Abstract is missing.
- Reflections on the 30th Anniversary of the IEEE Symposium on Security and PrivacyPeter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer. 3-13 [doi]
- History of US Government Investments in Cybersecurity Research: A Personal PerspectiveCarl E. Landwehr. 14-20 [doi]
- Crossing the Valley of Death : Transitioning Research into Commercial Products - A Personal PerspectiveW. Douglas Maughan. 21-26 [doi]
- Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware BinariesClemens Kolbitsch, Thorsten Holz, Christopher Kruegel, Engin Kirda. 29-44 [doi]
- Synthesizing Near-Optimal Malware Specifications from Suspicious BehaviorsMatt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan. 45-60 [doi]
- Identifying Dormant Functionality in Malware ProgramsPaolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero. 61-76 [doi]
- Reconciling Belief and Vulnerability in Information FlowSardaouna Hamadou, Vladimiro Sassone, Catuscia Palamidessi. 79-92 [doi]
- Towards Static Flow-Based Declassification for Legacy and Untrusted ProgramsBruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle. 93-108 [doi]
- Noninterference through Secure Multi-executionDominique Devriese, Frank Piessens. 109-124 [doi]
- Object Capabilities and Isolation of Untrusted Web ApplicationsSergio Maffeis, John C. Mitchell, Ankur Taly. 125-140 [doi]
- TrustVisor: Efficient TCB Reduction and AttestationJonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig. 143-158 [doi]
- Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware AutomaticallyMatthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith. 159-172 [doi]
- Tamper Evident MicroprocessorsAdam Waksman, Simha Sethumadhavan. 173-188 [doi]
- Side-Channel Leaks in Web Applications: A Reality Today, a Challenge TomorrowShuo Chen, Rui Wang 0010, Xiaofeng Wang, Kehuan Zhang. 191-206 [doi]
- Investigation of Triangular Spamming: A Stealthy and Efficient Spamming TechniqueZhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu. 207-222 [doi]
- A Practical Attack to De-anonymize Social Network UsersGilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel. 223-238 [doi]
- SCiFI - A System for Secure Face IdentificationMargarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich. 239-254 [doi]
- Round-Efficient Broadcast Authentication Protocols for Fixed Topology ClassesHaowen Chan, Adrian Perrig. 257-272 [doi]
- Revocation Systems with Very Small Private KeysAllison B. Lewko, Amit Sahai, Brent Waters. 273-285 [doi]
- Authenticating Primary Users Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link SignaturesYao Liu, Peng Ning, Huaiyu Dai. 286-301 [doi]
- Outside the Closed World: On Using Machine Learning for Network Intrusion DetectionRobin Sommer, Vern Paxson. 305-316 [doi]
- All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)Edward J. Schwartz, Thanassis Avgerinos, David Brumley. 317-331 [doi]
- State of the Art: Automated Black-Box Web Application Vulnerability TestingJason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell. 332-345 [doi]
- A Proof-Carrying File SystemDeepak Garg, Frank Pfenning. 349-364 [doi]
- Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure SizeJason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri. 365-379 [doi]
- HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow IntegrityZhi Wang, Xuxian Jiang. 380-395 [doi]
- How Good Are Humans at Solving CAPTCHAs? A Large Scale EvaluationElie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Daniel Jurafsky. 399-413 [doi]
- Bootstrapping Trust in Commodity ComputersBryan Parno, Jonathan M. McCune, Adrian Perrig. 414-429 [doi]
- Chip and PIN is BrokenSteven J. Murdoch, Saar Drimer, Ross J. Anderson, Mike Bond. 433-446 [doi]
- Experimental Security Analysis of a Modern AutomobileKarl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. 447-462 [doi]
- On the Incoherencies in Web Browser Access Control PoliciesKapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee. 463-478 [doi]
- ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the BrowserLeo A. Meyerovich, V. Benjamin Livshits. 481-496 [doi]
- TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability DetectionTielei Wang, Tao Wei, Guofei Gu, Wei Zou. 497-512 [doi]
- A Symbolic Execution Framework for JavaScriptPrateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song. 513-528 [doi]