default search action
18th USENIX Security Symposium 2009: Montreal, Canada
- Fabian Monrose:
18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings. USENIX Association 2009, ISBN 978-1-931971-69-0
Attacks on Privacy
- Martin Vuagnoux, Sylvain Pasini:
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. 1-16 - Kehuan Zhang, XiaoFeng Wang:
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. 17-32 - Nathan S. Evans, Roger Dingledine, Christian Grothoff:
A Practical Congestion Attack on Tor Using Long Paths. 33-50
Memory Safety
- Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand:
Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. 51-66 - David Molnar, Xue Cong Li, David A. Wagner:
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs. 67-82 - John Criswell, Nicolas Geoffray, Vikram S. Adve:
Memory Safety for Low-Level Software/Hardware Interactions. 83-100
Network Security
- Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser:
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. 101-118 - Joel Reardon, Ian Goldberg:
Improving Tor using a TCP-over-DTLS Tunnel. 119-134 - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani:
Locating Prefix Hijackers using LOCK. 135-150
JavaScript Security
- Salvatore Guarnieri, V. Benjamin Livshits:
GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. 151-168 - Paruj Ratanaworabhan, V. Benjamin Livshits, Benjamin G. Zorn:
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks. 169-186 - Adam Barth, Joel Weinberger, Dawn Song:
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense. 187-198
Radio
- Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Physical-layer Identification of RFID Devices. 199-214 - Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels:
CCCP: Secure Remote Storage for Computational RFIDs. 215-230 - Christina Pöpper, Mario Strasser, Srdjan Capkun:
Jamming-resistant Broadcast Communication without Shared Keys. 231-248
Securing Web Apps
- Kapil Singh, Sumeer Bhola, Wenke Lee:
xBook: Redesigning Privacy Control in Social Networking Platforms. 249-266 - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich:
Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. 267-282 - William K. Robertson, Giovanni Vigna:
Static Enforcement of Web Application Integrity Through Strong Typing. 283-298
Applied Crypto
- Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy:
Vanish: Increasing Data Privacy with Self-Destructing Data. 299-316 - Scott A. Crosby, Dan S. Wallach:
Efficient Data Structures For Tamper-Evident Logging. 317-334 - Raluca A. Popa, Hari Balakrishnan, Andrew J. Blumberg:
VPriv: Protecting Privacy in Location-Based Vehicular Services. 335-350
Malware Detection and Protection
- Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang:
Effective and Efficient Malware Detection at the End Host. 351-366 - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash:
Protecting Confidential Data on Personal Computers with Storage Capsules. 367-382 - Ralf Hund, Thorsten Holz, Felix C. Freiling:
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. 383-398
Browser Security
- Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor:
Crying Wolf: An Empirical Study of SSL Warning Effectiveness. 399-416 - Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter:
The Multi-Principal OS Construction of the Gazelle Web Browser. 417-432
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.