Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '08The Practical Subtleties of Biometric Key GenerationLucas Ballard, Seny Kamara, Michael K. Reiter
    USENIX Security '08Unidirectional Key Distribution Across Time and Space with Applications to RFID SecurityAri Juels, Ravikanth Pappu, Bryan Parno
    USENIX Security '08CloudAV: N-Version Antivirus in the Network CloudJon Oberheide, Evan Cooke, Farnam Jahanian
    USENIX Security '08Highly Predictive BlacklistingJian Zhang, Phillip Porras, Johannes Ullrich
    USENIX Security '08Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based AttacksJerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck
    USENIX Security '08BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet DetectionGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee
    USENIX Security '08Measurement and Classification of Humans and Bots in Internet ChatSteven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang
    USENIX Security '08To Catch a Predator: A Natural Language Approach for Eliciting Malicious PayloadsSam Small, Joshua Mason, Niels Provos, Adam Stubblefield
    USENIX Security '08Reverse-Engineering a Cryptographic RFID TagStarbug , Henryk Plötz
    USENIX Security '08Practical Symmetric Key Cryptography on Modern Graphics HardwareOwen Harrison, John Waldron
    USENIX Security '08An Improved Clock-skew Measurement Technique for Revealing Hidden ServicesSebastian Zander, Steven J. Murdoch
    USENIX Security '08NetAuth: Supporting User-Based Network ServicesManigandan Radhakrishnan, Jon A. Solworth
    USENIX Security '08Hypervisor Support for Identifying Covertly Executing BinariesLionel Litty, H. Andrés Lagar-Cavilla, David Lie
    USENIX Security '08Selective Versioning in a Secure Disk SystemSwaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok
    USENIX Security '08Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTsThomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy
    USENIX Security '08Panalyst: Privacy-Aware Remote Error Analysis on Commodity SoftwareRui Wang, XiaoFeng Wang, Zhuowei Li
    USENIX Security '08Multi-flow Attacks Against Network Flow Watermarking SchemesNegar Kiyavash, Amir Houmansadr, Nikita Borisov
    USENIX Security '08Verifying Compliance of Trusted ProgramsSandra Rueda, Dave King, Trent Jaeger
    USENIX Security '08Helios: Web-based Open-Audit VotingBen Adida
    USENIX Security '08VoteBox: A Tamper-evident, Verifiable Electronic Voting SystemDaniel Sandler, Kyle Derr, Dan S. Wallach
    USENIX Security '08An Empirical Security Study of the Native Code in the JDKGang Tan, Jason Croft
    USENIX Security '08AutoISES: Automatically Inferring Security Specification and Detecting ViolationsLin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou
    USENIX Security '08Real-World Buffer Overflow Protection for Userspace & KernelspaceMichael Dalton, Hari Kannan, Christos Kozyrakis
    USENIX Security '07SIF: Enforcing Confidentiality and Integrity in Web ApplicationsStephen Chong, K. Vikram, Andrew C. Myers
    USENIX Security '07Combating Click Fraud via Premium ClicksAri Juels, Sid Stamm, Markus Jakobsson

Pages