Abstract is missing.
- The good, the bad, and the provableMartín Abadi. 1 [doi]
- Spamalytics: an empirical analysis of spam marketing conversionChris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. 3-14 [doi]
- Code injection attacks on harvard-architecture devicesAurélien Francillon, Claude Castelluccia. 15-26 [doi]
- When good instructions go bad: generalizing return-oriented programming to RISCErik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage. 27-38 [doi]
- Efficient and extensible security enforcement using dynamic data flow analysisWalter Chang, Brandon Streiff, Calvin Lin. 39-50 [doi]
- Ether: malware analysis via hardware virtualization extensionsArtem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee. 51-62 [doi]
- Extending logical attack graphs for efficient vulnerability analysisDiptikalyan Saha. 63-74 [doi]
- Robust defenses for cross-site request forgeryAdam Barth, Collin Jackson, John C. Mitchell. 75-88 [doi]
- SOMA: mutual approval for included content in web pagesTerri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji. 89-98 [doi]
- OMash: enabling secure web mashups via object abstractionsSteven Crites, Francis Hsu, Hao Chen. 99-108 [doi]
- Computational soundness of observational equivalenceHubert Comon-Lundh, Véronique Cortier. 109-118 [doi]
- Unbounded verification, falsification, and characterization of security protocols by pattern refinementCas J. F. Cremers. 119-128 [doi]
- Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approachRalf Küsters, Tomasz Truderung. 129-138 [doi]
- Building castles out of mud: practical access pattern privacy and correctness on untrusted storagePeter Williams, Radu Sion, Bogdan Carbunar. 139-148 [doi]
- Location privacy of distance bounding protocolsKasper Bonne Rasmussen, Srdjan Capkun. 149-160 [doi]
- Verifiable functional purity in javaMatthew Finifter, Adrian Mettler, Naveen Sastry, David Wagner. 161-174 [doi]
- Trust management for secure information flowsMudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi. 175-188 [doi]
- Mitigating DNS DoS attacksHitesh Ballani, Paul Francis. 189-198 [doi]
- Revocation games in ephemeral networksMaxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux. 199-210 [doi]
- Increased DNS forgery resistance through 0x20-bit encoding: security via leet queriesDavid Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee. 211-222 [doi]
- Enforcing authorization policies using transactional memory introspectionArnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode. 223-234 [doi]
- Towards practical biometric key generation with randomized biometric templatesLucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter. 235-244 [doi]
- Towards automatic reverse engineering of software security configurationsRui Wang, Xiaofeng Wang, Kehuan Zhang, Zhuowei Li. 245-256 [doi]
- FairplayMP: a system for secure multi-party computationAssaf Ben-David, Noam Nisan, Benny Pinkas. 257-266 [doi]
- Information leaks in structured peer-to-peer anonymous communication systemsPrateek Mittal, Nikita Borisov. 267-278 [doi]
- Privacy oracle: a system for finding application leaks with black box differential testingJaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno. 279-288 [doi]
- A formal framework for reflective database access control policiesLars E. Olson, Carl A. Gunter, P. Madhusudan. 289-298 [doi]
- A class of probabilistic models for role engineeringMario Frank, David A. Basin, Joachim M. Buhmann. 299-310 [doi]
- Assessing query privileges via safe and efficient permission compositionSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 311-322 [doi]
- Dependent link padding algorithms for low latency anonymity systemsWei Wang 0002, Mehul Motani, Vikram Srinivasan. 323-332 [doi]
- PEREA: towards practical TTP-free revocation in anonymous authenticationPatrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith. 333-344 [doi]
- Efficient attributes for anonymous credentialsJan Camenisch, Thomas Groß. 345-356 [doi]
- Type-checking zero-knowledgeMichael Backes, Catalin Hritcu, Matteo Maffei. 357-370 [doi]
- Towards automated proofs for asymmetric encryption schemes in the random oracle modelJudicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech. 371-380 [doi]
- EON: modeling and analyzing dynamic access control systems with logic programsAvik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani, Ganesan Ramalingam, Lakshmisubrahmanyam Velaga. 381-390 [doi]
- Tupni: automatic reverse engineering of input formatsWeidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irun-Briz. 391-402 [doi]
- Rootkit-resistant disksKevin R. B. Butler, Stephen McLaughlin, Patrick Drew McDaniel. 403-416 [doi]
- Identity-based encryption with efficient revocationAlexandra Boldyreva, Vipul Goyal, Virendra Kumar. 417-426 [doi]
- Black-box accountable authority identity-based encryptionVipul Goyal, Steve Lu, Amit Sahai, Brent Waters. 427-436 [doi]
- Authenticated hash tablesCharalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. 437-448 [doi]
- Multisignatures secure under the discrete logarithm assumption and a generalized forking lemmaAli Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki. 449-458 [doi]
- Cryptographically verified implementations for TLSKarthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu. 459-468 [doi]
- Reconsidering physical key secrecy: teleduplication via optical decodingBenjamin Laxton, Kai Wang, Stefan Savage. 469-478 [doi]
- RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communicationsAlexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno. 479-490 [doi]
- Constructions of truly practical secure protocols using standardsmartcardsCarmit Hazay, Yehuda Lindell. 491-500 [doi]
- Traitor tracing with constant size ciphertextDan Boneh, Moni Naor. 501-510 [doi]
- Multi-use unidirectional proxy re-signaturesBenoît Libert, Damien Vergnaud. 511-520 [doi]
- Efficient security primitives derived from a secure aggregation algorithmHaowen Chan, Adrian Perrig. 521-534 [doi]
- Machine learning attacks against the Asirra CAPTCHAPhilippe Golle. 535-542 [doi]
- A low-cost attack on a Microsoft captchaJeff Yan, Ahmad Salah El Ahmad. 543-554 [doi]
- BootJacker: compromising computers using forced restartsEllick Chan, Jeffrey C. Carlyle, Francis M. David, Reza Farivar, Roy H. Campbell. 555-564 [doi]
- A look in the mirror: attacks on package managersJustin Cappos, Justin Samuel, Scott M. Baker, John H. Hartman. 565-574 [doi]