


default search action
34th SP 2013: Berkeley, California, USA
- 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6166-8

- Catalin Hritcu, Michael Greenberg

, Ben Karel, Benjamin C. Pierce, Greg Morrisett:
All Your IFCException Are Belong to Us. 3-17 - William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson

, Robert N. M. Watson:
Declarative, Temporal, and Practical Programming with Capabilities. 18-32 - Julien Vanegue, Shuvendu K. Lahiri:

Towards Practical Reactive Security Audit Using Extended Static Checkers. 33-47 - Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song:

SoK: Eternal War in Memory. 48-62 - Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov:

The Parrot Is Dead: Observing Unobservable Network Communications. 65-79 - Alex Biryukov

, Ivan Pustogarov, Ralf-Philipp Weinmann:
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. 80-94 - Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann

, Christian J. Dietrich, Herbert Bos
:
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. 97-111 - Zhou Li

, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. 112-126 - Min Suk Kang, Soo Bum Lee, Virgil D. Gligor:

The Crossfire Attack. 127-141 - Denis Foo Kune

, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim
, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. 145-159 - Nils Ole Tippenhauer

, Luka Malisa, Aanjhan Ranganathan
, Srdjan Capkun:
On Limitations of Friendly Jamming for Confidentiality. 160-173 - Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai:

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. 174-188 - Ralf Hund, Carsten Willems, Thorsten Holz

:
Practical Timing Side Channel Attacks against Kernel Space ASLR. 191-205 - Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:

PrivExec: Private Execution as an Operating System Service. 206-220 - Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish:

A Hybrid Architecture for Interactive Verifiable Computation. 223-237 - Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:

Pinocchio: Nearly Practical Verifiable Computation. 238-252 - Emil Stefanov, Elaine Shi:

ObliviStore: High Performance Oblivious Cloud Storage. 253-267 - Yinglei Wang, Wing-Kei S. Yu, Sarah Q. Xu, Edwin Kan, G. Edward Suh

:
Hiding Information in Flash Memory. 271-285 - Ulrich Rührmair, Marten van Dijk

:
PUFs in Security Protocols: Attack Models and Security Evaluations. 286-300 - Joel Reardon, David A. Basin, Srdjan Capkun:

SoK: Secure Data Deletion. 301-315 - Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel

, Jonathan Katz:
Anon-Pass: Practical Anonymous Subscriptions. 319-333 - Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis

, Marc Joye, Dan Boneh, Nina Taft
:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. 334-348 - Suman Jana, Arvind Narayanan, Vitaly Shmatikov:

A Scanner Darkly: Protecting User Privacy from Perceptual Applications. 349-363 - Gurchetan S. Grewal, Mark Dermot Ryan

, Sergiu Bursuc, Peter Y. A. Ryan
:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. 367-381 - Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi:

SoK: The Evolution of Sybil Defense via Social Networks. 382-396 - Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin:

Zerocoin: Anonymous Distributed E-Cash from Bitcoin. 397-411 - Toby C. Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao

, Gerwin Klein
:
seL4: From General Purpose to a Proof of Information Flow Enforcement. 415-429 - Amit Vasudevan, Sagar Chaki, Limin Jia

, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. 430-444 - Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss

, Alfredo Pironti, Pierre-Yves Strub:
Implementing TLS with Verified Cryptographic Security. 445-459 - Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:

An Ideal-Security Protocol for Order-Preserving Encoding. 463-477 - Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway:

Efficient Garbling from a Fixed-Key Blockcipher. 478-492 - Samee Zahur, David Evans

:
Circuit Structures for Improving Efficiency of Security and Privacy Tools. 493-507 - Jeremy Clark, Paul C. van Oorschot

:
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. 511-525 - Nadhem J. AlFardan, Kenneth G. Paterson:

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. 526-540 - Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. 541-555 - Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou:

Practical Control Flow Integrity and Randomization for Binary Executables. 559-573 - Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi:

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. 574-588 - Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson

:
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices. 589-603

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














