default search action
21st USENIX Security Symposium 2012: Bellevue, WA, USA
- Tadayoshi Kohno:
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012. USENIX Association 2012
Spam and Drugs
- Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. 1-16 - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
B@bel: Leveraging Email Delivery for Spam Mitigation. 16-32 - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang:
Impact of Spam Exposure on User Engagement. 33-48
CAPTCHAs and Password Strength
- Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. 49-64 - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. 65-80 - George Argyros, Aggelos Kiayias:
I Forgot Your Password: Randomness Attacks Against PHP Applications. 81-96
Browser Security
- Nicholas Carlini, Adrienne Porter Felt, David A. Wagner:
An Evaluation of the Google Chrome Extension Security Architecture. 97-111 - Dongseok Jang, Zachary Tatlock, Sorin Lerner:
Establishing Browser Security Guarantees through Formal Shim Verification. 113-128
The Brain
- Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. 129-141 - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song:
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. 143-158
A Chance of Clouds
- Zhenyu Wu, Zhang Xu, Haining Wang:
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. 159-173 - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu:
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. 175-188 - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz:
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. 189-204
Embedded Security
- Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. 205-220 - Amir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu:
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks. 221-236 - Roel Verdult, Flavio D. Garcia, Josep Balasch:
Gone in 360 Seconds: Hijacking with Hitag2. 237-252
Secure Computation and PIR
- Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish:
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality. 253-268 - Casey Devet, Ian Goldberg, Nadia Heninger:
Optimally Robust Private Information Retrieval. 269-283 - Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:
Billion-Gate Secure Computation with Malicious Adversaries. 285-300
Authentication and Secure Deletion
- Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos:
Progressive Authentication: Deciding When to Authenticate on Mobile Phones. 301-316 - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach:
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web. 317-331 - Joel Reardon, Srdjan Capkun, David A. Basin:
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. 333-348
Privacy Enhancing Technologies and Network Traffic Analysis
- Rob Jansen, Paul F. Syverson, Nicholas Hopper:
Throttling Tor Bandwidth Parasites. 349-363 - Kevin Borders, Jonathan Springer, Matthew Burnside:
Chimera: A Declarative Language for Streaming Network Traffic Analysis. 365-379 - Zi Lin, Nicholas Hopper:
New Attacks on Timing-based Network Flow Watermarks. 381-396
Web Security
- Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen:
On Breaking SAML: Be Whoever You Want to Be. 397-412 - Lin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson:
Clickjacking: Attacks and Defenses. 413-428 - Devdatta Akhawe, Prateek Saxena, Dawn Song:
Privilege Separation in HTML5 Applications. 429-444
Software Security I
- Christian Holler, Kim Herzig, Andreas Zeller:
Fuzzing with Code Fragments. 445-458 - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection against Return-to-User Attacks. 459-474 - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum:
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. 475-490
Botnets and Web Security
- Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon:
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. 491-506 - Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
PUBCRAWL: Protecting Users and Businesses from CRAWLers. 507-522 - Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 523-538
Mobile Devices
- Rubin Xu, Hassen Saïdi, Ross J. Anderson:
Aurasium: Practical Policy Enforcement for Android Applications. 539-552 - Shashi Shekhar, Michael Dietz, Dan S. Wallach:
AdSplit: Separating Smartphone Advertising from Applications. 553-567 - Lok-Kwong Yan, Heng Yin:
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. 569-584
Software Security II
- Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger:
STING: Finding Name Resolution Vulnerabilities in Programs. 585-599 - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan:
Tracking Rootkit Footprints with a Practical Memory Analysis System. 601-615 - Matthew Maurer, David Brumley:
Tachyon: Tandem Execution for Efficient Live Patch Testing. 617-630
Being Social
- Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos:
Privacy-Preserving Social Plugins. 631-646 - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. 647-662 - Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos:
Efficient and Scalable Socware Detection in Online Social Networks. 663-678
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.