SP A*

29 papers

YearTitle / Authors
20082008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA
2008Anonymous Networking with Minimum Latency in Multihop Networks.
Parvathinathan Venkitasubramaniam, Lang Tong
2008Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage.
Bruno Blanchet, Avik Chaudhuri
2008Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng
2008Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis
2008Civitas: Toward a Secure Voting System.
Michael R. Clarkson, Stephen Chong, Andrew C. Myers
2008ClearShot: Eavesdropping on Keyboard Input from Video.
Davide Balzarotti, Marco Cova, Giovanni Vigna
2008Cloaker: Hardware Supported Rootkit Concealment.
Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell
2008Compromising Reflections-or-How to Read LCD Monitors around the Corner.
Michael Backes, Markus Dürmuth, Dominique Unruh
2008Efficient and Robust TCP Stream Normalization.
Mythili Vutukuru, Hari Balakrishnan, Vern Paxson
2008Expressive Declassification Policies and Modular Static Enforcement.
Anindya Banerjee, David A. Naumann, Stan Rosenberg
2008Fable: A Language for Enforcing User-defined Security Policies.
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
2008Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
2008Lares: An Architecture for Secure Active Monitoring Using Virtualization.
Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee
2008Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel
2008Practical Proactive Integrity Preservation: A Basis for Malware Defense.
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar
2008Predictable Design of Network-Based Covert Communication Systems.
Ronald William Smith, George Scott Knight
2008Preserving Caller Anonymity in Voice-over-IP Networks.
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
2008Preventing Memory Error Exploits with WIT.
Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro
2008Robust De-anonymization of Large Sparse Datasets.
Arvind Narayanan, Vitaly Shmatikov
2008Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna
2008Secure Web Browsing with the OP Web Browser.
Chris Grier, Shuo Tang, Samuel T. King
2008Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson
2008SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao
2008Thinking Inside the Box: System-Level Failures of Tamper Proofing.
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
2008Towards Practical Privacy for Genomic Computation.
Somesh Jha, Louis Kruger, Vitaly Shmatikov
2008Verifying the Safety of User Pointer Dereferences.
Suhabe Bugrara, Alex Aiken
2008XFA: Faster Signature Matching with Extended Automata.
Randy Smith, Cristian Estan, Somesh Jha
2008Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Michael Backes, Matteo Maffei, Dominique Unruh