Search dblp for Publications

export results for "toc:db/conf/sp/sp2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/BauBGM10,
  author       = {Jason Bau and
                  Elie Bursztein and
                  Divij Gupta and
                  John C. Mitchell},
  title        = {State of the Art: Automated Black-Box Web Application Vulnerability
                  Testing},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {332--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.27},
  doi          = {10.1109/SP.2010.27},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BauBGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurszteinBFMJ10,
  author       = {Elie Bursztein and
                  Steven Bethard and
                  Celine Fabry and
                  John C. Mitchell and
                  Daniel Jurafsky},
  title        = {How Good Are Humans at Solving CAPTCHAs? {A} Large Scale Evaluation},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {399--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.31},
  doi          = {10.1109/SP.2010.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BurszteinBFMJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChanP10,
  author       = {Haowen Chan and
                  Adrian Perrig},
  title        = {Round-Efficient Broadcast Authentication Protocols for Fixed Topology
                  Classes},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {257--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.22},
  doi          = {10.1109/SP.2010.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChanP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenWWZ10,
  author       = {Shuo Chen and
                  Rui Wang and
                  XiaoFeng Wang and
                  Kehuan Zhang},
  title        = {Side-Channel Leaks in Web Applications: {A} Reality Today, a Challenge
                  Tomorrow},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {191--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.20},
  doi          = {10.1109/SP.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenWWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ComparettiSKKKZ10,
  author       = {Paolo Milani Comparetti and
                  Guido Salvaneschi and
                  Engin Kirda and
                  Clemens Kolbitsch and
                  Christopher Kruegel and
                  Stefano Zanero},
  title        = {Identifying Dormant Functionality in Malware Programs},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {61--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.12},
  doi          = {10.1109/SP.2010.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ComparettiSKKKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DevrieseP10,
  author       = {Dominique Devriese and
                  Frank Piessens},
  title        = {Noninterference through Secure Multi-execution},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {109--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.15},
  doi          = {10.1109/SP.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DevrieseP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FranklinCDS10,
  author       = {Jason Franklin and
                  Sagar Chaki and
                  Anupam Datta and
                  Arvind Seshadri},
  title        = {Scalable Parametric Verification of Secure Systems: How to Verify
                  Reference Monitors without Worrying about Data Structure Size},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {365--379},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.29},
  doi          = {10.1109/SP.2010.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FranklinCDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FredriksonJCSY10,
  author       = {Matt Fredrikson and
                  Somesh Jha and
                  Mihai Christodorescu and
                  Reiner Sailer and
                  Xifeng Yan},
  title        = {Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {45--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.11},
  doi          = {10.1109/SP.2010.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FredriksonJCSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GargP10,
  author       = {Deepak Garg and
                  Frank Pfenning},
  title        = {A Proof-Carrying File System},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {349--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.28},
  doi          = {10.1109/SP.2010.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GargP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HamadouSP10,
  author       = {Sardaouna Hamadou and
                  Vladimiro Sassone and
                  Catuscia Palamidessi},
  title        = {Reconciling Belief and Vulnerability in Information Flow},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {79--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.13},
  doi          = {10.1109/SP.2010.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HamadouSP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HicksFKMS10,
  author       = {Matthew Hicks and
                  Murph Finnicum and
                  Samuel T. King and
                  Milo M. K. Martin and
                  Jonathan M. Smith},
  title        = {Overcoming an Untrusted Computing Base: Detecting and Removing Malicious
                  Hardware Automatically},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {159--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.18},
  doi          = {10.1109/SP.2010.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HicksFKMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KolbitschHKK10,
  author       = {Clemens Kolbitsch and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Engin Kirda},
  title        = {Inspector Gadget: Automated Extraction of Proprietary Gadgets from
                  Malware Binaries},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {29--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.10},
  doi          = {10.1109/SP.2010.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KolbitschHKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoscherCRPKCMKASS10,
  author       = {Karl Koscher and
                  Alexei Czeskis and
                  Franziska Roesner and
                  Shwetak N. Patel and
                  Tadayoshi Kohno and
                  Stephen Checkoway and
                  Damon McCoy and
                  Brian Kantor and
                  Danny Anderson and
                  Hovav Shacham and
                  Stefan Savage},
  title        = {Experimental Security Analysis of a Modern Automobile},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.34},
  doi          = {10.1109/SP.2010.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KoscherCRPKCMKASS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Landwehr10,
  author       = {Carl E. Landwehr},
  title        = {History of {US} Government Investments in Cybersecurity Research:
                  {A} Personal Perspective},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {14--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.41},
  doi          = {10.1109/SP.2010.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Landwehr10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LewkoSW10,
  author       = {Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Revocation Systems with Very Small Private Keys},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {273--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.23},
  doi          = {10.1109/SP.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LewkoSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuND10,
  author       = {Yao Liu and
                  Peng Ning and
                  Huaiyu Dai},
  title        = {Authenticating Primary Users' Signals in Cognitive Radio Networks
                  via Integrated Cryptographic and Wireless Link Signatures},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {286--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.24},
  doi          = {10.1109/SP.2010.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiuND10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaffeisMT10,
  author       = {Sergio Maffeis and
                  John C. Mitchell and
                  Ankur Taly},
  title        = {Object Capabilities and Isolation of Untrusted Web Applications},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {125--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.16},
  doi          = {10.1109/SP.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MaffeisMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Maughan10,
  author       = {W. Douglas Maughan},
  title        = {Crossing the "Valley of Death": Transitioning Research into Commercial
                  Products - {A} Personal Perspective},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {21--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.40},
  doi          = {10.1109/SP.2010.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Maughan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McCuneLQZDGP10,
  author       = {Jonathan M. McCune and
                  Yanlin Li and
                  Ning Qu and
                  Zongwei Zhou and
                  Anupam Datta and
                  Virgil D. Gligor and
                  Adrian Perrig},
  title        = {TrustVisor: Efficient {TCB} Reduction and Attestation},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {143--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.17},
  doi          = {10.1109/SP.2010.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/McCuneLQZDGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MeyerovichL10,
  author       = {Leo A. Meyerovich and
                  V. Benjamin Livshits},
  title        = {ConScript: Specifying and Enforcing Fine-Grained Security Policies
                  for JavaScript in the Browser},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {481--496},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.36},
  doi          = {10.1109/SP.2010.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MeyerovichL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MurdochDAB10,
  author       = {Steven J. Murdoch and
                  Saar Drimer and
                  Ross J. Anderson and
                  Mike Bond},
  title        = {Chip and {PIN} is Broken},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {433--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.33},
  doi          = {10.1109/SP.2010.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MurdochDAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NeumannBPS10,
  author       = {Peter G. Neumann and
                  Matt Bishop and
                  Sean Peisert and
                  Marv Schaefer},
  title        = {Reflections on the 30th Anniversary of the {IEEE} Symposium on Security
                  and Privacy},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {3--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.43},
  doi          = {10.1109/SP.2010.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NeumannBPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OsadchyPJM10,
  author       = {Margarita Osadchy and
                  Benny Pinkas and
                  Ayman Jarrous and
                  Boaz Moskovich},
  title        = {SCiFI - {A} System for Secure Face Identification},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {239--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.39},
  doi          = {10.1109/SP.2010.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OsadchyPJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ParnoMP10,
  author       = {Bryan Parno and
                  Jonathan M. McCune and
                  Adrian Perrig},
  title        = {Bootstrapping Trust in Commodity Computers},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {414--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.32},
  doi          = {10.1109/SP.2010.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ParnoMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QianMXY10,
  author       = {Zhiyun Qian and
                  Zhuoqing Morley Mao and
                  Yinglian Xie and
                  Fang Yu},
  title        = {Investigation of Triangular Spamming: {A} Stealthy and Efficient Spamming
                  Technique},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {207--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.42},
  doi          = {10.1109/SP.2010.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/QianMXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RochaBHWE10,
  author       = {Bruno P. S. Rocha and
                  Sruthi Bandhakavi and
                  Jerry den Hartog and
                  William H. Winsborough and
                  Sandro Etalle},
  title        = {Towards Static Flow-Based Declassification for Legacy and Untrusted
                  Programs},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {93--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.14},
  doi          = {10.1109/SP.2010.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RochaBHWE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SaxenaAHMMS10,
  author       = {Prateek Saxena and
                  Devdatta Akhawe and
                  Steve Hanna and
                  Feng Mao and
                  Stephen McCamant and
                  Dawn Song},
  title        = {A Symbolic Execution Framework for JavaScript},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {513--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.38},
  doi          = {10.1109/SP.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SaxenaAHMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchwartzAB10,
  author       = {Edward J. Schwartz and
                  Thanassis Avgerinos and
                  David Brumley},
  title        = {All You Ever Wanted to Know about Dynamic Taint Analysis and Forward
                  Symbolic Execution (but Might Have Been Afraid to Ask)},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {317--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.26},
  doi          = {10.1109/SP.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SchwartzAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SinghMWL10,
  author       = {Kapil Singh and
                  Alexander Moshchuk and
                  Helen J. Wang and
                  Wenke Lee},
  title        = {On the Incoherencies in Web Browser Access Control Policies},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {463--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.35},
  doi          = {10.1109/SP.2010.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SinghMWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SommerP10,
  author       = {Robin Sommer and
                  Vern Paxson},
  title        = {Outside the Closed World: On Using Machine Learning for Network Intrusion
                  Detection},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {305--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.25},
  doi          = {10.1109/SP.2010.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SommerP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WaksmanS10,
  author       = {Adam Waksman and
                  Simha Sethumadhavan},
  title        = {Tamper Evident Microprocessors},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {173--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.19},
  doi          = {10.1109/SP.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WaksmanS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangJ10,
  author       = {Zhi Wang and
                  Xuxian Jiang},
  title        = {HyperSafe: {A} Lightweight Approach to Provide Lifetime Hypervisor
                  Control-Flow Integrity},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {380--395},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.30},
  doi          = {10.1109/SP.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangWGZ10,
  author       = {Tielei Wang and
                  Tao Wei and
                  Guofei Gu and
                  Wei Zou},
  title        = {TaintScope: {A} Checksum-Aware Directed Fuzzing Tool for Automatic
                  Software Vulnerability Detection},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {497--512},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.37},
  doi          = {10.1109/SP.2010.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangWGZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WondracekHKK10,
  author       = {Gilbert Wondracek and
                  Thorsten Holz and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {A Practical Attack to De-anonymize Social Network Users},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {223--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.21},
  doi          = {10.1109/SP.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WondracekHKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2010,
  title        = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5504620/proceeding},
  isbn         = {978-0-7695-4035-1},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics