Abstract is missing.
- Wirelessly Pickpocketing a Mifare Classic CardFlavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur. 3-15 [doi]
- Plaintext Recovery Attacks against SSHMartin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson. 16-26 [doi]
- Exploiting Unix File-System Races via Algorithmic Complexity AttacksXiang Cai, Yuwei Gui, Rob Johnson. 27-41 [doi]
- Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 ProcessorsBart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter. 45-60 [doi]
- Noninterference for a Practical DIFC-Based Operating SystemMaxwell N. Krohn, Eran Tromer. 61-76 [doi]
- Native Client: A Sandbox for Portable, Untrusted x86 Native CodeBennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar. 79-93 [doi]
- Automatic Reverse Engineering of Malware EmulatorsMonirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee. 94-109 [doi]
- Prospex: Protocol Specification ExtractionPaolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda. 110-125 [doi]
- Quantifying Information Leaks in Outbound Web TrafficKevin Borders, Atul Prakash. 129-140 [doi]
- Automatic Discovery and Quantification of Information LeaksMichael Backes, Boris Köpf, Andrey Rybalchenko. 141-153 [doi]
- CLAMP: Practical Prevention of Large-Scale Data LeaksBryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig. 154-169 [doi]
- De-anonymizing Social NetworksArvind Narayanan, Vitaly Shmatikov. 173-187 [doi]
- Privacy Weaknesses in Biometric SketchesKoen Simoens, Pim Tuyls, Bart Preneel. 188-203 [doi]
- A Logic of Secure Systems and its Application to Trusted ComputingAnupam Datta, Jason Franklin, Deepak Garg, Dilsun Kirli Kaynar. 221-236 [doi]
- Formally Certifying the Security of Digital Signature SchemesSantiago Zanella Béguelin, Gilles Barthe, Benjamin Grégoire, Federico Olmedo. 237-250 [doi]
- An Epistemic Approach to Coercion-Resistance for Electronic Voting ProtocolsRalf Küsters, Tomasz Truderung. 251-266 [doi]
- Sphinx: A Compact and Provably Secure Mix FormatGeorge Danezis, Ian Goldberg. 269-282 [doi]
- DSybil: Optimal Sybil-Resistance for Recommendation SystemsHaifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao. 283-298 [doi]
- Fingerprinting Blank Paper Using Commodity ScannersWilliam Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten. 301-314 [doi]
- Tempest in a Teapot: Compromising Reflections RevisitedMichael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk. 315-327 [doi]
- Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing BrowsersMike Ter Louw, V. N. Venkatakrishnan. 331-346 [doi]
- Pretty-Bad-Proxy: An Overlooked Adversary in Browsers HTTPS DeploymentsShuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang. 347-359 [doi]
- Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing ThemselvesAdam Barth, Juan Caballero, Dawn Song. 360-371 [doi]
- It s No Secret. Measuring the Security and Reliability of Authentication via Secret QuestionsStuart E. Schechter, A. J. Bernheim Brush, Serge Egelman. 375-390 [doi]
- Password Cracking Using Probabilistic Context-Free GrammarsMatt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek. 391-405 [doi]