default search action
29th SP 2008: Oakland, California, USA
- 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA. IEEE Computer Society 2008, ISBN 978-0-7695-3168-7
- Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao:
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. 3-17 - Parvathinathan Venkitasubramaniam, Lang Tong:
Anonymous Networking with Minimum Latency in Multihop Networks. 18-32 - Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson:
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. 35-49 - Mudhakar Srivatsa, Ling Liu, Arun Iyengar:
Preserving Caller Anonymity in Voice-over-IP Networks. 50-63 - Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj:
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. 64-78 - Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. 81-95 - Mythili Vutukuru, Hari Balakrishnan, Vern Paxson:
Efficient and Robust TCP Stream Normalization. 96-110 - Arvind Narayanan, Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets. 111-125 - Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. 129-142 - David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng:
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. 143-157 - Michael Backes, Markus Dürmuth, Dominique Unruh:
Compromising Reflections-or-How to Read LCD Monitors around the Corner. 158-169 - Davide Balzarotti, Marco Cova, Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video. 170-183 - Randy Smith, Cristian Estan, Somesh Jha:
XFA: Faster Signature Matching with Extended Automata. 187-201 - Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. 202-215 - Somesh Jha, Louis Kruger, Vitaly Shmatikov:
Towards Practical Privacy for Genomic Computation. 216-230 - Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee:
Lares: An Architecture for Secure Active Monitoring Using Virtualization. 233-247 - Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar:
Practical Proactive Integrity Preservation: A Basis for Malware Defense. 248-262 - Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro:
Preventing Memory Error Exploits with WIT. 263-277 - Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing. 281-295 - Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell:
Cloaker: Hardware Supported Rootkit Concealment. 296-310 - Ronald William Smith, George Scott Knight:
Predictable Design of Network-Based Covert Communication Systems. 311-321 - Suhabe Bugrara, Alex Aiken:
Verifying the Safety of User Pointer Dereferences. 325-338 - Anindya Banerjee, David A. Naumann, Stan Rosenberg:
Expressive Declassification Policies and Modular Static Enforcement. 339-353 - Michael R. Clarkson, Stephen Chong, Andrew C. Myers:
Civitas: Toward a Secure Voting System. 354-368 - Nikhil Swamy, Brian J. Corcoran, Michael Hicks:
Fable: A Language for Enforcing User-defined Security Policies. 369-383 - Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. 387-401 - Chris Grier, Shuo Tang, Samuel T. King:
Secure Web Browsing with the OP Web Browser. 402-416 - Bruno Blanchet, Avik Chaudhuri:
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. 417-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.