USENIX Security Symposium A*

24 papers

YearTitle / Authors
2007Active Hardware Metering for Intellectual Property Protection and Security.
Yousra Alkabani, Farinaz Koushanfar
2007Binary Obfuscation Using Signals.
Igor V. Popov, Saumya K. Debray, Gregory R. Andrews
2007BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee
2007Combating Click Fraud via Premium Clicks.
Ari Juels, Sid Stamm, Markus Jakobsson
2007Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing.
T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno
2007Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
Weidong Cui, Jayanthkumar Kannan, Helen J. Wang
2007Exploiting Network Structure for Proactive Spam Mitigation.
Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song
2007Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys.
Xavier Boyen
2007Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.
Julie Thorpe, Paul C. van Oorschot
2007Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
Alina Oprea, Michael K. Reiter
2007Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.
Saar Drimer, Steven J. Murdoch
2007Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson
2007Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems.
Thomas Moscibroda, Onur Mutlu
2007OSLO: Improving the Security of Trusted Computing.
Bernhard Kauer
2007On Attack Causality in Internet-Connected Cellular Networks.
Patrick D. McDaniel
2007On Web Browsing Privacy in Anonymized NetFlows.
Scott E. Coull, Michael P. Collins, Charles V. Wright, Fabian Monrose, Michael K. Reiter
2007Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007
Niels Provos
2007Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks.
Periklis Akritidis, Wee-Yung Chin, Vinh The Lam, Stelios Sidiroglou, Kostas G. Anagnostakis
2007SIF: Enforcing Confidentiality and Integrity in Web Applications.
Stephen Chong, K. Vikram, Andrew C. Myers
2007Secretly Monopolizing the CPU Without Superuser Privileges.
Dan Tsafrir, Yoav Etsion, Dror G. Feitelson
2007Spamscatter: Characterizing Internet Scam Hosting Infrastructure.
David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker
2007SpyProxy: Execution-based Detection of Malicious Web Content.
Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
2007Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
David Brumley, Juan Caballero, Zhenkai Liang, James Newsome
2007Web-Based Inference Detection.
Jessica Staddon, Philippe Golle, Bryce Zimny