Abstract is missing.
- Binary Code Extraction and Interface Identification for Security ApplicationsJuan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song. [doi]
- InvisiType: Object-Oriented Security PoliciesJiwon Seo, Monica S. Lam. [doi]
- Server-side Verification of Client Behavior in Online GamesDarrell Bethea, Robert Cochran, Michael K. Reiter. [doi]
- Efficient Detection of Split Personalities in MalwareDavide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna. [doi]
- Stealth DoS Attacks on Secure ChannelsAmir Herzberg, Haya Shulman. [doi]
- When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed CryptographyThomas Ristenpart, Scott Yilek. [doi]
- Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTsScott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel. [doi]
- Effective Anomaly Detection with Scarce Training DataWilliam K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna. [doi]
- Adnostic: Privacy Preserving Targeted AdvertisingVincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas. [doi]
- A Security Evaluation of DNSSEC with NSEC3Jason Bau, John C. Mitchell. [doi]
- Where Do You Want to Go Today? Escalating Privileges by Pathname ManipulationSuresh Chari, Shai Halevi, Wietse Venema. [doi]
- Large-Scale Automatic Classification of Phishing PagesColin Whittaker, Brian Ryner, Marria Nazif. [doi]
- Preventing Capability Leaks in Secure JavaScript SubsetsMatthew Finifter, Joel Weinberger, Adam Barth. [doi]
- A Systematic Characterization of IM Threats using HoneypotsIasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos. [doi]
- Automatic Reverse Engineering of Data Structures from Binary ExecutionZhiqiang Lin, Xiangyu Zhang, Dongyan Xu. [doi]
- On Network-level Clusters for Spam DetectionZhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu. [doi]
- On the Safety of Enterprise Policy DeploymentYudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao. [doi]
- Protecting Browsers from Extension VulnerabilitiesAdam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman. [doi]
- Joe-E: A Security-Oriented Subset of JavaAdrian Mettler, David Wagner, Tyler Close. [doi]
- Improving Spam Blacklisting Through Dynamic Thresholding and Speculative AggregationSushant Sinha, Michael Bailey, Farnam Jahanian. [doi]
- A3: An Extensible Platform for Application-Aware AnonymityMicah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze. [doi]
- Botnet Judo: Fighting Spam with ItselfAndreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage. [doi]
- FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web ApplicationsPrateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song. [doi]
- Contractual AnonymityEdward J. Schwartz, David Brumley, Jonathan M. McCune. [doi]