USENIX Security Symposium A*

44 papers

YearTitle / Authors
2012AdSplit: Separating Smartphone Advertising from Applications.
Shashi Shekhar, Michael Dietz, Dan S. Wallach
2012An Evaluation of the Google Chrome Extension Security Architecture.
Nicholas Carlini, Adrienne Porter Felt, David A. Wagner
2012Aurasium: Practical Policy Enforcement for Android Applications.
Rubin Xu, Hassen Saïdi, Ross J. Anderson
2012B@bel: Leveraging Email Delivery for Spam Mitigation.
Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
2012Billion-Gate Secure Computation with Malicious Adversaries.
Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen
2012Chimera: A Declarative Language for Streaming Network Traffic Analysis.
Kevin Borders, Jonathan Springer, Matthew Burnside
2012Clickjacking: Attacks and Defenses.
Lin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson
2012Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory.
Joel Reardon, Srdjan Capkun, David A. Basin
2012DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.
Lok-Kwong Yan, Heng Yin
2012Efficient and Scalable Socware Detection in Online Social Networks.
Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
2012Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner.
Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna
2012Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization.
Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum
2012Establishing Browser Security Guarantees through Formal Shim Verification.
Dongseok Jang, Zachary Tatlock, Sorin Lerner
2012From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon
2012Fuzzing with Code Fragments.
Christian Holler, Kim Herzig, Andreas Zeller
2012Gone in 360 Seconds: Hijacking with Hitag2.
Roel Verdult, Flavio D. Garcia, Josep Balasch
2012How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
2012I Forgot Your Password: Randomness Attacks Against PHP Applications.
George Argyros, Aggelos Kiayias
2012Impact of Spam Exposure on User Engagement.
Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang
2012Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices.
Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman
2012Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks.
Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln
2012New Attacks on Timing-based Network Flow Watermarks.
Zi Lin, Nicholas Hopper
2012On Breaking SAML: Be Whoever You Want to Be.
Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
2012On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song
2012Optimally Robust Private Information Retrieval.
Casey Devet, Ian Goldberg, Nadia Heninger
2012Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach
2012PUBCRAWL: Protecting Users and Businesses from CRAWLers.
Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna
2012PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko
2012Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu
2012Privacy-Preserving Social Plugins.
Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos
2012Privilege Separation in HTML5 Applications.
Devdatta Akhawe, Prateek Saxena, Dawn Song
2012Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012
Tadayoshi Kohno
2012Progressive Authentication: Deciding When to Authenticate on Mobile Phones.
Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
2012STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud.
Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz
2012STING: Finding Name Resolution Vulnerabilities in Programs.
Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
2012Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot
2012Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.
Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten
2012TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks.
Amir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu
2012Tachyon: Tandem Execution for Efficient Live Patch Testing.
Matthew Maurer, David Brumley
2012Taking Proof-Based Verified Computation a Few Steps Closer to Practicality.
Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish
2012Throttling Tor Bandwidth Parasites.
Rob Jansen, Paul F. Syverson, Nicholas Hopper
2012Tracking Rootkit Footprints with a Practical Memory Analysis System.
Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan
2012Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud.
Zhenyu Wu, Zhang Xu, Haining Wang
2012kGuard: Lightweight Kernel Protection against Return-to-User Attacks.
Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis