USENIX Security '08 | The Practical Subtleties of Biometric Key Generation | Lucas Ballard, Seny Kamara, Michael K. Reiter |
USENIX Security '08 | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | Ari Juels, Ravikanth Pappu, Bryan Parno |
USENIX Security '08 | CloudAV: N-Version Antivirus in the Network Cloud | Jon Oberheide, Evan Cooke, Farnam Jahanian |
USENIX Security '08 | Highly Predictive Blacklisting | Jian Zhang, Phillip Porras, Johannes Ullrich |
USENIX Security '08 | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck |
USENIX Security '08 | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee |
USENIX Security '08 | Measurement and Classification of Humans and Bots in Internet Chat | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang |
USENIX Security '08 | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | Sam Small, Joshua Mason, Niels Provos, Adam Stubblefield |
USENIX Security '08 | Reverse-Engineering a Cryptographic RFID Tag | Starbug , Henryk Plötz |
USENIX Security '08 | Practical Symmetric Key Cryptography on Modern Graphics Hardware | Owen Harrison, John Waldron |
USENIX Security '08 | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | Sebastian Zander, Steven J. Murdoch |
USENIX Security '08 | NetAuth: Supporting User-Based Network Services | Manigandan Radhakrishnan, Jon A. Solworth |
USENIX Security '08 | Hypervisor Support for Identifying Covertly Executing Binaries | Lionel Litty, H. Andrés Lagar-Cavilla, David Lie |
USENIX Security '08 | Selective Versioning in a Secure Disk System | Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok |
USENIX Security '08 | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy |
USENIX Security '08 | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | Rui Wang, XiaoFeng Wang, Zhuowei Li |
USENIX Security '08 | Multi-flow Attacks Against Network Flow Watermarking Schemes | Negar Kiyavash, Amir Houmansadr, Nikita Borisov |
USENIX Security '08 | Verifying Compliance of Trusted Programs | Sandra Rueda, Dave King, Trent Jaeger |
USENIX Security '08 | Helios: Web-based Open-Audit Voting | Ben Adida |
USENIX Security '08 | VoteBox: A Tamper-evident, Verifiable Electronic Voting System | Daniel Sandler, Kyle Derr, Dan S. Wallach |
USENIX Security '08 | An Empirical Security Study of the Native Code in the JDK | Gang Tan, Jason Croft |
USENIX Security '08 | AutoISES: Automatically Inferring Security Specification and Detecting Violations | Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou |
USENIX Security '08 | Real-World Buffer Overflow Protection for Userspace & Kernelspace | Michael Dalton, Hari Kannan, Christos Kozyrakis |
USENIX Security '07 | SIF: Enforcing Confidentiality and Integrity in Web Applications | Stephen Chong, K. Vikram, Andrew C. Myers |
USENIX Security '07 | Combating Click Fraud via Premium Clicks | Ari Juels, Sid Stamm, Markus Jakobsson |