IEEE Symposium on Security and Privacy A*

45 papers

YearTitle / Authors
20142014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014
2014A Study of Probabilistic Password Models.
Jerry Ma, Weining Yang, Min Luo, Ninghui Li
2014ANONIZE: A Large-Scale Anonymous Survey System.
Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat
2014All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
Yuan Tian, Ying Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson
2014An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System.
Daniel Fett, Ralf Küsters, Guido Schmitz
2014Analyzing Forged SSL Certificates in the Wild.
Lin-Shung Huang, Alex Rice, Erling Ellingsen, Collin Jackson
2014Automated Analysis of Security Protocols with Global State.
Steve Kremer, Robert Künnemann
2014Automated Verification of Group Key Agreement Protocols.
Benedikt Schmidt, Ralf Sasse, Cas Cremers, David A. Basin
2014Automating Efficient RAM-Model Secure Computation.
Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks
2014Automating Isolation and Least Privilege in Web Services.
Aaron Blankstein, Michael J. Freedman
2014Blind Seer: A Scalable Private DBMS.
Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, Steven M. Bellovin
2014Bootstrapping Privacy Compliance in Big Data Systems.
Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Y. Tsai, Jeannette M. Wing
2014Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson
2014Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity.
Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane
2014Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O.
Zongwei Zhou, Miao Yu, Virgil D. Gligor
2014Doppelgänger Finder: Taking Stylometry to the Underground.
Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy
2014Dynamic Searchable Encryption via Blind Storage.
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
2014Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking.
Ralf Küsters, Tomasz Truderung, Andreas Vogt
2014Framing Signals - A Return to Portable Shellcode.
Erik Bosman, Herbert Bos
2014From Zygote to Morula: Fortifying Weakened ASLR on Android.
Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee
2014Hacking Blind.
Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh
2014Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Collin Mulliner, William K. Robertson, Engin Kirda
2014Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections.
Zhou Li, Sumayah A. Alrwais, Xiaofeng Wang, Eihal Alowaisheq
2014KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels.
John Criswell, Nathan Dautenhahn, Vikram S. Adve
2014Modeling and Discovering Vulnerabilities with Code Property Graphs.
Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck
2014Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.
Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, Michael M. Swift
2014Out of Control: Overcoming Control-Flow Integrity.
Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis
2014Permacoin: Repurposing Bitcoin Work for Data Preservation.
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz
2014Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains.
James Mickens
2014Practical Evasion of a Learning-Based Classifier: A Case Study.
Nedim Srndic, Pavel Laskov
2014Quantifying Information Flow for Dynamic Secrets.
Piotr Mardziel, Mário S. Alvim, Michael W. Hicks, Michael R. Clarkson
2014Secure Multiparty Computations on Bitcoin.
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
2014SoK: Automated Software Diversity.
Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz
2014SoK: Introspections on Trust and the Semantic Gap.
Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion
2014SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson
2014Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim
2014Stopping a Rapid Tornado with a Puff.
José Lopes, Nuno Neves
2014The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, Xiaofeng Wang
2014Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Alfredo Pironti, Pierre-Yves Strub
2014Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, Xiaofeng Wang
2014Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov
2014When HTTPS Meets CDN: A Case of Authentication in Delegated Service.
Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Tao Wan, Jianping Wu
2014Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations.
Aseem Rastogi, Matthew A. Hammer, Michael Hicks
2014ZEBRA: Zero-Effort Bilateral Recurring Authentication.
Shrirang Mare, Andres Molina-Markham, Cory Cornelius, Ronald A. Peterson, David Kotz
2014Zerocash: Decentralized Anonymous Payments from Bitcoin.
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza