default search action
22nd USENIX Security Symposium 2013: Washington, DC, USA
- Samuel T. King:
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013. USENIX Association 2013, ISBN 978-1-931971-03-4
Network Security
- Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang:
Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space. 1-16 - Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. 17-32 - Nico Golde, Kevin Redon, Jean-Pierre Seifert:
Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks. 33-48
Potpourri
- István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos:
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. 49-64 - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen:
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. 65-80 - Jiyong Jang, Maverick Woo, David Brumley:
Towards Automatic Software Lineage Inference. 81-96
Mobile Security I
- Franziska Roesner, Tadayoshi Kohno:
Securing Embedded User Interfaces: Android and Beyond. 97-112 - Benjamin Livshits, Jaeyeon Jung:
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications. 113-130 - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi:
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. 131-146
Applied Crypto I
- Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford:
Proactively Accountable Anonymous Messaging in Verdict. 147-162 - Cédric Fournet, Markulf Kohlweiss, George Danezis, Zhengqin Luo:
ZQL: A Compiler for Privacy-Preserving Data Processing. 163-178 - Sriram Keelveedhi, Mihir Bellare, Thomas Ristenpart:
DupLESS: Server-Aided Encryption for Deduplicated Storage. 179-194
Large-Scale Systems Security I
- Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson:
Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 195-210 - Kevin Springborn, Paul Barford:
Impression Fraud in On-line Advertising via Pay-Per-View Networks. 211-226 - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. 227-240
Large-Scale Systems Security II
- Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao:
You Are How You Click: Clickstream Analysis for Sybil Detection. 241-256 - Devdatta Akhawe, Adrienne Porter Felt:
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. 257-272 - Matthew Finifter, Devdatta Akhawe, David A. Wagner:
An Empirical Study of Vulnerability Rewards Programs. 273-288
Applied Crypto II
- Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. 289-304 - Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
On the Security of RC4 in TLS. 305-320 - Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler:
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. 321-336
Protecting and Understanding Binaries
- Mingwei Zhang, R. Sekar:
Control Flow Integrity for COTS Binaries. 337-352 - David Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo:
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. 353-368 - Bin Zeng, Gang Tan, Úlfar Erlingsson:
Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors. 369-382
Current and Future Systems Security
- Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:
On the Security of Picture Gesture Authentication. 383-398 - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich:
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. 399-314 - Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek:
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. 415-430
Hardware and Embedded Security I
- Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke:
CacheAudit: A Tool for the Static Analysis of Cache Side Channels. 431-446 - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. 447-462 - Drew Davidson, Benjamin Moench, Thomas Ristenpart, Somesh Jha:
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. 463-478
Hardware and Embedded Security II
- Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens:
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. 479-494 - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunitara:
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. 495-510 - Hojoon Lee, Hyungon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object. 511-526
Mobile Security II
- Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie:
WHYPER: Towards Automating Risk Assessment of Mobile Applications. 527-542 - Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon:
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. 543-558 - Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee:
Jekyll on iOS: When Benign Apps Become Evil. 559-572
Large-Scale Systems Security III
- Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:
Measuring the Practical Impact of DNSSEC Deployment. 573-588 - Terry Nelms, Roberto Perdisci, Mustaque Ahamad:
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. 589-604 - Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
ZMap: Fast Internet-wide Scanning and Its Security Applications. 605-620
Web Security
- Martin Johns, Sebastian Lekies, Ben Stock:
Eradicating DNS Rebinding with the Extended Same-origin Policy. 621-636 - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. 637-652 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis:
Language-based Defenses Against Untrusted Browser Origins. 653-670
Attacks
- Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:
Take This Personally: Pollution Attacks on Personalized Services. 671-686 - Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. 687-702
Work-in-Progress Reports (WiP)/Rump Sesson, Plus Special Paper Presentation
- Roel Verdult, Flavio D. Garcia, Baris Ege:
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. 703-718
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.