


default search action
22nd USENIX Security Symposium 2013: Washington, DC, USA
- Samuel T. King:

Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. USENIX Association 2013, ISBN 978-1-931971-03-4
Network Security
- Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang:

Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space. 1-16 - Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:

Practical Comprehensive Bounds on Surreptitious Communication over DNS. 17-32 - Nico Golde, Kevin Redon, Jean-Pierre Seifert:

Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks. 33-48
Potpourri
- István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos:

Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. 49-64 - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen:

MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. 65-80 - Jiyong Jang, Maverick Woo, David Brumley:

Towards Automatic Software Lineage Inference. 81-96
Mobile Security I
- Franziska Roesner, Tadayoshi Kohno:

Securing Embedded User Interfaces: Android and Beyond. 97-112 - Benjamin Livshits, Jaeyeon Jung:

Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications. 113-130 - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi:

Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. 131-146
Applied Crypto I
- Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford:

Proactively Accountable Anonymous Messaging in Verdict. 147-162 - Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo:

ZQL: A Compiler for Privacy-Preserving Data Processing. 163-178 - Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart:

DupLESS: Server-Aided Encryption for Deduplicated Storage. 179-194
Large-Scale Systems Security I
- Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:

Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 195-210 - Kevin Springborn, Paul Barford:

Impression Fraud in On-line Advertising via Pay-Per-View Networks. 211-226 - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. 227-240
Large-Scale Systems Security II
- Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao:

You Are How You Click: Clickstream Analysis for Sybil Detection. 241-256 - Devdatta Akhawe, Adrienne Porter Felt:

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. 257-272 - Matthew Finifter, Devdatta Akhawe, David A. Wagner:

An Empirical Study of Vulnerability Rewards Programs. 273-288
Applied Crypto II
- Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. 289-304 - Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:

On the Security of RC4 in TLS. 305-320 - Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler:

PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. 321-336
Protecting and Understanding Binaries
- Mingwei Zhang, R. Sekar:

Control Flow Integrity for COTS Binaries. 337-352 - David Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo:

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. 353-368 - Bin Zeng, Gang Tan, Úlfar Erlingsson:

Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors. 369-382
Current and Future Systems Security
- Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:

On the Security of Picture Gesture Authentication. 383-398 - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich:

Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. 399-314 - Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek

:
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. 415-430
Hardware and Embedded Security I
- Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke:

CacheAudit: A Tool for the Static Analysis of Cache Side Channels. 431-446 - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. 447-462 - Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha:

FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. 463-478
Hardware and Embedded Security II
- Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens:

Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. 479-494 - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara:

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. 495-510 - Hojoon Lee, Hyungon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang:

KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. 511-526
Mobile Security II
- Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie:

WHYPER: Towards Automating Risk Assessment of Mobile Applications. 527-542 - Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon:

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. 543-558 - Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee:

Jekyll on iOS: When Benign Apps Become Evil. 559-572
Large-Scale Systems Security III
- Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:

Measuring the Practical Impact of DNSSEC Deployment. 573-588 - Terry Nelms, Roberto Perdisci

, Mustaque Ahamad:
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. 589-604 - Zakir Durumeric, Eric Wustrow, J. Alex Halderman:

ZMap: Fast Internet-wide Scanning and Its Security Applications. 605-620
Web Security
- Martin Johns, Sebastian Lekies, Ben Stock:

Eradicating DNS Rebinding with the Extended Same-origin Policy. 621-636 - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna:

Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. 637-652 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis:

Language-based Defenses Against Untrusted Browser Origins. 653-670
Attacks
- Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:

Take This Personally: Pollution Attacks on Personalized Services. 671-686 - Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:

Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. 687-702
Work-in-Progress Reports (WiP)/Rump Sesson, Plus Special Paper Presentation
- Roel Verdult, Flavio D. Garcia, Baris Ege:

Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. 703-718

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














