USENIX Security Symposium A*

46 papers

YearTitle / Authors
2013Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness.
Devdatta Akhawe, Adrienne Porter Felt
2013An Empirical Study of Vulnerability Rewards Programs.
Matthew Finifter, Devdatta Akhawe, David A. Wagner
2013Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.
Benjamin Livshits, Jaeyeon Jung
2013CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
2013Control Flow Integrity for COTS Binaries.
Mingwei Zhang, R. Sekar
2013Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer.
Roel Verdult, Flavio D. Garcia, Baris Ege
2013Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos
2013DupLESS: Server-Aided Encryption for Deduplicated Storage.
Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart
2013Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon
2013Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek
2013Eradicating DNS Rebinding with the Extended Same-origin Policy.
Martin Johns, Sebastian Lekies, Ben Stock
2013ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Terry Nelms, Roberto Perdisci, Mustaque Ahamad
2013Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich
2013FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha
2013Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi
2013Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space.
Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang
2013Impression Fraud in On-line Advertising via Pay-Per-View Networks.
Kevin Springborn, Paul Barford
2013Jekyll on iOS: When Benign Apps Become Evil.
Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee
2013KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
Hojoon Lee, Hyungon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang
2013Language-based Defenses Against Untrusted Browser Origins.
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis
2013Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks.
Nico Golde, Kevin Redon, Jean-Pierre Seifert
2013Measuring the Practical Impact of DNSSEC Deployment.
Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage
2013MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
Ruowen Wang, Peng Ning, Tao Xie, Quan Chen
2013Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.
David Brumley, Jonghyup Lee, Edward J. Schwartz, Maverick Woo
2013On the Security of Picture Gesture Authentication.
Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu
2013On the Security of RC4 in TLS.
Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
2013PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation.
Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler
2013Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver
2013Proactively Accountable Anonymous Messaging in Verdict.
Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford
2013Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013
Samuel T. King
2013Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna
2013Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens
2013Secure Outsourced Garbled Circuit Evaluation for Mobile Devices.
Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
2013Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation.
Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara
2013Securing Embedded User Interfaces: Android and Beyond.
Franziska Roesner, Tadayoshi Kohno
2013Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
2013Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors.
Bin Zeng, Gang Tan, Úlfar Erlingsson
2013Take This Personally: Pollution Attacks on Personalized Services.
Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee
2013The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
2013Towards Automatic Software Lineage Inference.
Jiyong Jang, Maverick Woo, David Brumley
2013Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson
2013Transparent ROP Exploit Mitigation Using Indirect Branch Tracing.
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
2013WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie
2013You Are How You Click: Clickstream Analysis for Sybil Detection.
Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao
2013ZMap: Fast Internet-wide Scanning and Its Security Applications.
Zakir Durumeric, Eric Wustrow, J. Alex Halderman
2013ZQL: A Compiler for Privacy-Preserving Data Processing.
Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo