default search action
16th USENIX Security Symposium 2007: Boston, MA, USA
- Niels Provos:
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007. USENIX Association 2007 - Patrick D. McDaniel:
On Attack Causality in Internet-Connected Cellular Networks. - Periklis Akritidis, Wee-Yung Chin, Vinh The Lam, Stelios Sidiroglou, Kostas G. Anagnostakis:
Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks. - Scott E. Coull, Michael P. Collins, Charles V. Wright, Fabian Monrose, Michael K. Reiter:
On Web Browsing Privacy in Anonymized NetFlows. - Igor V. Popov, Saumya K. Debray, Gregory R. Andrews:
Binary Obfuscation Using Signals. - Yousra Alkabani, Farinaz Koushanfar:
Active Hardware Metering for Intellectual Property Protection and Security. - Bernhard Kauer:
OSLO: Improving the Security of Trusted Computing. - Dan Tsafrir, Yoav Etsion, Dror G. Feitelson:
Secretly Monopolizing the CPU Without Superuser Privileges. - Thomas Moscibroda, Onur Mutlu:
Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems. - Alina Oprea, Michael K. Reiter:
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. - Weidong Cui, Jayanthkumar Kannan, Helen J. Wang:
Discoverer: Automatic Protocol Reverse Engineering from Network Traces. - David Brumley, Juan Caballero, Zhenkai Liang, James Newsome:
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. - David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker:
Spamscatter: Characterizing Internet Scam Hosting Infrastructure. - Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song:
Exploiting Network Structure for Proactive Spam Mitigation. - Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. - Saar Drimer, Steven J. Murdoch:
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. - Julie Thorpe, Paul C. van Oorschot:
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. - Xavier Boyen:
Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys. - Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson:
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? - Jessica Staddon, Philippe Golle, Bryce Zimny:
Web-Based Inference Detection. - T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno:
Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing. - Stephen Chong, K. Vikram, Andrew C. Myers:
SIF: Enforcing Confidentiality and Integrity in Web Applications. - Ari Juels, Sid Stamm, Markus Jakobsson:
Combating Click Fraud via Premium Clicks. - Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy:
SpyProxy: Execution-based Detection of Malicious Web Content.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.