Papers

Search results

    ConferenceTitleAuthor(s)
    EVT '07An Analysis of the Hart Intercivic DAU eSlateElliot Proebstel, Sean Riddle, Francis Hsu, Justin Cummins, Freddie Oakley, Tom Stanionis, Matt Bishop
    EVT '07Casting Votes in the AuditoriumDaniel Sandler, Dan S. Wallach
    EVT '07Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot FeaturesKa-Ping Yee
    USENIX Security '07Integrity Checking in Cryptographic File Systems with Constant Trusted StorageAlina Oprea, Michael K. Reiter
    USENIX Security '07Discoverer: Automatic Protocol Reverse Engineering from Network TracesWeidong Cui, Jayanthkumar Kannan, Helen J. Wang
    USENIX Security '07Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationDavid Brumley, Juan Caballero, Zhenkai Liang, James Newsome
    USENIX Security '07OSLO: Improving the Security of Trusted ComputingBernhard Kauer
    USENIX Security '07Secretly Monopolizing the CPU Without Superuser PrivilegesDan Tsafrir, Yoav Etsion, Dror G. Feitelson
    USENIX Security '07Memory Performance Attacks: Denial of Memory Service in Multi-Core SystemsThomas Moscibroda, Onur Mutlu
    USENIX Security '07Spamscatter: Characterizing Internet Scam Hosting InfrastructureDavid S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
    USENIX Security '07Exploiting Network Structure for Proactive Spam MitigationShobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
    USENIX Security '07BotHunter: Detecting Malware Infection Through IDS-Driven Dialog CorrelationGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong
    USENIX Security '07Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingT. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
    USENIX Security '07Web-Based Inference DetectionJessica Staddon, Philippe Golle, Bryce Zimny
    USENIX Security '07Keep Your Enemies Close: Distance Bounding Against Smartcard Relay AttacksSaar Drimer, Steven J. Murdoch
    USENIX Security '07Human-Seeded Attacks and Exploiting Hot-Spots in Graphical PasswordsJulie Thorpe, P.C. van Oorschot
    USENIX Security '07Halting Password Puzzles: Hard-to-break Encryption from Human-memorable KeysXavier Boyen
    DETER 2007A Plan for Malware Containment in the DETER TestbedRon Ostrenga, TBD
    DETER 2007A DETER Federation ArchitectureTed Faber, John Wroclawski, Kevin Lahey
    DETER 2007Very Large Scale Cooperative Experiments in Emulab-Derived SystemsAnthony D. Joseph
    DETER 2007Emulating an Embedded FirewallDeepak Dayama
    USENIX Security '07SIF: Enforcing Confidentiality and Integrity in Web ApplicationsStephen Chong, K. Vikram, Andrew C. Myers
    USENIX Security '07Combating Click Fraud via Premium ClicksAri Juels, Sid Stamm, Markus Jakobsson
    USENIX Security '07SpyProxy: Execution-based Detection of Malicious Web ContentAlexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
    USENIX Security '07Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson

Pages