Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '13Transparent ROP Exploit Mitigation Using Indirect Branch TracingVasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
    USENIX Security '13FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic ExecutionDrew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha
    USENIX Security '13Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing BaseJob Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens
    USENIX Security '13Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for ObfuscationFrank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh Tripunitara
    USENIX Security '13KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel ObjectHojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang
    USENIX Security '13Take This Personally: Pollution Attacks on Personalized ServicesXingyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee
    USENIX Security '13Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media ServicesRuoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
    USENIX Security '13Measuring the Practical Impact of DNSSEC DeploymentWilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage
    USENIX Security '13ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol TemplatesTerry Nelms, Roberto Perdisci, Mustaque Ahamad
    USENIX Security '13ZMap: Fast Internet-wide Scanning and Its Security ApplicationsZakir Durumeric, Eric Wustrow, J. Alex Halderman
    USENIX Security '13Eradicating DNS Rebinding with the Extended Same-origin PolicyMartin Johns, Sebastian Lekies, Ben Stock
    USENIX Security '13Revolver: An Automated Approach to the Detection of Evasive Web-based MalwareAlexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna
    USENIX Security '13Language-based Defenses Against Untrusted Browser OriginsKarthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis
    USENIX Security '13WHYPER: Towards Automating Risk Assessment of Mobile ApplicationsRahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie
    USENIX Security '13Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security AnalysisDamien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon
    USENIX Security '13Jekyll on iOS: When Benign Apps Become EvilTielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee
    USENIX Security '12Impact of Spam Exposure on User EngagementAnirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang
    USENIX Security '12From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based MalwareManos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon
    USENIX Security '12kGuard: Lightweight Kernel Protection against Return-to-User AttacksVasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis
    USENIX Security '12Privacy-Preserving Social PluginsGeorgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos
    USENIX Security '12Progressive Authentication: Deciding When to Authenticate on Mobile PhonesOriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
    USENIX Security '12Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebMichael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach
    USENIX Security '12Privilege Separation in HTML5 ApplicationsDevdatta Akhawe, Prateek Saxena, Dawn Song
    USENIX Security '12Throttling Tor Bandwidth ParasitesRob Jansen, Paul Syverson, Nicholas Hopper
    USENIX Security '12An Evaluation of the Google Chrome Extension Security ArchitectureNicholas Carlini, Adrienne Porter Felt, David Wagner

Pages