default search action
28th S&P 2007: Oakland, California, USA
- 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA. IEEE Computer Society 2007, ISBN 0-7695-2848-1
Network Security
- Xin Hu, Zhuoqing Morley Mao:
Accurate Real-time Identification of IP Prefix Hijacking. 3-17 - Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback. 18-32 - Charles C. Zhang, Marianne Winslett, Carl A. Gunter:
On the Safety and Efficiency of Firewall Policy Deployment. 33-50
Authentication
- Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer:
The Emperor's New Security Indicators. 51-65 - Philippe Golle, David A. Wagner:
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). 66-70 - José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic. 71-85 - Di Ma, Gene Tsudik:
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. 86-91 - Alexandra Boldyreva, Virendra Kumar:
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. 92-100
Privacy
- Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich:
Endorsed E-Cash. 101-115 - Xinyuan Wang, Shiping Chen, Sushil Jajodia:
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. 116-130 - Ian Goldberg:
Improving the Robustness of Private Information Retrieval. 131-148
Access Control and Audit
- Marco Pistoia, Anindya Banerjee, David A. Naumann:
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. 149-163 - Ninghui Li, Ziqing Mao, Hong Chen:
Usable Mandatory Integrity Protection for Operating Systems. 164-178 - Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. 179-186
Information Flow
- Michael Backes, Markus Dürmuth, Dominique Unruh:
Information Flow in the Peer-Reviewing Process. 187-191 - Jeffrey A. Vaughan, Steve Zdancewic:
A Cryptographic Decentralized Label Model. 192-206 - Aslan Askarov, Andrei Sabelfeld:
Gradual Release: Unifying Declassification, Encryption and Key Release Policies. 207-221 - Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger:
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. 222-230
Host Security
- Andreas Moser, Christopher Krügel, Engin Kirda:
Exploring Multiple Execution Paths for Malware Analysis. 231-245 - Arati Baliga, Pandurang Kamat, Liviu Iftode:
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. 246-251 - Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. 252-266 - Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
Minimal TCB Code Execution. 267-272 - Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh:
Using Rescue Points to Navigate Software Recovery. 273-280
Hardware and Replication
- Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine:
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems. 281-295 - Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar:
Trojan Detection using IC Fingerprinting. 296-310 - Kannan Srinathan, N. R. Prasad, C. Pandu Rangan:
On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. 311-320
Encryption
- John Bethencourt, Amit Sahai, Brent Waters:
Ciphertext-Policy Attribute-Based Encryption. 321-334 - Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. 335-349 - Elaine Shi, John Bethencourt, T.-H. Hubert Chan, Dawn Xiaodong Song, Adrian Perrig:
Multi-Dimensional Range Query over Encrypted Data. 350-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.