USENIX Security '12 | Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization | Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum |
USENIX Security '12 | STING: Finding Name Resolution Vulnerabilities in Programs | Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger |
USENIX Security '12 | Tracking Rootkit Footprints with a Practical Memory Analysis System | Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan |
USENIX Security '12 | Billion-Gate Secure Computation with Malicious Adversaries | Benjamin Kreuter, Abhi Shelat, Chih-hao Shen |
USENIX Security '12 | PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs | Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko |
USENIX Security '12 | How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation | Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
USENIX Security '12 | Establishing Browser Security Guarantees through Formal Shim Verification | Dongseok Jang, Zachary Tatlock, Sorin Lerner |
USENIX Security '12 | I Forgot Your Password: Randomness Attacks Against PHP Applications | George Argyros, Aggelos Kiayias |
USENIX Security '12 | Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner | Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna |
USENIX Security '12 | Tachyon: Tandem Execution for Efficient Live Patch Testing | Matthew Maurer, David Brumley |
USENIX Security '12 | Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices | Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman |
USENIX Security '12 | New Attacks on Timing-based Network Flow Watermarks | Zi Lin, Nicholas Hopper |
USENIX Security '12 | Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services | Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu |
USENIX Security '12 | Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln |
USENIX Security '12 | Taking Proof-Based Verified Computation a Few Steps Closer to Practicality | Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish |
USENIX Security '12 | PUBCRAWL: Protecting Users and Businesses from CRAWLers | Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
USENIX Security '12 | Clickjacking: Attacks and Defenses | Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson |
USENIX Security '12 | On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces | Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song |
USENIX Security '12 | B@bel: Leveraging Email Delivery for Spam Mitigation | Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna |
USENIX Security '12 | Aurasium: Practical Policy Enforcement for Android Applications | Rubin Xu, Hassen Saïdi, Ross Anderson |
USENIX Security '12 | Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider | Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten |
USENIX Security '12 | TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks | Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu |
USENIX Security '12 | Fuzzing with Code Fragments | Christian Holler, Kim Herzig, Andreas Zeller |
USENIX Security '12 | Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory | Joel Reardon, Srdjan Capkun, David Basin |
USENIX Security '12 | STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud | Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz |