IEEE Symposium on Security and Privacy A*

35 papers

YearTitle / Authors
2011"You Might Also Like: " Privacy Risks of Collaborative Filtering.
Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov
201132nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA
2011A Formalization of the Security Features of Physical Functions.
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann
2011Automated Analysis of Security-Critical JavaScript APIs.
Ankur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra
2011Cache Games - Bringing Access-Based Cache Attacks on AES to Practice.
David Gullasch, Endre Bangerter, Stephan Krenn
2011Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
2011Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET.
Thai Duong, Juliano Rizzo
2011Defeating UCI: Building Stealthy and Malicious Hardware.
Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King
2011Design and Evaluation of a Real-Time URL Spam Filtering Service.
Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song
2011Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song
2011Extending Nymble-like Systems.
Ryan Henry, Ian Goldberg
2011Formalizing Anonymous Blacklisting Systems.
Ryan Henry, Ian Goldberg
2011HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter
2011How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
Rui Wang, Shuo Chen, Xiaofeng Wang, Shaz Qadeer
2011I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks.
Zachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, Collin Jackson
2011Inference of Expressive Declassification Policies.
Jeffrey A. Vaughan, Stephen Chong
2011Memoir: Practical State Continuity for Protected Modules.
Bryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune
2011Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf
2011OpenConflict: Preventing Real Time Map Hacks in Online Games.
Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh
2011PRISM: Program Replication and Integration for Seamless MILS.
Chris A. Owen, Duncan A. Grove, Tristan Newby, Alex Murray, Chris North, Michael Pope
2011Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks.
Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose
2011Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems.
Philip W. L. Fong
2011Quantifying Location Privacy.
Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux
2011RePriv: Re-imagining Content Personalization and In-browser Privacy.
Matthew Fredrikson, Benjamin Livshits
2011SCION: Scalability, Control, and Isolation on Next-Generation Networks.
Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen
2011Silencing Hardware Backdoors.
Adam Waksman, Simha Sethumadhavan
2011The Complexity of Intransitive Noninterference.
Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke
2011The Failure of Noise-Based Non-continuous Audio Captchas.
Elie Bursztein, Romain Beauxis, Hristo S. Paskov, Daniele Perito, Celine Fabry, John C. Mitchell
2011Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach.
Vineeth Kashyap, Ben Wiedermann, Ben Hardekopf
2011TxBox: Building Secure, Efficient Sandboxes with System Transactions.
Suman Jana, Donald E. Porter, Vitaly Shmatikov
2011Using Fingerprint Authentication to Reduce System Security: An Empirical Study.
Hugh Wimberly, Lorie M. Liebrock
2011Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study.
Ralf Küsters, Tomasz Truderung, Andreas Vogt
2011Verification of Information Flow and Access Control Policies with Dependent Types.
Aleksandar Nanevski, Anindya Banerjee, Deepak Garg
2011Verified Security for Browser Extensions.
Arjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy
2011Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee