default search action
19th USENIX Security Symposium 2010: Washington, DC, USA
- 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings. USENIX Association 2010
Protection Mechanisms
- David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen:
Adapting Software Fault Isolation to Contemporary CPU Architectures. 1-12 - Taesoo Kim, Nickolai Zeldovich:
Making Linux Protection Mechanisms Egalitarian with UserFS. 13-28 - Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Capsicum: Practical Capabilities for UNIX. 29-46
Privacy
- Petr Marchenko, Brad Karp:
Structuring Protocol Implementations to Protect Sensitive Data. 47-62 - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens:
PrETP: Privacy-Preserving Electronic Toll Pricing. 63-78 - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh:
An Analysis of Private Browsing Modes in Modern Browsers. 79-94
Detection of Network Attacks
- Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov:
BotGrep: Finding P2P Bots with Structured Graph Analysis. 95-110 - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, Alex X. Liu:
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems. 111-126 - John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy:
Searching the Searchers with SearchAudit. 127-142
Dissecting Bugs
- Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:
Toward Automated Detection of Logic Vulnerabilities in Web Applications. 143-160 - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg:
Baaz: A System for Detecting Access Control Misconfigurations. 161-176 - Periklis Akritidis:
Cling: A Memory Allocator to Mitigate Dangling Pointers. 177-192
Cryptography
- Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. 193-206 - Yitao Duan, NetEase Youdao, John F. Canny, Justin Z. Zhan:
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. 207-222 - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas A. Dimitropoulos:
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. 223-240
Internet Security
- Phillipa Gill, Yashar Ganjali, Bernard Wong, David Lie:
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation. 241-256 - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall:
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. 257-272 - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster:
Building a Dynamic Reputation System for DNS. 273-290
Real-World Security
- Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. 291-306 - Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder:
Acoustic Side-Channel Attacks on Printers. 307-322 - Ishtiaq Rouf, Robert D. Miller, Hossen Asiful Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar:
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. 323-338
Web Security
- Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett:
VEX: Vetting Browser Extensions for Security Vulnerabilities. 339-354 - Vladan Djeric, Ashvin Goel:
Securing Script-Based Extensibility in Web Browsers. 355-370 - Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkatakrishnan:
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements. 371-388
Securing Systems
- Kasper Bonne Rasmussen, Srdjan Capkun:
Realization of RF Distance Bounding. 389-402 - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh:
The Case for Ubiquitous Transport-Level Encryption. 403-418 - Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha:
Automatic Generation of Remediation Procedures for Malware Infections. 419-434
Using Humans
- Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. 435-462 - Sam Burnett, Nick Feamster, Santosh S. Vempala:
Chipping Away at Censorship Firewalls with User-Generated Content. 463-468 - Payas Gupta, Debin Gao:
Fighting Coercion Attacks in Key Generation using Skin Conductance. 469-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.