IEEE Symposium on Security and Privacy A*

39 papers

YearTitle / Authors
20132013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013
2013A Hybrid Architecture for Interactive Verifiable Computation.
Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish
2013A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
Suman Jana, Arvind Narayanan, Vitaly Shmatikov
2013All Your IFCException Are Belong to Us.
Catalin Hritcu, Michael Greenberg, Ben Karel, Benjamin C. Pierce, Greg Morrisett
2013Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai
2013An Ideal-Security Protocol for Order-Preserving Encoding.
Raluca A. Popa, Frank H. Li, Nickolai Zeldovich
2013Anon-Pass: Practical Anonymous Subscriptions.
Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, Jonathan Katz
2013Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan
2013Circuit Structures for Improving Efficiency of Security and Privacy Tools.
Samee Zahur, David Evans
2013Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna
2013Declarative, Temporal, and Practical Programming with Capabilities.
William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson, Robert N. M. Watson
2013Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta
2013Efficient Garbling from a Fixed-Key Blockcipher.
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
2013Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, Xiaofeng Wang
2013Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu
2013Hiding Information in Flash Memory.
YingLei Wang, Wing-Kei S. Yu, Sarah Q. Xu, Edwin Kan, G. Edward Suh
2013Implementing TLS with Verified Cryptographic Security.
Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub
2013Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi
2013Lucky Thirteen: Breaking the TLS and DTLS Record Protocols.
Nadhem J. AlFardan, Kenneth G. Paterson
2013ObliviStore: High Performance Oblivious Cloud Storage.
Emil Stefanov, Elaine Shi
2013On Limitations of Friendly Jamming for Confidentiality.
Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun
2013PUFs in Security Protocols: Attack Models and Security Evaluations.
Ulrich Rührmair, Marten van Dijk
2013Pinocchio: Nearly Practical Verifiable Computation.
Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova
2013Practical Control Flow Integrity and Randomization for Binary Executables.
Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou
2013Practical Timing Side Channel Attacks against Kernel Space ASLR.
Ralf Hund, Carsten Willems, Thorsten Holz
2013PrivExec: Private Execution as an Operating System Service.
Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda
2013Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft
2013SoK: Eternal War in Memory.
Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song
2013SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos
2013SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
Jeremy Clark, Paul C. van Oorschot
2013SoK: Secure Data Deletion.
Joel Reardon, David A. Basin, Srdjan Capkun
2013SoK: The Evolution of Sybil Defense via Social Networks.
Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi
2013The Crossfire Attack.
Min Suk Kang, Soo Bum Lee, Virgil D. Gligor
2013The Parrot Is Dead: Observing Unobservable Network Communications.
Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
2013Towards Practical Reactive Security Audit Using Extended Static Checkers.
Julien Vanegue, Shuvendu K. Lahiri
2013Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2013Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.
Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson
2013Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin
2013seL4: From General Purpose to a Proof of Information Flow Enforcement.
Toby C. Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein