USENIX Security Symposium A*

31 papers

YearTitle / Authors
201019th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings
2010Acoustic Side-Channel Attacks on Printers.
Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder
2010AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkatakrishnan
2010Adapting Software Fault Isolation to Contemporary CPU Architectures.
David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen
2010An Analysis of Private Browsing Modes in Modern Browsers.
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh
2010Automatic Generation of Remediation Procedures for Malware Infections.
Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha
2010Baaz: A System for Detecting Access Control Misconfigurations.
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
2010BotGrep: Finding P2P Bots with Structured Graph Analysis.
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov
2010Building a Dynamic Reputation System for DNS.
Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster
2010Capsicum: Practical Capabilities for UNIX.
Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway
2010Chipping Away at Censorship Firewalls with User-Generated Content.
Sam Burnett, Nick Feamster, Santosh S. Vempala
2010Cling: A Memory Allocator to Mitigate Dangling Pointers.
Periklis Akritidis
2010Dude, Where's That IP? Circumventing Measurement-based IP Geolocation.
Phillipa Gill, Yashar Ganjali, Bernard Wong, David Lie
2010Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems.
Chad R. Meiners, Jignesh M. Patel, Eric Norige, Eric Torng, Alex X. Liu
2010Fighting Coercion Attacks in Key Generation using Skin Conductance.
Payas Gupta, Debin Gao
2010Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall
2010Making Linux Protection Mechanisms Egalitarian with UserFS.
Taesoo Kim, Nickolai Zeldovich
2010P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.
Yitao Duan, NetEase Youdao, John F. Canny, Justin Z. Zhan
2010PrETP: Privacy-Preserving Electronic Toll Pricing.
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens
2010Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage
2010Realization of RF Distance Bounding.
Kasper Bonne Rasmussen, Srdjan Capkun
2010SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics.
Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas A. Dimitropoulos
2010Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora
2010Searching the Searchers with SearchAudit.
John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy
2010Securing Script-Based Extensibility in Web Browsers.
Vladan Djeric, Ashvin Goel
2010Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Ishtiaq Rouf, Robert D. Miller, Hossen Asiful Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar
2010Structuring Protocol Implementations to Protect Sensitive Data.
Petr Marchenko, Brad Karp
2010The Case for Ubiquitous Transport-Level Encryption.
Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh
2010Toward Automated Detection of Logic Vulnerabilities in Web Applications.
Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
2010VEX: Vetting Browser Extensions for Security Vulnerabilities.
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett
2010ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya