Abstract is missing.
- SpyProxy: Execution-based Detection of Malicious Web ContentAlexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy. [doi]
- Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson. [doi]
- SIF: Enforcing Confidentiality and Integrity in Web ApplicationsStephen Chong, K. Vikram, Andrew C. Myers. [doi]
- Devices That Tell on You: Privacy Trends in Consumer Ubiquitous ComputingT. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno. [doi]
- Integrity Checking in Cryptographic File Systems with Constant Trusted StorageAlina Oprea, Michael K. Reiter. [doi]
- Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationDavid Brumley, Juan Caballero, Zhenkai Liang, James Newsome. [doi]
- BotHunter: Detecting Malware Infection Through IDS-Driven Dialog CorrelationGuofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong. [doi]
- Exploiting Network Structure for Proactive Spam MitigationShobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song. [doi]
- Keep Your Enemies Close: Distance Bounding Against Smartcard Relay AttacksSaar Drimer, Steven J. Murdoch. [doi]
- OSLO: Improving the Security of Trusted ComputingBernhard Kauer. [doi]
- Halting Password Puzzles: Hard-to-break Encryption from Human-memorable KeysXavier Boyen. [doi]
- Web-Based Inference DetectionJessica Staddon, Philippe Golle, Bryce Zimny. [doi]
- Memory Performance Attacks: Denial of Memory Service in Multi-Core SystemsThomas Moscibroda, Onur Mutlu. [doi]
- Human-Seeded Attacks and Exploiting Hot-Spots in Graphical PasswordsJulie Thorpe, Paul C. van Oorschot. [doi]
- Proximity Breeds Danger: Emerging Threats in Metro-area Wireless NetworksPeriklis Akritidis, Wee-Yung Chin, Vinh The Lam, Stelios Sidiroglou, Kostas G. Anagnostakis. [doi]
- Spamscatter: Characterizing Internet Scam Hosting InfrastructureDavid S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker. [doi]
- On Attack Causality in Internet-Connected Cellular NetworksPatrick McDaniel. [doi]
- Secretly Monopolizing the CPU Without Superuser PrivilegesDan Tsafrir, Yoav Etsion, Dror G. Feitelson. [doi]
- Combating Click Fraud via Premium ClicksAri Juels, Sid Stamm, Markus Jakobsson. [doi]
- On Web Browsing Privacy in Anonymized NetFlowsScott E. Coull, Michael P. Collins, Charles V. Wright, Fabian Monrose, Michael K. Reiter. [doi]
- Active Hardware Metering for Intellectual Property Protection and SecurityYousra Alkabani, Farinaz Koushanfar. [doi]
- Binary Obfuscation Using SignalsIgor V. Popov, Saumya K. Debray, Gregory R. Andrews. [doi]
- Discoverer: Automatic Protocol Reverse Engineering from Network TracesWeidong Cui, Jayanthkumar Kannan, Helen J. Wang. [doi]