USENIX Security '11 | Q: Exploit Hardening Made Easy | Edward J. Schwartz, Thanassis Avgerinos, David Brumley |
USENIX Security '11 | Cloaking Malware with the Trusted Platform Module | Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel |
USENIX Security '11 | Detecting Malware Domains at the Upper DNS Hierarchy | Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon |
USENIX Security '11 | BOTMAGNIFIER: Locating Spambots on the Internet | Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna |
USENIX Security '11 | Differential Privacy Under Fire | Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan |
USENIX Security '11 | Outsourcing the Decryption of ABE Ciphertexts | Matthew Green, Susan Hohenberger, Brent Waters |
USENIX Security '11 | ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection | Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert |
USENIX Security '11 | Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System | Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze |
USENIX Security '11 | Comprehensive Experimental Analyses of Automotive Attack Surfaces | Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno |
USENIX Security '11 | Dirty Jobs: The Role of Freelance Labor in Web Service Abuse | Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker |
USENIX Security '11 | deSEO: Combating Search-Result Poisoning | John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi |
USENIX Security '11 | JACKSTRAWS: Picking Command and Control Connections from Bot Traffic | Gregoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz |
USENIX Security '11 | Telex: Anticensorship in the Network Infrastructure | Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman |
USENIX Security '11 | PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval | Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg |
USENIX Security '11 | The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion | Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham |
USENIX Security '11 | Faster Secure Two-Party Computation Using Garbled Circuits | Yan Huang, David Evans, Jonathan Katz, Lior Malka |
USENIX Security '10 | Adapting Software Fault Isolation to Contemporary CPU Architectures | David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen |
USENIX Security '10 | Making Linux Protection Mechanisms Egalitarian with UserFS | Taesoo Kim, Nickolai Zeldovich |
USENIX Security '10 | Capsicum: Practical Capabilities for UNIX | Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway |
USENIX Security '10 | Structuring Protocol Implementations to Protect Sensitive Data | Petr Marchenko, Brad Karp |
USENIX Security '10 | PrETP: Privacy-Preserving Electronic Toll Pricing | Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens |
USENIX Security '10 | An Analysis of Private Browsing Modes in Modern Browsers | Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh |
USENIX Security '10 | BotGrep: Finding P2P Bots with Structured Graph Analysis | Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov |
USENIX Security '10 | Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems | Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, Alex X. Liu |
USENIX Security '10 | Searching the Searchers with SearchAudit | John P. John, University of Washington, Microsoft Research Silicon Valley, Fang Yu, Yinglian Xie, Martín Abadi, Microsoft Research Silicon Valley, University of California, Arvind Krishnamurthy |