Abstract is missing.
- Security analysis of India s electronic voting machinesScott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp. 1-14 [doi]
- Dissecting one click fraudsNicolas Christin, Sally S. Yanagihara, Keisuke Kamataki. 15-26 [doi]
- @spam: the underground on 140 characters or lessChris Grier, Kurt Thomas, Vern Paxson, Michael Zhang. 27-37 [doi]
- HyperSentry: enabling stealthy in-context measurement of hypervisor integrityAhmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky. 38-49 [doi]
- Trail of bytes: efficient support for forensic analysisSrinivas Krishnan, Kevin Z. Snow, Fabian Monrose. 50-60 [doi]
- Survivable key compromise in software update systemsJustin Samuel, Nick Mathewson, Justin Cappos, Roger Dingledine. 61-72 [doi]
- A methodology for empirical analysis of permission-based security models and its application to androidDavid Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji. 73-84 [doi]
- Mobile location tracking in metro areas: malnets and othersNathaniel Husted, Steven Myers. 85-96 [doi]
- On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdroppingTzipora Halevi, Nitesh Saxena. 97-108 [doi]
- PinDr0p: using single-ended audio features to determine call provenanceVijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor. 109-120 [doi]
- Building efficient fully collusion-resilient traitor tracing and revocation schemesSanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters. 121-130 [doi]
- Algebraic pseudorandom functions with improved efficiency from the augmented cascadeDan Boneh, Hart William Montgomery, Ananth Raghunathan. 131-140 [doi]
- Practical leakage-resilient pseudorandom generatorsYu Yu, François-Xavier Standaert, Olivier Pereira, Moti Yung. 141-151 [doi]
- Practical leakage-resilient identity-based encryption from simple assumptionsSherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters. 152-161 [doi]
- Testing metrics for password creation policies by attacking large sets of revealed passwordsMatt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern. 162-175 [doi]
- The security of modern password expiration: an algorithmic framework and empirical analysisYinqian Zhang, Fabian Monrose, Michael K. Reiter. 176-186 [doi]
- Attacks and design of image recognition CAPTCHAsBin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai. 187-200 [doi]
- Robusta: taming the native beast of the JVMJoseph Siefers, Gang Tan, Greg Morrisett. 201-211 [doi]
- Retaining sandbox containment despite bugs in privileged memory-safe codeJustin Cappos, Armon Dadgar, Jeff Rasley, Justin Samuel, Ivan Beschastnikh, Cosmin Barsan, Arvind Krishnamurthy, Thomas E. Anderson. 212-223 [doi]
- A control point for reducing root abuse of file-system privilegesGlenn Wurster, Paul C. van Oorschot. 224-236 [doi]
- Modeling attacks on physical unclonable functionsUlrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber. 237-249 [doi]
- Dismantling SecureMemory, CryptoMemory and CryptoRFFlavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur. 250-259 [doi]
- Attacking and fixing PKCS#11 security tokensMatteo Bortolozzo, Matteo Centenaro, Riccardo Focardi, Graham Steel. 260-269 [doi]
- An empirical study of privacy-violating information flows in JavaScript web applicationsDongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham. 270-283 [doi]
- DIFC programs by automatic instrumentationWilliam R. Harris, Somesh Jha, Thomas W. Reps. 284-296 [doi]
- Predictive black-box mitigation of timing channelsAslan Askarov, Danfeng Zhang, Andrew C. Myers. 297-307 [doi]
- In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systemsQiyan Wang, Prateek Mittal, Nikita Borisov. 308-318 [doi]
- Recruiting new tor relays with BRAIDSRob Jansen, Nicholas Hopper, Yongdae Kim. 319-328 [doi]
- An improved algorithm for tor circuit schedulingCan Tang, Ian Goldberg. 329-339 [doi]
- Dissent: accountable anonymous group messagingHenry Corrigan-Gibbs, Bryan Ford. 340-350 [doi]
- Abstraction by set-membership: verifying security protocols and web services with databasesSebastian Mödersheim. 351-360 [doi]
- Developing security protocols by refinementChristoph Sprenger, David A. Basin. 361-374 [doi]
- Computational indistinguishability logicGilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech. 375-386 [doi]
- Computationally sound verification of source codeMichael Backes, Matteo Maffei, Dominique Unruh. 387-398 [doi]
- AccessMiner: using system-centric models for malware protectionAndrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda. 399-412 [doi]
- Input generation via decomposition and re-stitching: finding bugs in MalwareJuan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song. 413-425 [doi]
- Inference and analysis of formal models of botnet command and control protocolsChia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song. 426-439 [doi]
- BLADE: an attack-agnostic approach for preventing drive-by malware infectionsLong Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee. 440-450 [doi]
- TASTY: tool for automating secure two-party computationsWilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo Wehrenberg. 451-462 [doi]
- Worry-free encryption: functional encryption with public keysAmit Sahai, Hakan Seyalioglu. 463-472 [doi]
- Synchronized aggregate signatures: new definitions, constructions and applicationsJae Hyun Ahn, Matthew Green, Susan Hohenberger. 473-484 [doi]
- Secure text processing with applications to private DNA matchingJonathan Katz, Lior Malka. 485-492 [doi]
- On the (in)security of IPsec in MAC-then-encrypt configurationsJean Paul Degabriele, Kenneth G. Paterson. 493-504 [doi]
- On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryptionUeli Maurer, Björn Tackmann. 505-515 [doi]
- A new framework for efficient password-based authenticated key exchangeAdam Groce, Jonathan Katz. 516-525 [doi]
- Accountability: definition and relationship to verifiabilityRalf Küsters, Tomasz Truderung, Andreas Vogt. 526-535 [doi]
- Mimimorphism: a new approach to binary code obfuscationZhenyu Wu, Steven Gianvecchio, Mengjun Xie, Haining Wang. 536-546 [doi]
- Platform-independent programsSang Kil Cha, Brian Pak, David Brumley, Richard Jay Lipton. 547-558 [doi]
- Return-oriented programming without returnsStephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy. 559-572 [doi]
- DieHarder: securing the heapGene Novark, Emery D. Berger. 573-584 [doi]
- Symbolic security analysis of ruby-on-rails web applicationsAvik Chaudhuri, Jeffrey S. Foster. 585-594 [doi]
- Sidebuster: automated detection and quantification of side-channel leaks in web application developmentKehuan Zhang, Zhou Li, Rui Wang 0010, Xiaofeng Wang, Shuo Chen. 595-606 [doi]
- NoTamper: automatic blackbox detection of parameter tampering opportunities in web applicationsPrithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, Radoslaw Bobrowicz, V. N. Venkatakrishnan. 607-618 [doi]
- Protecting browsers from cross-origin CSS attacksLin-Shung Huang, Zack Weinberg, Chris Evans, Collin Jackson. 619-629 [doi]
- A privacy recommendation wizard for users of social networking sitesLujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami. 630-632 [doi]
- SecTag: a multi-policy supported secure web tag frameworkRuixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaopu Ma, Kai Li. 633-635 [doi]
- Demonstrating cognitive packet network resilience to worm attacksGeorgia Sakellari, Erol Gelenbe. 636-638 [doi]
- In God we trust all others we monitorPatrick Stewin, Jean-Pierre Seifert. 639-641 [doi]
- Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chainingWalid Bechkit, Abdelmadjid Bouabdallah, Yacine Challal. 642-644 [doi]
- TAPS: automatically preparing safe SQL queriesPrithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan. 645-647 [doi]
- XACML policy performance evaluation using a flexible load testing frameworkBernard Butler, Brendan Jennings, Dmitri Botvich. 648-650 [doi]
- Protecting portable storage with host validationKevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel. 651-653 [doi]
- Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionalityYinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen. 654-656 [doi]
- CardSpace in the cloudDavid W. Chadwick, George Inman, Paul Coxwell. 657-659 [doi]
- Secure latency estimation with treepleEric Chan-Tin, Nicholas Hopper. 660-662 [doi]
- TEE: a virtual DRTM based execution environment for secure cloud-end computingWeiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi. 663-665 [doi]
- Laptop theft: a case study on the effectiveness of security mechanisms in open organizationsTrajce Dimkov, Wolter Pieters, Pieter H. Hartel. 666-668 [doi]
- Information security for sensors by overwhelming random sequences and permutationsShlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, Paul G. Spirakis. 669-671 [doi]
- On verifying stateful dataflow processing services in large-scale cloud systemsJuan Du, Xiaohui Gu, Ting Yu. 672-674 [doi]
- Assessing trust in uncertain information using Bayesian description logicAchille Fokoue, Mudhakar Srivatsa, Robert Young. 675-677 [doi]
- Timing attacks on PIN input devicesDenis Foo Kune, Yongdae Kim. 678-680 [doi]
- Detecting and characterizing social spam campaignsHongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao. 681-683 [doi]
- Fingerprinting websites using remote traffic analysisXun Gong, Negar Kiyavash, Nikita Borisov. 684-686 [doi]
- Efficient sensor node authentication via 3GPP mobile communication networksKyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Shon. 687-689 [doi]
- Rendezvous tunnel for anonymous publishingOfer Hermoni, Niv Gilboa, Eyal Felstaine, Yuval Elovici, Shlomi Dolev. 690-692 [doi]
- Exploiting social networking sites for spamMarcus Huber, Martin Mulazzani, Edgar Weippl, Gerhard Kitzler, Sigrun Goluch. 693-695 [doi]
- An implementation of event and filter confidentiality in pub/sub systems and its application to e-healthMihalea Ion, Giovanni Russello, Bruno Crispo. 696-698 [doi]
- Privacy and robustness for data aggregation in wireless sensor networksMarian Kamal Iskander, Adam J. Lee, Daniel Mossé. 699-701 [doi]
- Designing router scheduling policies: a privacy perspectiveSachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam. 702-704 [doi]
- CRAFT: a new secure congestion control architectureDongHo Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar. 705-707 [doi]
- Dialog-based payload aggregation for intrusion detectionTobias Limmer, Falko Dressler. 708-710 [doi]
- Protecting location privacy against inference attacksKazuhiro Minami, Nikita Borisov. 711-713 [doi]
- Designs to account for trust in social network-based sybil defensesAbedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim. 714-716 [doi]
- Secure encounter-based social networks: requirements, challenges, and designsAbedelaziz Mohaisen, Eugene Y. Vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim. 717-719 [doi]
- Secure online banking on untrusted computersYanlin Peng, Wenji Chen, J. Morris Chang, Yong Guan. 720-722 [doi]
- iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networksRahul Potharaju, Bogdan Carbunar, Cristina Nita-Rotaru. 723-725 [doi]
- Losing control of the internet: using the data plane to attack the control planeMax Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman. 726-728 [doi]
- Size-based scheduling: a recipe for DDOS?Abdul Serwadda, Vir V. Phoha, Idris A. Rai. 729-731 [doi]
- User-friendly matching protocol for online social networksQiang Tang. 732-734 [doi]
- Hierarchical attribute-based encryption for fine-grained access control in cloud storage servicesGuojun Wang, Qin Liu, Jie Wu. 735-737 [doi]
- Secure dynamic code generation against sprayingTao Wei, Tielei Wang, Lei Duan, Jing Luo. 738-740 [doi]
- Ad hoc broadcast encryptionQianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer. 741-743 [doi]
- Dynamic window based multihop authentication for WSNLan Yao, Zhiliang Yu, Tie Zhang, Fuxiang Gao. 744-746 [doi]
- Spectrum based fraud detection in social networksXiaowei Ying, Xintao Wu, Daniel Barbará. 747-749 [doi]
- A portable TPM based on USB keyDawei Zhang, Zhen Han, Guangwen Yan. 750-752 [doi]
- On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstractZhibin Zhou, Dijiang Huang. 753-755 [doi]
- Efficient provable data possession for hybrid cloudsYan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau. 756-758 [doi]
- A cloud based SIM DRM scheme for the mobile internetPeng Zou, Chaokun Wang, Zhang Liu, Jianmin Wang, Jia-Guang Sun. 759-761 [doi]