Abstract is missing.
- SybilLimit: A Near-Optimal Social Network Defense against Sybil AttacksHaifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao. 3-17 [doi]
- Anonymous Networking with Minimum Latency in Multihop NetworksParvathinathan Venkitasubramaniam, Lang Tong. 18-32 [doi]
- Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP ConversationsCharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson. 35-49 [doi]
- Preserving Caller Anonymity in Voice-over-IP NetworksMudhakar Srivatsa, Ling Liu, Arun Iyengar. 50-63 [doi]
- Jamming-resistant Key Establishment using Uncoordinated Frequency HoppingMario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj. 64-78 [doi]
- Casting out Demons: Sanitizing Training Data for Anomaly SensorsGabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis. 81-95 [doi]
- Efficient and Robust TCP Stream NormalizationMythili Vutukuru, Hari Balakrishnan, Vern Paxson. 96-110 [doi]
- Robust De-anonymization of Large Sparse DatasetsArvind Narayanan, Vitaly Shmatikov. 111-125 [doi]
- Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesDaniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel. 129-142 [doi]
- Automatic Patch-Based Exploit Generation is Possible: Techniques and ImplicationsDavid Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng. 143-157 [doi]
- Compromising Reflections-or-How to Read LCD Monitors around the CornerMichael Backes, Markus Dürmuth, Dominique Unruh. 158-169 [doi]
- ClearShot: Eavesdropping on Keyboard Input from VideoDavide Balzarotti, Marco Cova, Giovanni Vigna. 170-183 [doi]
- XFA: Faster Signature Matching with Extended AutomataRandy Smith, Cristian Estan, Somesh Jha. 187-201 [doi]
- Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation ProtocolMichael Backes, Matteo Maffei, Dominique Unruh. 202-215 [doi]
- Towards Practical Privacy for Genomic ComputationSomesh Jha, Louis Kruger, Vitaly Shmatikov. 216-230 [doi]
- Lares: An Architecture for Secure Active Monitoring Using VirtualizationBryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee. 233-247 [doi]
- Practical Proactive Integrity Preservation: A Basis for Malware DefenseWeiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar. 248-262 [doi]
- Preventing Memory Error Exploits with WITPeriklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro. 263-277 [doi]
- Thinking Inside the Box: System-Level Failures of Tamper ProofingSaar Drimer, Steven J. Murdoch, Ross Anderson. 281-295 [doi]
- Cloaker: Hardware Supported Rootkit ConcealmentFrancis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell. 296-310 [doi]
- Predictable Design of Network-Based Covert Communication SystemsRonald William Smith, George Scott Knight. 311-321 [doi]
- Verifying the Safety of User Pointer DereferencesSuhabe Bugrara, Alex Aiken. 325-338 [doi]
- Expressive Declassification Policies and Modular Static EnforcementAnindya Banerjee, David A. Naumann, Stan Rosenberg. 339-353 [doi]
- Civitas: Toward a Secure Voting SystemMichael R. Clarkson, Stephen Chong, Andrew C. Myers. 354-368 [doi]
- Fable: A Language for Enforcing User-defined Security PoliciesNikhil Swamy, Brian J. Corcoran, Michael Hicks. 369-383 [doi]
- Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web ApplicationsDavide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna. 387-401 [doi]
- Secure Web Browsing with the OP Web BrowserChris Grier, Shuo Tang, Samuel T. King. 402-416 [doi]
- Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted StorageBruno Blanchet, Avik Chaudhuri. 417-431 [doi]