SP A*

27 papers

YearTitle / Authors
200930th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA
2009A Logic of Secure Systems and its Application to Trusted Computing.
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kirli Kaynar
2009An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.
Ralf Küsters, Tomasz Truderung
2009Automatic Discovery and Quantification of Information Leaks.
Michael Backes, Boris Köpf, Andrey Rybalchenko
2009Automatic Reverse Engineering of Malware Emulators.
Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee
2009Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers.
Mike Ter Louw, V. N. Venkatakrishnan
2009CLAMP: Practical Prevention of Large-Scale Data Leaks.
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig
2009DSybil: Optimal Sybil-Resistance for Recommendation Systems.
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao
2009De-anonymizing Social Networks.
Arvind Narayanan, Vitaly Shmatikov
2009Exploiting Unix File-System Races via Algorithmic Complexity Attacks.
Xiang Cai, Yuwei Gui, Rob Johnson
2009Fingerprinting Blank Paper Using Commodity Scanners.
William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten
2009Formally Certifying the Security of Digital Signature Schemes.
Santiago Zanella-Béguelin, Gilles Barthe, Benjamin Grégoire, Federico Olmedo
2009It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions.
Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman
2009Native Client: A Sandbox for Portable, Untrusted x86 Native Code.
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar
2009Noninterference for a Practical DIFC-Based Operating System.
Maxwell N. Krohn, Eran Tromer
2009Password Cracking Using Probabilistic Context-Free Grammars.
Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek
2009Plaintext Recovery Attacks against SSH.
Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson
2009Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter
2009Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments.
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
2009Privacy Weaknesses in Biometric Sketches.
Koen Simoens, Pim Tuyls, Bart Preneel
2009Prospex: Protocol Specification Extraction.
Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda
2009Quantifying Information Leaks in Outbound Web Traffic.
Kevin Borders, Atul Prakash
2009Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Adam Barth, Juan Caballero, Dawn Song
2009Sphinx: A Compact and Provably Secure Mix Format.
George Danezis, Ian Goldberg
2009Tempest in a Teapot: Compromising Reflections Revisited.
Michael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk
2009The Mastermind Attack on Genomic Data.
Michael T. Goodrich
2009Wirelessly Pickpocketing a Mifare Classic Card.
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur