


default search action
21st USENIX Security Symposium 2012: Bellevue, WA, USA
- Tadayoshi Kohno:

Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012. USENIX Association 2012
Spam and Drugs
- Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M. Voelker, Stefan Savage, Kirill Levchenko:

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. 1-16 - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:

B@bel: Leveraging Email Delivery for Spam Mitigation. 16-32 - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang:

Impact of Spam Exposure on User Engagement. 33-48
CAPTCHAs and Password Strength
- Yi Xu, Gerardo Reynaga, Sonia Chiasson, Jan-Michael Frahm, Fabian Monrose, Paul C. van Oorschot:

Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. 49-64 - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. 65-80 - George Argyros, Aggelos Kiayias:

I Forgot Your Password: Randomness Attacks Against PHP Applications. 81-96
Browser Security
- Nicholas Carlini, Adrienne Porter Felt, David A. Wagner:

An Evaluation of the Google Chrome Extension Security Architecture. 97-111 - Dongseok Jang, Zachary Tatlock, Sorin Lerner:

Establishing Browser Security Guarantees through Formal Shim Verification. 113-128
The Brain
- Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:

Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. 129-141 - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song:

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. 143-158
A Chance of Clouds
- Zhenyu Wu, Zhang Xu, Haining Wang:

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. 159-173 - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi

, Stefan Saroiu:
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. 175-188 - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz:

STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. 189-204
Embedded Security
- Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman:

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. 205-220 - Amir Rahmati, Mastooreh Salajegheh, Daniel E. Holcomb, Jacob Sorber, Wayne P. Burleson, Kevin Fu:

TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks. 221-236 - Roel Verdult, Flavio D. Garcia, Josep Balasch:

Gone in 360 Seconds: Hijacking with Hitag2. 237-252
Secure Computation and PIR
- Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish:

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality. 253-268 - Casey Devet, Ian Goldberg, Nadia Heninger:

Optimally Robust Private Information Retrieval. 269-283 - Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:

Billion-Gate Secure Computation with Malicious Adversaries. 285-300
Authentication and Secure Deletion
- Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos:

Progressive Authentication: Deciding When to Authenticate on Mobile Phones. 301-316 - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach:

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web. 317-331 - Joel Reardon, Srdjan Capkun, David A. Basin:

Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. 333-348
Privacy Enhancing Technologies and Network Traffic Analysis
- Rob Jansen, Paul F. Syverson, Nicholas Hopper:

Throttling Tor Bandwidth Parasites. 349-363 - Kevin Borders, Jonathan Springer, Matthew Burnside:

Chimera: A Declarative Language for Streaming Network Traffic Analysis. 365-379 - Zi Lin, Nicholas Hopper:

New Attacks on Timing-based Network Flow Watermarks. 381-396
Web Security
- Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen:

On Breaking SAML: Be Whoever You Want to Be. 397-412 - Lin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson:

Clickjacking: Attacks and Defenses. 413-428 - Devdatta Akhawe, Prateek Saxena, Dawn Song:

Privilege Separation in HTML5 Applications. 429-444
Software Security I
- Christian Holler, Kim Herzig, Andreas Zeller:

Fuzzing with Code Fragments. 445-458 - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:

kGuard: Lightweight Kernel Protection against Return-to-User Attacks. 459-474 - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum:

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. 475-490
Botnets and Web Security
- Manos Antonakakis, Roberto Perdisci

, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon:
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. 491-506 - Grégoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna:

PUBCRAWL: Protecting Users and Businesses from CRAWLers. 507-522 - Adam Doupé, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:

Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. 523-538
Mobile Devices
- Rubin Xu, Hassen Saïdi, Ross J. Anderson:

Aurasium: Practical Policy Enforcement for Android Applications. 539-552 - Shashi Shekhar, Michael Dietz, Dan S. Wallach:

AdSplit: Separating Smartphone Advertising from Applications. 553-567 - Lok-Kwong Yan, Heng Yin:

DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. 569-584
Software Security II
- Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger:

STING: Finding Name Resolution Vulnerabilities in Programs. 585-599 - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan:

Tracking Rootkit Footprints with a Practical Memory Analysis System. 601-615 - Matthew Maurer, David Brumley:

Tachyon: Tandem Execution for Efficient Live Patch Testing. 617-630
Being Social
- Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos:

Privacy-Preserving Social Plugins. 631-646 - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten:

Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. 647-662 - Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos:

Efficient and Scalable Socware Detection in Online Social Networks. 663-678

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














