Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '07SpyProxy: Execution-based Detection of Malicious Web ContentAlexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
    USENIX Security '07Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson
    USENIX Security '07Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingT. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
    USENIX Security '07Web-Based Inference DetectionJessica Staddon, Philippe Golle, Bryce Zimny
    USENIX Security '07Keep Your Enemies Close: Distance Bounding Against Smartcard Relay AttacksSaar Drimer, Steven J. Murdoch
    USENIX Security '07Human-Seeded Attacks and Exploiting Hot-Spots in Graphical PasswordsJulie Thorpe, P.C. van Oorschot
    USENIX Security '07Halting Password Puzzles: Hard-to-break Encryption from Human-memorable KeysXavier Boyen
    USENIX Security '07Spamscatter: Characterizing Internet Scam Hosting InfrastructureDavid S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
    USENIX Security '07Exploiting Network Structure for Proactive Spam MitigationShobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
    USENIX Security '07BotHunter: Detecting Malware Infection Through IDS-Driven Dialog CorrelationGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong
    USENIX Security '07Integrity Checking in Cryptographic File Systems with Constant Trusted StorageAlina Oprea, Michael K. Reiter
    USENIX Security '07Discoverer: Automatic Protocol Reverse Engineering from Network TracesWeidong Cui, Jayanthkumar Kannan, Helen J. Wang
    USENIX Security '07Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationDavid Brumley, Juan Caballero, Zhenkai Liang, James Newsome
    USENIX Security '07OSLO: Improving the Security of Trusted ComputingBernhard Kauer
    USENIX Security '07Secretly Monopolizing the CPU Without Superuser PrivilegesDan Tsafrir, Yoav Etsion, Dror G. Feitelson
    USENIX Security '07Memory Performance Attacks: Denial of Memory Service in Multi-Core SystemsThomas Moscibroda, Onur Mutlu
    USENIX Security '07Binary Obfuscation Using SignalsIgor V. Popov, Saumya K. Debray, Gregory R. Andrews
    USENIX Security '07Active Hardware Metering for Intellectual Property Protection and SecurityYousra M. Alkabani, Farinaz Koushanfar
    USENIX Security '07On Attack Causality in Internet-Connected Cellular NetworksPatrick McDaniel
    USENIX Security '07Proximity Breeds Danger: Emerging Threats in Metro-area Wireless NetworksP. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis
    USENIX Security '07On Web Browsing Privacy in Anonymized NetFlowsS.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter
    USENIX Security '06A Usability Study and Critique of Two Password Managers Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    USENIX Security '06On the Release of CRLs in Public Key InfrastructureChengyu Ma, Nan Hu, Yingjiu Li
    USENIX Security '06Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingLucas Ballard, Fabian Monrose, Daniel Lopresti
    USENIX Security '06How to Build a Low-Cost, Extended-Range RFID SkimmerIlan Kirschenbaum, Avishai Wool

Pages