Abstract is missing.
- Compromising Electromagnetic Emanations of Wired and Wireless KeyboardsMartin Vuagnoux, Sylvain Pasini. 1-16 [doi]
- Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User SystemsKehuan Zhang, Xiaofeng Wang. 17-32 [doi]
- A Practical Congestion Attack on Tor Using Long PathsNathan S. Evans, Roger Dingledine, Christian Grothoff. 33-50 [doi]
- Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds ErrorsPeriklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand. 51-66 [doi]
- Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux ProgramsDavid Molnar, Xue Cong Li, David Wagner. 67-82 [doi]
- Memory Safety for Low-Level Software/Hardware InteractionsJohn Criswell, Nicolas Geoffray, Vikram S. Adve. 83-100 [doi]
- Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation EngineShuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser. 101-118 [doi]
- Improving Tor using a TCP-over-DTLS TunnelJoel Reardon, Ian Goldberg. 119-134 [doi]
- Locating Prefix Hijackers using LOCKTongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun Jim Xu, Hitesh Ballani. 135-150 [doi]
- GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript CodeSalvatore Guarnieri, V. Benjamin Livshits. 151-168 [doi]
- NOZZLE: A Defense Against Heap-spraying Code Injection AttacksParuj Ratanaworabhan, V. Benjamin Livshits, Benjamin G. Zorn. 169-186 [doi]
- Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and DefenseAdam Barth, Joel Weinberger, Dawn Song. 187-198 [doi]
- Physical-layer Identification of RFID DevicesBoris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun. 199-214 [doi]
- CCCP: Secure Remote Storage for Computational RFIDsMastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels. 215-230 [doi]
- Jamming-resistant Broadcast Communication without Shared KeysChristina Pöpper, Mario Strasser, Srdjan Capkun. 231-248 [doi]
- xBook: Redesigning Privacy Control in Social Networking PlatformsKapil Singh, Sumeer Bhola, Wenke Lee. 249-266 [doi]
- Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web ApplicationsMichael Dalton, Christos Kozyrakis, Nickolai Zeldovich. 267-282 [doi]
- Static Enforcement of Web Application Integrity Through Strong TypingWilliam K. Robertson, Giovanni Vigna. 283-298 [doi]
- Vanish: Increasing Data Privacy with Self-Destructing DataRoxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy. 299-316 [doi]
- Efficient Data Structures For Tamper-Evident LoggingScott A. Crosby, Dan S. Wallach. 317-334 [doi]
- VPriv: Protecting Privacy in Location-Based Vehicular ServicesRaluca A. Popa, Hari Balakrishnan, Andrew J. Blumberg. 335-350 [doi]
- Effective and Efficient Malware Detection at the End HostClemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, Xiaofeng Wang. 351-366 [doi]
- Protecting Confidential Data on Personal Computers with Storage CapsulesKevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash. 367-382 [doi]
- Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection MechanismsRalf Hund, Thorsten Holz, Felix C. Freiling. 383-398 [doi]
- Crying Wolf: An Empirical Study of SSL Warning EffectivenessJoshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor. 399-416 [doi]
- The Multi-Principal OS Construction of the Gazelle Web BrowserHelen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter. 417-432 [doi]