Abstract is missing.
- Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple AntennasLiang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra. [doi]
- AEG: Automatic Exploit GenerationThanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley. [doi]
- Efficient Monitoring of Untrusted Kernel-Mode ExecutionAbhinav Srivastava, Jonathon T. Giffin. [doi]
- Privacy-Preserving Aggregation of Time-Series DataElaine Shi, T.-H. Hubert Chan, Eleanor G. Rieffel, Richard Chow, Dawn Song. [doi]
- PiOS: Detecting Privacy Leaks in iOS ApplicationsManuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. [doi]
- Efficient Privacy-Preserving Biometric IdentificationYan Huang, Lior Malka, David Evans, Jonathan Katz. [doi]
- Using Classification to Protect the Integrity of Spectrum Measurements in White Space NetworksOmid Fatemieh, Ali Farhadi, Ranyeer Chandra, Carl A. Gunter. [doi]
- WebShield: Enabling Various Web Defense Techniques without Client Side ModificationsZhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa. [doi]
- On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical AnalysesScott E. Coull, Fabian Monrose, Michael Bailey. [doi]
- Location Privacy via Private Proximity TestingArvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh. [doi]
- EXPOSURE: Finding Malicious Domains Using Passive DNS AnalysisLeyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi. [doi]
- Losing Control of the Internet: Using the Data Plane to Attack the Control PlaneMax Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman. [doi]
- Practical Protection of Kernel Integrity for Commodity OS from Untrusted ExtensionsXi Xiong, Donghai Tian, Peng Liu. [doi]
- No Loitering: Exploiting Lingering Vulnerabilities in Default COM ObjectsDavid Dewey, Patrick Traynor. [doi]
- Howard: A Dynamic Excavator for Reverse Engineering Data StructuresAsia Slowinska, Traian Stancescu, Herbert Bos. [doi]
- Soundcomber: A Stealthy and Context-Aware Sound Trojan for SmartphonesRoman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, Xiaofeng Wang. [doi]
- Automated Discovery of Parameter Pollution Vulnerabilities in Web ApplicationsMarco Balduzzi, Carmen Torrano-Gimenez, Davide Balzarotti, Engin Kirda. [doi]
- A Security API for Distributed Social NetworksMichael Backes, Matteo Maffei, Kim Pecina. [doi]
- HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted FlowsXiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci. [doi]
- Relay Attacks on Passive Keyless Entry and Start Systems in Modern CarsAurélien Francillon, Boris Danev, Srdjan Capkun. [doi]
- Tracker: Security and Privacy for RFID-based Supply ChainsErik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva. [doi]
- TIE: Principled Reverse Engineering of Types in Binary ProgramsJongHyup Lee, Thanassis Avgerinos, David Brumley. [doi]
- SPARE: Replicas on HoldTobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P. Reiser, Rüdiger Kapitza. [doi]
- Accurate and Provably Secure Latency Estimation with TreepleEric Chan-Tin, Nicholas Hopper. [doi]
- Usability Testing a Malware-Resistant Input MechanismAlana Libonati, Jonathan M. McCune, Michael K. Reiter. [doi]
- SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based SignaturesZhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang. [doi]
- SWIRL: A Scalable Watermark to Detect Correlated Network FlowsAmir Houmansadr, Nikita Borisov. [doi]
- DTA++: Dynamic Taint Analysis with Targeted Control-Flow PropagationMin Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song. [doi]