


default search action
23rd USENIX Security Symposium 2014: San Diego, CA, USA
- Kevin Fu, Jaeyeon Jung:

Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. USENIX Association 2014
Privacy
- Sebastian Zimmeck, Steven M. Bellovin:

Privee: An Architecture for Automatically Analyzing Web Privacy Policies. 1-16 - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon M. Lin, David Page, Thomas Ristenpart:

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. 17-32 - Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. 33-48 - Mathias Lécuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu:

XRay: Enhancing the Web's Transparency with Differential Correlation. 49-64
Mass Pwnage
- Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:

An Internet-Wide View of Internet-Wide Scanning. 65-78 - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon P. Chung, Billy Lau, Wenke Lee:

On the Feasibility of Large-Scale Infections of iOS Devices. 79-93 - Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti:

A Large-Scale Analysis of the Security of Embedded Firmwares. 95-110 - Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. 111-125
Privacy Enhancing Technology
- Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul F. Syverson:

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. 127-142 - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg:

Effective Attacks and Provable Defenses for Website Fingerprinting. 143-157 - Eric Wustrow, Colleen Swanson, J. Alex Halderman:

TapDance: End-to-Middle Anticensorship without Flow Blocking. 159-174 - Omer Tripp, Julia Rubin:

A Bayesian Approach to Privacy Enforcement in Smartphones. 175-190
Crime and Pun.../Measure-ment
- Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan M. Spring, Márk Félegyházi, Chris Kanich:

The Long "Taile" of Typosquatting Domain Names. 191-206 - Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li

, XiaoFeng Wang:
Understanding the Dark Side of Domain Parking. 207-222 - Bimal Viswanath, Muhammad Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi

, Balachander Krishnamurthy, Alan Mislove:
Towards Detecting Anomalous User Behavior in Online Social Networks. 223-238 - Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao:

Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 239-254
Forensics
- Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:

DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. 255-269 - Hao Shi, Abdulla Alwabel, Jelena Mirkovic:

Cardinal Pill Testing of System Virtual Machines. 271-285 - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:

BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 287-301 - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley:

Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. 303-317
Attacks and Transparency
- Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson:

On the Practical Exploitability of Dual EC in TLS Implementations. 319-335 - Matthew Brocker, Stephen Checkoway:

iSeeYou: Disabling the MacBook Webcam Indicator LED. 337-352 - Yossef Oren, Angelos D. Keromytis:

From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television. 353-368 - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:

Security Analysis of a Full-Body Scanner. 369-384
ROP: Return of the %edi
- Nicholas Carlini, David A. Wagner:

ROP is Still Dangerous: Breaking Modern Defenses. 385-399 - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose:

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. 401-416 - Enes Göktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis:

Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. 417-432 - Michael Backes, Stefan Nürnberger:

Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. 433-447
Safer Sign-Ons
- David Silver, Suman Jana, Dan Boneh, Eric Yawei Chen, Collin Jackson:

Password Managers: Attacks and Defenses. 449-464 - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song:

The Emperor's New Password Manager: Security Analysis of Web-based Password Managers. 465-479 - Landon P. Cox, Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati:

SpanDex: Secure Password Tracking for Android. 481-494 - Yuchen Zhou, David Evans:

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. 495-510
Tracking Targeted Attacks against Civilians and NGOs
- William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson:

When Governments Hack Opponents: A Look at Actors and Technology. 511-525 - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg Wiseman, Phillipa Gill, Ronald J. Deibert:

Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware. 527-541 - Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:

A Look at Targeted Attacks Through the Lense of an NGO. 543-558
Passwords
- Zhigong Li, Weili Han, Wenyuan Xu:

A Large-Scale Empirical Analysis of Chinese Web Passwords. 559-574 - Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:

Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. 575-590 - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart E. Schechter:

Telepathwords: Preventing Weak Passwords by Reading Users' Minds. 591-606 - Joseph Bonneau, Stuart E. Schechter:

Towards Reliable Storage of 56-bit Secrets in Human Memory. 607-623
Web Security: The Browser Strikes Back
- Kyle Soska, Nicolas Christin:

Automatically Detecting Vulnerable Websites Before They Turn Malicious. 625-640 - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:

Hulk: Eliciting Malicious Behavior in Browser Extensions. 641-654 - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, Martin Johns:

Precise Client-side Protection against DOM-based Cross-Site Scripting. 655-670 - Nikolaos Karapanos, Srdjan Capkun:

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications. 671-686
Side Channels
- Venkatanathan Varadarajan, Thomas Ristenpart, Michael M. Swift:

Scheduler-based Defenses against Cross-VM Side-channels. 687-702 - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy:

Preventing Cryptographic Key Leakage in Cloud Virtual Machines. 703-718 - Yuval Yarom, Katrina Falkner:

FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. 719-732 - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews:

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. 733-748
After Coffee Break Crypto
- Jonathan L. Dautrich Jr., Emil Stefanov, Elaine Shi:

Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns. 749-764 - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos:

TRUESET: Faster Verifiable Set Computations. 765-780 - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. 781-796 - Benny Pinkas, Thomas Schneider, Michael Zohner:

Faster Private Set Intersection Based on OT Extension. 797-812
Program Analysis: Attack of the Codes
- Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz:

Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. 813-828 - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:

X-Force: Force-Executing Binary Programs for Security Applications. 829-844 - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley:

BYTEWEIGHT: Learning to Recognize Functions in Binary Code. 845-860 - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley:

Optimizing Seed Selection for Fuzzing. 861-875
After Lunch Break Crypto
- Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton:

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. 877-891 - Daniel Demmler, Thomas Schneider, Michael Zohner:

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. 893-908 - Matthew Fredrikson, Benjamin Livshits:

ZØ: An Optimizing Distributing Zero-Knowledge Compiler. 909-924 - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee:

SDDR: Light-Weight, Secure Mobile Encounters. 925-940
Program Analysis: A New Hope
- Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike:

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. 941-955 - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:

ret2dir: Rethinking Kernel Isolation. 957-972 - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger:

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 973-988 - Johannes Dahse, Thorsten Holz:

Static Detection of Second-Order Vulnerabilities in Web Applications. 989-1003
Mobile Apps and Smart Phones
- Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi:

ASM: A Programmable Interface for Extending Android Security. 1005-1019 - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:

Brahmastra: Driving Apps to Test the Security of Third-Party Components. 1021-1036 - Qi Alfred Chen, Zhiyun Qian, Zhuoqing Morley Mao:

Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. 1037-1052 - Yan Michalevsky, Dan Boneh, Gabi Nakibly:

Gyrophone: Recognizing Speech from Gyroscope Signals. 1053-1067

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














