Search dblp for Publications

export results for "toc:db/conf/sp/sp2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/ArmknechtMSSW11,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Christian Wachsmann},
  title        = {A Formalization of the Security Features of Physical Functions},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {397--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.10},
  doi          = {10.1109/SP.2011.10},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ArmknechtMSSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BecherFHHUW11,
  author       = {Michael Becher and
                  Felix C. Freiling and
                  Johannes Hoffmann and
                  Thorsten Holz and
                  Sebastian Uellenbeck and
                  Christopher Wolf},
  title        = {Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security
                  of Mobile Devices},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {96--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.29},
  doi          = {10.1109/SP.2011.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BecherFHHUW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurszteinBPPFM11,
  author       = {Elie Bursztein and
                  Romain Beauxis and
                  Hristo S. Paskov and
                  Daniele Perito and
                  Celine Fabry and
                  John C. Mitchell},
  title        = {The Failure of Noise-Based Non-continuous Audio Captchas},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {19--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.14},
  doi          = {10.1109/SP.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BurszteinBPPFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurszteinHLB11,
  author       = {Elie Bursztein and
                  Mike Hamburg and
                  Jocelyn Lagarenne and
                  Dan Boneh},
  title        = {OpenConflict: Preventing Real Time Map Hacks in Online Games},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {506--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.28},
  doi          = {10.1109/SP.2011.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BurszteinHLB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CalandrinoKNFS11,
  author       = {Joseph A. Calandrino and
                  Ann Kilzer and
                  Arvind Narayanan and
                  Edward W. Felten and
                  Vitaly Shmatikov},
  title        = {"You Might Also Like: " Privacy Risks of Collaborative Filtering},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {231--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.40},
  doi          = {10.1109/SP.2011.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CalandrinoKNFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Dolan-GavittLZGL11,
  author       = {Brendan Dolan{-}Gavitt and
                  Tim Leek and
                  Michael Zhivich and
                  Jonathon T. Giffin and
                  Wenke Lee},
  title        = {Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {297--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.11},
  doi          = {10.1109/SP.2011.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Dolan-GavittLZGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DuongR11,
  author       = {Thai Duong and
                  Juliano Rizzo},
  title        = {Cryptography in the Web: The Case of Cryptographic Design Flaws in
                  {ASP.NET}},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {481--489},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.42},
  doi          = {10.1109/SP.2011.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DuongR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EggertMSW11,
  author       = {Sebastian Eggert and
                  Ron van der Meyden and
                  Henning Schnoor and
                  Thomas Wilke},
  title        = {The Complexity of Intransitive Noninterference},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {196--211},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.30},
  doi          = {10.1109/SP.2011.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/EggertMSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Fong11,
  author       = {Philip W. L. Fong},
  title        = {Preventing Sybil Attacks by Privilege Attenuation: {A} Design Principle
                  for Social Network Systems},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {263--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.16},
  doi          = {10.1109/SP.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Fong11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FredriksonL11,
  author       = {Matthew Fredrikson and
                  Benjamin Livshits},
  title        = {RePriv: Re-imagining Content Personalization and In-browser Privacy},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {131--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.37},
  doi          = {10.1109/SP.2011.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FredriksonL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GuhaFLS11,
  author       = {Arjun Guha and
                  Matthew Fredrikson and
                  Benjamin Livshits and
                  Nikhil Swamy},
  title        = {Verified Security for Browser Extensions},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {115--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.36},
  doi          = {10.1109/SP.2011.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GuhaFLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GullaschBK11,
  author       = {David Gullasch and
                  Endre Bangerter and
                  Stephan Krenn},
  title        = {Cache Games - Bringing Access-Based Cache Attacks on {AES} to Practice},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {490--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.22},
  doi          = {10.1109/SP.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GullaschBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HenryG11,
  author       = {Ryan Henry and
                  Ian Goldberg},
  title        = {Formalizing Anonymous Blacklisting Systems},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {81--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.13},
  doi          = {10.1109/SP.2011.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HenryG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HenryG11a,
  author       = {Ryan Henry and
                  Ian Goldberg},
  title        = {Extending Nymble-like Systems},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {523--537},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.17},
  doi          = {10.1109/SP.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HenryG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JanaPS11,
  author       = {Suman Jana and
                  Donald E. Porter and
                  Vitaly Shmatikov},
  title        = {TxBox: Building Secure, Efficient Sandboxes with System Transactions},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {329--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.33},
  doi          = {10.1109/SP.2011.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/JanaPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JohnsonCCMPRS11,
  author       = {Noah M. Johnson and
                  Juan Caballero and
                  Kevin Zhijie Chen and
                  Stephen McCamant and
                  Pongsin Poosankam and
                  Daniel Reynaud and
                  Dawn Song},
  title        = {Differential Slicing: Identifying Causal Execution Differences for
                  Security Applications},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {347--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.41},
  doi          = {10.1109/SP.2011.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/JohnsonCCMPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KashyapWH11,
  author       = {Vineeth Kashyap and
                  Ben Wiedermann and
                  Ben Hardekopf},
  title        = {Timing- and Termination-Sensitive Secure Information Flow: Exploring
                  a New Approach},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {413--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.19},
  doi          = {10.1109/SP.2011.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KashyapWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersTV11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Verifiability, Privacy, and Coercion-Resistance: New Insights from
                  a Case Study},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {538--553},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.21},
  doi          = {10.1109/SP.2011.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KustersTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author       = {Kirill Levchenko and
                  Andreas Pitsillidis and
                  Neha Chachra and
                  Brandon Enright and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Chris Grier and
                  Tristan Halvorson and
                  Chris Kanich and
                  Christian Kreibich and
                  He Liu and
                  Damon McCoy and
                  Nicholas Weaver and
                  Vern Paxson and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {431--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.24},
  doi          = {10.1109/SP.2011.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NanevskiBG11,
  author       = {Aleksandar Nanevski and
                  Anindya Banerjee and
                  Deepak Garg},
  title        = {Verification of Information Flow and Access Control Policies with
                  Dependent Types},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {165--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.12},
  doi          = {10.1109/SP.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NanevskiBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OwenGNMNP11,
  author       = {Chris A. Owen and
                  Duncan A. Grove and
                  Tristan Newby and
                  Alex Murray and
                  Chris North and
                  Michael Pope},
  title        = {{PRISM:} Program Replication and Integration for Seamless {MILS}},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {281--296},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.15},
  doi          = {10.1109/SP.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OwenGNMNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ParnoLDMM11,
  author       = {Bryan Parno and
                  Jacob R. Lorch and
                  John R. Douceur and
                  James W. Mickens and
                  Jonathan M. McCune},
  title        = {Memoir: Practical State Continuity for Protected Modules},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {379--394},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.38},
  doi          = {10.1109/SP.2011.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ParnoLDMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShokriTBH11,
  author       = {Reza Shokri and
                  George Theodorakopoulos and
                  Jean{-}Yves Le Boudec and
                  Jean{-}Pierre Hubaux},
  title        = {Quantifying Location Privacy},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {247--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.18},
  doi          = {10.1109/SP.2011.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ShokriTBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SturtonHWK11,
  author       = {Cynthia Sturton and
                  Matthew Hicks and
                  David A. Wagner and
                  Samuel T. King},
  title        = {Defeating {UCI:} Building Stealthy and Malicious Hardware},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {64--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.32},
  doi          = {10.1109/SP.2011.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SturtonHWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TalyEMMN11,
  author       = {Ankur Taly and
                  {\'{U}}lfar Erlingsson and
                  John C. Mitchell and
                  Mark S. Miller and
                  Jasvir Nagra},
  title        = {Automated Analysis of Security-Critical JavaScript APIs},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {363--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.39},
  doi          = {10.1109/SP.2011.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TalyEMMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasGMPS11,
  author       = {Kurt Thomas and
                  Chris Grier and
                  Justin Ma and
                  Vern Paxson and
                  Dawn Song},
  title        = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.25},
  doi          = {10.1109/SP.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VaughanC11,
  author       = {Jeffrey A. Vaughan and
                  Stephen Chong},
  title        = {Inference of Expressive Declassification Policies},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {180--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.20},
  doi          = {10.1109/SP.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VaughanC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WaksmanS11,
  author       = {Adam Waksman and
                  Simha Sethumadhavan},
  title        = {Silencing Hardware Backdoors},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {49--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.27},
  doi          = {10.1109/SP.2011.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WaksmanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangCWQ11,
  author       = {Rui Wang and
                  Shuo Chen and
                  XiaoFeng Wang and
                  Shaz Qadeer},
  title        = {How to Shop for Free Online - Security Analysis of Cashier-as-a-Service
                  Based Web Stores},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {465--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.26},
  doi          = {10.1109/SP.2011.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangCWQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WeinbergCJJ11,
  author       = {Zachary Weinberg and
                  Eric Yawei Chen and
                  Pavithra Ramesh Jayaraman and
                  Collin Jackson},
  title        = {I Still Know What You Visited Last Summer: Leaking Browsing History
                  via User Interaction and Side Channel Attacks},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {147--161},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.23},
  doi          = {10.1109/SP.2011.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WeinbergCJJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WhiteMSM11,
  author       = {Andrew M. White and
                  Austin R. Matthews and
                  Kevin Z. Snow and
                  Fabian Monrose},
  title        = {Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt
                  on Fon-iks},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {3--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.34},
  doi          = {10.1109/SP.2011.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WhiteMSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WimberlyL11,
  author       = {Hugh Wimberly and
                  Lorie M. Liebrock},
  title        = {Using Fingerprint Authentication to Reduce System Security: An Empirical
                  Study},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {32--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.35},
  doi          = {10.1109/SP.2011.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WimberlyL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangHHCPA11,
  author       = {Xin Zhang and
                  Hsu{-}Chun Hsiao and
                  Geoffrey Hasker and
                  Haowen Chan and
                  Adrian Perrig and
                  David G. Andersen},
  title        = {{SCION:} Scalability, Control, and Isolation on Next-Generation Networks},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {212--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.45},
  doi          = {10.1109/SP.2011.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangHHCPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangJOR11,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Alina Oprea and
                  Michael K. Reiter},
  title        = {HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {313--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.31},
  doi          = {10.1109/SP.2011.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangJOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2011,
  title        = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5955408/proceeding},
  isbn         = {978-1-4577-0147-4},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics