Abstract is missing.
- All Your iFRAMEs Point to UsNiels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose. 1-16 [doi]
- Securing Frame Communication in BrowsersAdam Barth, Collin Jackson, John C. Mitchell. 17-30 [doi]
- Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model CheckingMichael Martin, Monica S. Lam. 31-44 [doi]
- Lest We Remember: Cold Boot Attacks on Encryption KeysJ. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten. 45-60 [doi]
- The Practical Subtleties of Biometric Key GenerationLucas Ballard, Seny Kamara, Michael K. Reiter. 61-74 [doi]
- Unidirectional Key Distribution Across Time and Space with Applications to RFID SecurityAri Juels, Ravikanth Pappu, Bryan Parno. 75-90 [doi]
- CloudAV: N-Version Antivirus in the Network CloudJon Oberheide, Evan Cooke, Farnam Jahanian. 91-106 [doi]
- Highly Predictive BlacklistingJian Zhang, Phillip A. Porras, Johannes Ullrich. 107-122 [doi]
- Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based AttacksJerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck. 123-138 [doi]
- BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet DetectionGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee. 139-154 [doi]
- Measurement and Classification of Humans and Bots in Internet ChatSteven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang. 155-170 [doi]
- To Catch a Predator: A Natural Language Approach for Eliciting Malicious PayloadsSam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield. 171-184 [doi]
- Reverse-Engineering a Cryptographic RFID TagKarsten Nohl, David Evans, Starbug, Henryk Plötz. 185-194 [doi]
- Practical Symmetric Key Cryptography on Modern Graphics HardwareOwen Harrison, John Waldron. 195-210 [doi]
- An Improved Clock-skew Measurement Technique for Revealing Hidden ServicesSebastian Zander, Steven J. Murdoch. 211-226 [doi]
- NetAuth: Supporting User-Based Network ServicesManigandan Radhakrishnan, Jon A. Solworth. 227-242 [doi]
- Hypervisor Support for Identifying Covertly Executing BinariesLionel Litty, H. Andrés Lagar-Cavilla, David Lie. 243-258 [doi]
- Selective Versioning in a Secure Disk SystemSwaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok. 259-274 [doi]
- Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTsThomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno. 275-290 [doi]
- Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software Rui Wang, Xiaofeng Wang, Zhuowei Li. 291-306 [doi]
- Multi-flow Attacks Against Network Flow Watermarking SchemesNegar Kiyavash, Amir Houmansadr, Nikita Borisov. 307-320 [doi]
- Verifying Compliance of Trusted ProgramsSandra Rueda, Dave King 0002, Trent Jaeger. 321-334 [doi]
- Helios: Web-based Open-Audit VotingBen Adida. 335-348 [doi]
- VoteBox: A Tamper-evident, Verifiable Electronic Voting SystemDaniel Sandler, Kyle Derr, Dan S. Wallach. 349-364 [doi]
- An Empirical Security Study of the Native Code in the JDKGang Tan, Jason Croft. 365-378 [doi]
- AutoISES: Automatically Inferring Security Specification and Detecting ViolationsLin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou. 379-394 [doi]
- Real-World Buffer Overflow Protection for Userspace and KernelspaceMichael Dalton, Hari Kannan, Christos Kozyrakis. 395-410 [doi]