddie Oakley, Tom Stanionis, Matt Bishop |
EVT '07 | Casting Votes in the Auditorium | Daniel Sandler, Dan S. Wallach |
EVT '07 | Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features | Ka-Ping Yee |
USENIX Security '07 | Integrity Checking in Cryptographic File Systems with Constant Trusted Storage | Alina Oprea, Michael K. Reiter |
USENIX Security '07 | Discoverer: Automatic Protocol Reverse Engineering from Network Traces | Weidong Cui, Jayanthkumar Kannan, Helen J. Wang |
USENIX Security '07 | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation | David Brumley, Juan Caballero, Zhenkai Liang, James Newsome |
USENIX Security '07 | OSLO: Improving the Security of Trusted Computing | Bernhard Kauer |
USENIX Security '07 | Secretly Monopolizing the CPU Without Superuser Privileges | Dan Tsafrir, Yoav Etsion, Dror G. Feitelson |
USENIX Security '07 | Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems | Thomas Moscibroda, Onur Mutlu |
USENIX Security '07 | Spamscatter: Characterizing Internet Scam Hosting Infrastructure | David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker |
USENIX Security '07 | Exploiting Network Structure for Proactive Spam Mitigation | Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song |
USENIX Security '07 | BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation | Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong |
USENIX Security '07 | Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing | T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno |
USENIX Security '07 | Web-Based Inference Detection | Jessica Staddon, Philippe Golle, Bryce Zimny |
USENIX Security '07 | Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks | Saar Drimer, Steven J. Murdoch |
USENIX Security '07 | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords | Julie Thorpe, P.C. van Oorschot |
USENIX Security '07 | Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys | Xavier Boyen |
DETER 2007 | A Plan for Malware Containment in the DETER Testbed | Ron Ostrenga, TBD |
DETER 2007 | A DETER Federation Architecture | Ted Faber, John Wroclawski, Kevin Lahey |
DETER 2007 | Very Large Scale Cooperative Experiments in Emulab-Derived Systems | Anthony D. Joseph |
DETER 2007 | Emulating an Embedded Firewall | Deepak Dayama |
USENIX Security '07 | SIF: Enforcing Confidentiality and Integrity in Web Applications | Stephen Chong, K. Vikram, Andrew C. Myers |
USENIX Security '07 | Combating Click Fraud via Premium Clicks | Ari Juels, Sid Stamm, Markus Jakobsson |
USENIX Security '07 | SpyProxy: Execution-based Detection of Malicious Web Content | Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy |
USENIX Security '07 | Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? | Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson |