USENIX Security '07 | SpyProxy: Execution-based Detection of Malicious Web Content | Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy |
USENIX Security '07 | Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? | Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson |
USENIX Security '07 | Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing | T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno |
USENIX Security '07 | Web-Based Inference Detection | Jessica Staddon, Philippe Golle, Bryce Zimny |
USENIX Security '07 | Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks | Saar Drimer, Steven J. Murdoch |
USENIX Security '07 | Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords | Julie Thorpe, P.C. van Oorschot |
USENIX Security '07 | Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys | Xavier Boyen |
USENIX Security '07 | Spamscatter: Characterizing Internet Scam Hosting Infrastructure | David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker |
USENIX Security '07 | Exploiting Network Structure for Proactive Spam Mitigation | Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song |
USENIX Security '07 | BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation | Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong |
USENIX Security '07 | Integrity Checking in Cryptographic File Systems with Constant Trusted Storage | Alina Oprea, Michael K. Reiter |
USENIX Security '07 | Discoverer: Automatic Protocol Reverse Engineering from Network Traces | Weidong Cui, Jayanthkumar Kannan, Helen J. Wang |
USENIX Security '07 | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation | David Brumley, Juan Caballero, Zhenkai Liang, James Newsome |
USENIX Security '07 | OSLO: Improving the Security of Trusted Computing | Bernhard Kauer |
USENIX Security '07 | Secretly Monopolizing the CPU Without Superuser Privileges | Dan Tsafrir, Yoav Etsion, Dror G. Feitelson |
USENIX Security '07 | Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems | Thomas Moscibroda, Onur Mutlu |
USENIX Security '07 | Binary Obfuscation Using Signals | Igor V. Popov, Saumya K. Debray, Gregory R. Andrews |
USENIX Security '07 | Active Hardware Metering for Intellectual Property Protection and Security | Yousra M. Alkabani, Farinaz Koushanfar |
USENIX Security '07 | On Attack Causality in Internet-Connected Cellular Networks | Patrick McDaniel |
USENIX Security '07 | Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks | P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis |
USENIX Security '07 | On Web Browsing Privacy in Anonymized NetFlows | S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter |
USENIX Security '06 | A Usability Study and Critique of Two Password Managers | Sonia Chiasson, P.C. van Oorschot, Robert Biddle |
USENIX Security '06 | On the Release of CRLs in Public Key Infrastructure | Chengyu Ma, Nan Hu, Yingjiu Li |
USENIX Security '06 | Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing | Lucas Ballard, Fabian Monrose, Daniel Lopresti |
USENIX Security '06 | How to Build a Low-Cost, Extended-Range RFID Skimmer | Ilan Kirschenbaum, Avishai Wool |