USENIX Security Symposium A*

36 papers

YearTitle / Authors
201120th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings
2011A Study of Android Application Security.
William Enck, Damien Octeau, Patrick D. McDaniel, Swarat Chaudhuri
2011ADsafety: Type-Based Verification of JavaScript Sandboxing.
Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi
2011BOTMAGNIFIER: Locating Spambots on the Internet.
Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna
2011Bubble Trouble: Off-Line De-Anonymization of Bubble Forms.
Joseph A. Calandrino, William Clarkson, Edward W. Felten
2011Cloaking Malware with the Trusted Platform Module.
Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel
2011Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno
2011Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar R. Weippl
2011Detecting Malware Domains at the Upper DNS Hierarchy.
Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, David Dagon
2011Differential Privacy Under Fire.
Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan
2011Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.
Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker
2011Fast and Precise Sanitizer Analysis with BEK.
Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes
2011Faster Secure Two-Party Computation Using Garbled Circuits.
Yan Huang, David Evans, Jonathan Katz, Lior Malka
2011Forensic Triage for Mobile Phones with DEC0DE.
Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine
2011JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
Grégoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz
2011MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song
2011Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson
2011Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Nektarios Leontiadis, Tyler Moore, Nicolas Christin
2011Outsourcing the Decryption of ABE Ciphertexts.
Matthew Green, Susan Hohenberger, Brent Waters
2011PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg
2011Permission Re-Delegation: Attacks and Defenses.
Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin
2011Q: Exploit Hardening Made Easy.
Edward J. Schwartz, Thanassis Avgerinos, David Brumley
2011QUIRE: Lightweight Provenance for Smart Phone Operating Systems.
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach
2011SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos
2011SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.
Collin Mulliner, Nico Golde, Jean-Pierre Seifert
2011Secure In-Band Wireless Pairing.
Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi
2011Show Me the Money: Characterizing Spam-advertised Revenue.
Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage
2011Static Detection of Access Control Vulnerabilities in Web Applications.
Fangqi Sun, Liang Xu, Zhendong Su
2011TRESOR Runs Encryption Securely Outside RAM.
Tilo Müller, Felix C. Freiling, Andreas Dewald
2011Telex: Anticensorship in the Network Infrastructure.
Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
2011The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham
2011Toward Secure Embedded Web Interfaces.
Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein
2011Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze
2011ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Charlie Curtsinger, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert
2011deSEO: Combating Search-Result Poisoning.
John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi
2011mCarve: Carving Attributed Dump Sets.
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic