Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '14A Large-Scale Empirical Analysis of Chinese Web PasswordsZhigong Li, Weili Han, Wenyuan Xu
    USENIX Security '14Telepathwords: Preventing Weak Passwords by Reading Users’ MindsSaranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart Schechter
    USENIX Security '14Precise Client-side Protection against DOM-based Cross-Site ScriptingBen Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, Martin Johns
    USENIX Security '14Automatically Detecting Vulnerable Websites Before They Turn MaliciousKyle Soska, Nicolas Christin
    USENIX Security '14Towards Reliable Storage of 56-bit Secrets in Human MemoryJoseph Bonneau, Stuart Schechter
    USENIX Security '14Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of AccountsDinei Florêncio, Cormac Herley, Paul C. van Oorschot
    USENIX Security '14Scheduler-based Defenses against Cross-VM Side-channelsVenkatanathan Varadarajan, Thomas Ristenpart, Michael Swift
    USENIX Security '14A Look at Targeted Attacks Through the Lense of an NGOStevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda
    USENIX Security '14On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web ApplicationsNikolaos Karapanos, Srdjan Capkun
    USENIX Security '14The Emperor’s New Password Manager: Security Analysis of Web-based Password ManagersZhiwei Li, Warren He, Devdatta Akhawe, Dawn Song
    USENIX Security '14Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code SharingMichael Backes, Stefan Nürnberger
    USENIX Security '14iSeeYou: Disabling the MacBook Webcam Indicator LEDMatthew Brocker, Stephen Checkoway
    USENIX Security '14ROP is Still Dangerous: Breaking Modern DefensesNicholas Carlini, David Wagner
    USENIX Security '14On the Practical Exploitability of Dual EC in TLS ImplementationsStephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson
    USENIX Security '14SpanDex: Secure Password Tracking for AndroidLandon P. Cox, Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati
    USENIX Security '14Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity ProtectionLucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose
    USENIX Security '14Blanket Execution: Dynamic Similarity Testing for Program Binaries and ComponentsManuel Egele, Maverick Woo, Peter Chapman, David Brumley
    USENIX Security '14Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is HardEnes Göktaş, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis
    USENIX Security '14SSOScan: Automated Testing of Web Applications for Single Sign-On VulnerabilitiesYuchen Zhou, David Evans
    USENIX Security '14Password Managers: Attacks and DefensesDavid Silver, Suman Jana, Dan Boneh, Eric Chen, Collin Jackson
    USENIX Security '14From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital TelevisionYossef Oren, Angelos D. Keromytis
    USENIX Security '14When Governments Hack Opponents: A Look at Actors and TechnologyWilliam R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson
    USENIX Security '14DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic ReuseBrendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu
    USENIX Security '14Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing WorkersGang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao
    USENIX Security '14Cardinal Pill Testing of System Virtual MachinesHao Shi, Abdulla Alwabel, Jelena Mirkovic

Pages