IEEE Symposium on Security and Privacy A*

35 papers

YearTitle / Authors
201031st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA
2010A Practical Attack to De-anonymize Social Network Users.
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel
2010A Proof-Carrying File System.
Deepak Garg, Frank Pfenning
2010A Symbolic Execution Framework for JavaScript.
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song
2010All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).
Edward J. Schwartz, Thanassis Avgerinos, David Brumley
2010Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
Yao Liu, Peng Ning, Huaiyu Dai
2010Bootstrapping Trust in Commodity Computers.
Bryan Parno, Jonathan M. McCune, Adrian Perrig
2010Chip and PIN is Broken.
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, Mike Bond
2010ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.
Leo A. Meyerovich, V. Benjamin Livshits
2010Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective.
W. Douglas Maughan
2010Experimental Security Analysis of a Modern Automobile.
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage
2010History of US Government Investments in Cybersecurity Research: A Personal Perspective.
Carl E. Landwehr
2010How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation.
Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Daniel Jurafsky
2010HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.
Zhi Wang, Xuxian Jiang
2010Identifying Dormant Functionality in Malware Programs.
Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero
2010Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries.
Clemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda
2010Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu
2010Noninterference through Secure Multi-execution.
Dominique Devriese, Frank Piessens
2010Object Capabilities and Isolation of Untrusted Web Applications.
Sergio Maffeis, John C. Mitchell, Ankur Taly
2010On the Incoherencies in Web Browser Access Control Policies.
Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee
2010Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
Robin Sommer, Vern Paxson
2010Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith
2010Reconciling Belief and Vulnerability in Information Flow.
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Palamidessi
2010Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy.
Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer
2010Revocation Systems with Very Small Private Keys.
Allison B. Lewko, Amit Sahai, Brent Waters
2010Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.
Haowen Chan, Adrian Perrig
2010SCiFI - A System for Secure Face Identification.
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich
2010Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size.
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri
2010Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
Shuo Chen, Rui Wang, Xiaofeng Wang, Kehuan Zhang
2010State of the Art: Automated Black-Box Web Application Vulnerability Testing.
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell
2010Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan
2010TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
2010Tamper Evident Microprocessors.
Adam Waksman, Simha Sethumadhavan
2010Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle
2010TrustVisor: Efficient TCB Reduction and Attestation.
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig