Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '11Q: Exploit Hardening Made EasyEdward J. Schwartz, Thanassis Avgerinos, David Brumley
    USENIX Security '11Cloaking Malware with the Trusted Platform ModuleAlan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel
    USENIX Security '11Detecting Malware Domains at the Upper DNS HierarchyManos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon
    USENIX Security '11BOTMAGNIFIER: Locating Spambots on the InternetGianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna
    USENIX Security '11Differential Privacy Under FireAndreas Haeberlen, Benjamin C. Pierce, Arjun Narayan
    USENIX Security '11Outsourcing the Decryption of ABE CiphertextsMatthew Green, Susan Hohenberger, Brent Waters
    USENIX Security '11ZOZZLE: Fast and Precise In-Browser JavaScript Malware DetectionCharlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert
    USENIX Security '11Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio SystemSandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze
    USENIX Security '11Comprehensive Experimental Analyses of Automotive Attack SurfacesStephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno
    USENIX Security '11Dirty Jobs: The Role of Freelance Labor in Web Service AbuseMarti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker
    USENIX Security '11deSEO: Combating Search-Result PoisoningJohn P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi
    USENIX Security '11JACKSTRAWS: Picking Command and Control Connections from Bot TrafficGregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz
    USENIX Security '11Telex: Anticensorship in the Network InfrastructureEric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
    USENIX Security '11PIR-Tor: Scalable Anonymous Communication Using Private Information RetrievalPrateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg
    USENIX Security '11The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver CollusionSarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham
    USENIX Security '11Faster Secure Two-Party Computation Using Garbled CircuitsYan Huang, David Evans, Jonathan Katz, Lior Malka
    USENIX Security '10Adapting Software Fault Isolation to Contemporary CPU ArchitecturesDavid Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen
    USENIX Security '10Making Linux Protection Mechanisms Egalitarian with UserFSTaesoo Kim, Nickolai Zeldovich
    USENIX Security '10Capsicum: Practical Capabilities for UNIXRobert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway
    USENIX Security '10Structuring Protocol Implementations to Protect Sensitive DataPetr Marchenko, Brad Karp
    USENIX Security '10PrETP: Privacy-Preserving Electronic Toll PricingJosep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens
    USENIX Security '10An Analysis of Private Browsing Modes in Modern BrowsersGaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh
    USENIX Security '10BotGrep: Finding P2P Bots with Structured Graph AnalysisShishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov
    USENIX Security '10Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention SystemsChad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, Alex X. Liu
    USENIX Security '10Searching the Searchers with SearchAuditJohn P. John, University of Washington, Microsoft Research Silicon Valley, Fang Yu, Yinglian Xie, Martín Abadi, Microsoft Research Silicon Valley, University of California, Arvind Krishnamurthy

Pages