Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '12Enhanced Operating System Security Through Efficient and Fine-grained Address Space RandomizationCristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum
    USENIX Security '12STING: Finding Name Resolution Vulnerabilities in ProgramsHayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
    USENIX Security '12Tracking Rootkit Footprints with a Practical Memory Analysis SystemWeidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan
    USENIX Security '12Billion-Gate Secure Computation with Malicious AdversariesBenjamin Kreuter, Abhi Shelat, Chih-hao Shen
    USENIX Security '12PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsDamon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko
    USENIX Security '12How Does Your Password Measure Up? The Effect of Strength Meters on Password CreationBlase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    USENIX Security '12Establishing Browser Security Guarantees through Formal Shim VerificationDongseok Jang, Zachary Tatlock, Sorin Lerner
    USENIX Security '12I Forgot Your Password: Randomness Attacks Against PHP ApplicationsGeorge Argyros, Aggelos Kiayias
    USENIX Security '12Enemy of the State: A State-Aware Black-Box Web Vulnerability ScannerAdam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
    USENIX Security '12Tachyon: Tandem Execution for Efficient Live Patch TestingMatthew Maurer, David Brumley
    USENIX Security '12Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network DevicesNadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman
    USENIX Security '12New Attacks on Timing-based Network Flow WatermarksZi Lin, Nicholas Hopper
    USENIX Security '12Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu
    USENIX Security '12Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose AttacksHristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln
    USENIX Security '12Taking Proof-Based Verified Computation a Few Steps Closer to PracticalitySrinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish
    USENIX Security '12PUBCRAWL: Protecting Users and Businesses from CRAWLersGregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna
    USENIX Security '12Clickjacking: Attacks and DefensesLin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson
    USENIX Security '12On the Feasibility of Side-Channel Attacks with Brain-Computer InterfacesIvan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song
    USENIX Security '12B@bel: Leveraging Email Delivery for Spam MitigationGianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
    USENIX Security '12Aurasium: Practical Policy Enforcement for Android ApplicationsRubin Xu, Hassen Saïdi, Ross Anderson
    USENIX Security '12Social Networking with Frientegrity: Privacy and Integrity with an Untrusted ProviderAriel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten
    USENIX Security '12TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without ClocksAmir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu
    USENIX Security '12Fuzzing with Code FragmentsChristian Holler, Kim Herzig, Andreas Zeller
    USENIX Security '12Data Node Encrypted File System: Efficient Secure Deletion for Flash MemoryJoel Reardon, Srdjan Capkun, David Basin
    USENIX Security '12STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the CloudTaesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz

Pages