USENIX logo
A whole new look is coming
Check back again soon!

Conferences

Search results

    TitleConferenceSpeaker(s)
    Data Node Encrypted File System: Efficient Secure Deletion for Flash MemoryUSENIX Security '12Joel Reardon, Srdjan Capkun, David Basin
    STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the CloudUSENIX Security '12Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz
    Efficient and Scalable Socware Detection in Online Social NetworksUSENIX Security '12Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
    Optimally Robust Private Information RetrievalUSENIX Security '12Casey Devet, Ian Goldberg, Nadia Heninger
    On Breaking SAML: Be Whoever You Want to BeUSENIX Security '12Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
    Gone in 360 Seconds: Hijacking with Hitag2USENIX Security '12Roel Verdult, Flavio D. Garcia, Josep Balasch
    Whispers in the Hyper-space: High-speed Covert Channel Attacks in the CloudUSENIX Security '12Zhenyu Wu, Zhang Xu, Haining Wang
    AdSplit: Separating Smartphone Advertising from ApplicationsUSENIX Security '12Shashi Shekhar, Michael Dietz, Dan S. Wallach
    DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware AnalysisUSENIX Security '12Lok Kwong Yan, Heng Yin
    Chimera: A Declarative Language for Streaming Network Traffic AnalysisUSENIX Security '12Kevin Borders, Jonathan Springer, Matthew Burnside
    Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in MotionUSENIX Security '12Y Xu, G Reynaga, Sonia Chiasson, J.-M. Frahm, Fabian Monrose, Paul van Oorschot
    Impact of Spam Exposure on User EngagementUSENIX Security '12Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang
    kGuard: Lightweight Kernel Protection against Return-to-User AttacksUSENIX Security '12Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis
    Privacy-Preserving Social PluginsUSENIX Security '12Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos
    Progressive Authentication: Deciding When to Authenticate on Mobile PhonesUSENIX Security '12Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos
    Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebUSENIX Security '12Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach
    Privilege Separation in HTML5 ApplicationsUSENIX Security '12Devdatta Akhawe, Prateek Saxena, Dawn Song
    Throttling Tor Bandwidth ParasitesUSENIX Security '12Rob Jansen, Paul Syverson, Nicholas Hopper
    An Evaluation of the Google Chrome Extension Security ArchitectureUSENIX Security '12Nicholas Carlini, Adrienne Porter Felt, David Wagner
    Enhanced Operating System Security Through Efficient and Fine-grained Address Space RandomizationUSENIX Security '12Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum
    STING: Finding Name Resolution Vulnerabilities in ProgramsUSENIX Security '12Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
    Tracking Rootkit Footprints with a Practical Memory Analysis SystemUSENIX Security '12Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan
    Billion-Gate Secure Computation with Malicious AdversariesUSENIX Security '12Benjamin Kreuter, Abhi Shelat, Chih-hao Shen
    PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate ProgramsUSENIX Security '12Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, Kirill Levchenko
    How Does Your Password Measure Up? The Effect of Strength Meters on Password CreationUSENIX Security '12Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor

    Pages