IEEE Symposium on Security and Privacy A*

41 papers

YearTitle / Authors
2012A Framework to Eliminate Backdoors from Response-Computable Authentication.
Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou
2012Abusing File Processing in Malware Detectors for Fun and Profit.
Suman Jana, Vitaly Shmatikov
2012Building Verifiable Trusted Path on Commodity x86 Computers.
Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune
2012Clash Attacks on the Verifiability of E-Voting Systems.
Ralf Küsters, Tomasz Truderung, Andreas Vogt
2012Detecting Hoaxes, Frauds, and Deception in Writing Style Online.
Sadia Afroz, Michael Brennan, Rachel Greenstadt
2012Dissecting Android Malware: Characterization and Evolution.
Yajin Zhou, Xuxian Jiang
2012Distance Hijacking Attacks on Distance Bounding Protocols.
Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun
2012Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards.
Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
2012EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna
2012Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints.
YingLei Wang, Wing-Kei S. Yu, Shuo Wu, Greg Malysa, G. Edward Suh, Edwin Kan
2012Formalizing and Enforcing Purpose Restrictions in Privacy Policies.
Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing
2012Foundations of Logic-Based Trust Management.
Moritz Y. Becker, Alessandra Russo, Nik Sultana
2012Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López
2012Hummingbird: Privacy at the Time of Twitter.
Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
2012IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA
2012ILR: Where'd My Gadgets Go?
Jason Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson
2012LAP: Lightweight Anonymity and Privacy.
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng
2012LASTor: A Low-Latency AS-Aware Tor Client.
Masoud Akhoondi, Curtis Yu, Harsha V. Madhyastha
2012Memento: Learning Secrets from Process Footprints.
Suman Jana, Vitaly Shmatikov
2012New Results for Timing-Based Attestation.
Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth
2012OB-PWS: Obfuscation-Based Private Web Search.
Ero Balsa, Carmela Troncoso, Claudia Díaz
2012ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina
2012Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Zhiyun Qian, Zhuoqing Morley Mao
2012On the Feasibility of Internet-Scale Author Identification.
Arvind Narayanan, Hristo S. Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song
2012Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
2012Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen
2012Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution.
Yan Huang, Jonathan Katz, David Evans
2012ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
Jiyong Jang, Abeer Agrawal, David Brumley
2012Rozzle: De-cloaking Internet Malware.
Clemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert
2012Safe Loading - A Foundation for Secure Execution of Untrusted Programs.
Mathias Payer, Tobias Hartmann, Thomas R. Gross
2012Secure and Scalable Fault Localization under Dynamic Traffic Patterns.
Xin Zhang, Chang Lan, Adrian Perrig
2012Sharing Mobile Code Securely with Information Flow Control.
Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers
2012Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
Rui Wang, Shuo Chen, Xiaofeng Wang
2012Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
2012Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
Yangchun Fu, Zhiqiang Lin
2012The Psychology of Security for the Home Computer User.
Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta S. Byrne
2012The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano
2012The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.
Joseph Bonneau
2012Third-Party Web Tracking: Policy and Technology.
Jonathan R. Mayer, John C. Mitchell
2012Unleashing Mayhem on Binary Code.
Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley
2012User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan