default search action
32nd SP 2011: Berleley, California, USA
- 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA. IEEE Computer Society 2011, ISBN 978-1-4577-0147-4
Session 1: Security of Authentication and Protection Mechanisms
- Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose:
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks. 3-18 - Elie Bursztein, Romain Beauxis, Hristo S. Paskov, Daniele Perito, Celine Fabry, John C. Mitchell:
The Failure of Noise-Based Non-continuous Audio Captchas. 19-31 - Hugh Wimberly, Lorie M. Liebrock:
Using Fingerprint Authentication to Reduce System Security: An Empirical Study. 32-46
Session 2: Hardware Security
- Adam Waksman, Simha Sethumadhavan:
Silencing Hardware Backdoors. 49-63 - Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King:
Defeating UCI: Building Stealthy and Malicious Hardware. 64-77
Session 3: Systematization of Knowledge I
- Ryan Henry, Ian Goldberg:
Formalizing Anonymous Blacklisting Systems. 81-95 - Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf:
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. 96-111
Session 4: Browsing Security and Privacy
- Arjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy:
Verified Security for Browser Extensions. 115-130 - Matthew Fredrikson, Benjamin Livshits:
RePriv: Re-imagining Content Personalization and In-browser Privacy. 131-146 - Zachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, Collin Jackson:
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks. 147-161
Session 5: Secure Information Flow and Information Policies
- Aleksandar Nanevski, Anindya Banerjee, Deepak Garg:
Verification of Information Flow and Access Control Policies with Dependent Types. 165-179 - Jeffrey A. Vaughan, Stephen Chong:
Inference of Expressive Declassification Policies. 180-195 - Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke:
The Complexity of Intransitive Noninterference. 196-211 - Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen:
SCION: Scalability, Control, and Isolation on Next-Generation Networks. 212-227
Session 6: Privacy and Social Networks
- Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov:
"You Might Also Like: " Privacy Risks of Collaborative Filtering. 231-246 - Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux:
Quantifying Location Privacy. 247-262 - Philip W. L. Fong:
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. 263-278
Session 7: Virtualization and Trusted Computing
- Chris A. Owen, Duncan A. Grove, Tristan Newby, Alex Murray, Chris North, Michael Pope:
PRISM: Program Replication and Integration for Seamless MILS. 281-296 - Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee:
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. 297-312 - Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. 313-328 - Suman Jana, Donald E. Porter, Vitaly Shmatikov:
TxBox: Building Secure, Efficient Sandboxes with System Transactions. 329-344
Session 8: Program Security Analysis
- Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song:
Differential Slicing: Identifying Causal Execution Differences for Security Applications. 347-362 - Ankur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra:
Automated Analysis of Security-Critical JavaScript APIs. 363-378 - Bryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune:
Memoir: Practical State Continuity for Protected Modules. 379-394
Session 9: Systematization of Knowledge II
- Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, François-Xavier Standaert, Christian Wachsmann:
A Formalization of the Security Features of Physical Functions. 397-412 - Vineeth Kashyap, Ben Wiedermann, Ben Hardekopf:
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach. 413-428
Session 10: Underground Economy/Malware
- Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446 - Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song:
Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-462
Session 11: Vulnerability Analysis
- Rui Wang, Shuo Chen, XiaoFeng Wang, Shaz Qadeer:
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores. 465-480 - Thai Duong, Juliano Rizzo:
Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET. 481-489 - David Gullasch, Endre Bangerter, Stephan Krenn:
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. 490-505 - Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh:
OpenConflict: Preventing Real Time Map Hacks in Online Games. 506-520
Session 12: Anonymity and Voting
- Ryan Henry, Ian Goldberg:
Extending Nymble-like Systems. 523-537 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. 538-553
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.