Abstract is missing.
- Assurance and evaluation: what next?Steven B. Lipner. 1 [doi]
- An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanismShuo Chen, David Ross, Yi-Min Wang. 2-11 [doi]
- CANDID: preventing sql injection attacks using dynamic candidate evaluationsSruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan. 12-24 [doi]
- Multi-module vulnerability analysis of web-based applicationsDavide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna. 25-35 [doi]
- Do background images improve draw a secret graphical passwords?Paul Dunphy, Jeff Yan. 36-47 [doi]
- Beamauth: two-factor web authentication with a bookmarkBen Adida. 48-57 [doi]
- Dynamic pharming attacks and locked same-origin policies for web browsersChris Karlof, Umesh Shankar, J. Doug Tygar, David Wagner. 58-71 [doi]
- Blacklistable anonymous credentials: blocking misbehaving users without ttpsPatrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith. 72-81 [doi]
- How much anonymity does network latency leak?Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin. 82-91 [doi]
- Denial of service or denial of security?Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz. 92-102 [doi]
- Automated detection of persistent kernel control-flow attacksNick L. Petroni Jr., Michael W. Hicks. 103-115 [doi]
- Panorama: capturing system-wide information flow for malware detection and analysisHeng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda. 116-127 [doi]
- Stealthy malware detection through vmm-based out-of-the-box semantic view reconstructionXuxian Jiang, Xinyuan Wang, Dongyan Xu. 128-138 [doi]
- Shunting: a hardware/software architecture for flexible, high-performance network intrusion preventionJosé M. González, Vern Paxson, Nicholas Weaver. 139-149 [doi]
- Highly efficient techniques for network forensicsMiroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein. 150-160 [doi]
- Preserving privacy in gps traces via uncertainty-aware path cloakingBaik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady. 161-171 [doi]
- Robust computational secret sharing and a unified account of classical secret-sharing goalsPhillip Rogaway, Mihir Bellare. 172-184 [doi]
- Chosen-ciphertext secure proxy re-encryptionRan Canetti, Susan Hohenberger. 185-194 [doi]
- Attribute-based encryption with non-monotonic access structuresRafail Ostrovsky, Amit Sahai, Brent Waters. 195-203 [doi]
- Optimal security hardening using multi-objective optimization on attack tree models of networksRinku Dewri, Nayot Poolsappasit, Indrajit Ray, Darrell Whitley. 204-213 [doi]
- On the accuracy of decentralized virtual coordinate systems in adversarial networksDavid John Zage, Cristina Nita-Rotaru. 214-224 [doi]
- Analyzing the vulnerability of superpeer networks against attackBivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly. 225-234 [doi]
- Towards automated provisioning of secure virtualized networksSerdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter. 235-245 [doi]
- Split-ballot voting: everlasting privacy with distributed trustTal Moran, Moni Naor. 246-255 [doi]
- An independent audit framework for software dependent voting systemsSujata Garera, Aviel D. Rubin. 256-265 [doi]
- Forward-secure signatures in untrusted update environments: efficient and generic constructionsBenoît Libert, Jean-Jacques Quisquater, Moti Yung. 266-275 [doi]
- Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routingAlexandra Boldyreva, Craig Gentry, Adam O Neill, Dae Hyun Yum. 276-285 [doi]
- An information-theoretic model for adaptive side-channel attacksBoris Köpf, David A. Basin. 286-296 [doi]
- Covert channels in privacy-preserving identification systemsDaniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels. 297-306 [doi]
- Detecting covert timing channels: an entropy-based approachSteven Gianvecchio, Haining Wang. 307-316 [doi]
- Polyglot: automatic extraction of protocol message format using dynamic binary analysisJuan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song. 317-329 [doi]
- Harvesting verifiable challenges from oblivious online sourcesJ. Alex Halderman, Brent Waters. 330-341 [doi]
- Filtering spam with behavioral blacklistingAnirudh Ramachandran, Nick Feamster, Santosh Vempala. 342-351 [doi]
- ConceptDoppler: a weather tracker for internet censorshipJedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East. 352-365 [doi]
- Asirra: a CAPTCHA that exploits interest-aligned manual image categorizationJeremy Elson, John R. Douceur, Jon Howell, Jared Saul. 366-374 [doi]
- An inquiry into the nature and causes of the wealth of internet miscreantsJason Franklin, Vern Paxson. 375-388 [doi]
- Hardware-rooted trust for secure key management and transient trustJeffrey S. Dwoskin, Ruby B. Lee. 389-400 [doi]
- Robust key generation from signal envelopes in wireless networksBabak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, Bülent Yener. 401-410 [doi]
- Robust group key agreement using short broadcastsStanislaw Jarecki, Jihye Kim, Gene Tsudik. 411-420 [doi]
- Protecting browsers from dns rebinding attacksCollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh. 421-431 [doi]
- Alpaca: extensible authorization for distributed servicesChris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek. 432-444 [doi]
- Efficient policy analysis for administrative role based access controlScott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman. 445-455 [doi]
- Provably secure ciphertext policy ABELing Cheung, Calvin C. Newport. 456-465 [doi]
- Security under key-dependent inputsShai Halevi, Hugo Krawczyk. 466-475 [doi]
- Cryptanalysis of the windows random number generatorLeo Dorrendorf, Zvi Gutterman, Benny Pinkas. 476-485 [doi]
- Secure two-party k-means clusteringPaul Bunn, Rafail Ostrovsky. 486-497 [doi]
- Privacy-preserving remote diagnosticsJustin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel. 498-507 [doi]
- Automaton segmentation: a new approach to preserve privacy in xml information brokeringFengJun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu. 508-518 [doi]
- Privacy preserving error resilient dna searching through oblivious automataJuan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik. 519-528 [doi]
- Predicting vulnerable software componentsStephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller. 529-540 [doi]
- On the infeasibility of modeling polymorphic shellcodeYingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo. 541-551 [doi]
- The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)Hovav Shacham. 552-561 [doi]
- Memsherlock: an automated debugger for unknown memory corruption vulnerabilitiesEmre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu. 562-572 [doi]
- Information disclosure under realistic assumptions: privacy versus optimalityLei Zhang, Sushil Jajodia, Alexander Brodsky. 573-583 [doi]
- Pors: proofs of retrievability for large filesAri Juels, Burton S. Kaliski Jr.. 584-597 [doi]
- Provable data possession at untrusted storesGiuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song. 598-609 [doi]