default search action
33rd SP 2012: San Francisco, California, USA
- IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA. IEEE Computer Society 2012, ISBN 978-0-7695-4681-0
System Security
- Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou:
A Framework to Eliminate Backdoors from Response-Computable Authentication. 3-17 - Mathias Payer, Tobias Hartmann, Thomas R. Gross:
Safe Loading - A Foundation for Secure Execution of Untrusted Programs. 18-32 - Yinglei Wang, Wing-Kei S. Yu, Shuo Wu, Greg Malysa, G. Edward Suh, Edwin Kan:
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints. 33-47 - Jiyong Jang, Abeer Agrawal, David Brumley:
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. 48-62
Malware
- Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79 - Suman Jana, Vitaly Shmatikov:
Abusing File Processing in Malware Detectors for Fun and Profit. 80-94 - Yajin Zhou, Xuxian Jiang:
Dissecting Android Malware: Characterization and Evolution. 95-109
Attacks 1
- Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. 113-127 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz:
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards. 128-142 - Suman Jana, Vitaly Shmatikov:
Memento: Learning Secrets from Process Footprints. 143-157
Foundations
- Moritz Y. Becker, Alessandra Russo, Nik Sultana:
Foundations of Logic-Based Trust Management. 161-175 - Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Formalizing and Enforcing Purpose Restrictions in Privacy Policies. 176-190 - Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers:
Sharing Mobile Code Securely with Information Flow Control. 191-205
Access Control and Attestation
- Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta S. Byrne:
The Psychology of Security for the Home Computer User. 209-223 - Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. 224-238 - Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth:
New Results for Timing-Based Attestation. 239-253
Privacy
- Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. 257-271 - Yan Huang, Jonathan Katz, David Evans:
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. 272-284 - Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams:
Hummingbird: Privacy at the Time of Twitter. 285-299 - Arvind Narayanan, Hristo S. Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song:
On the Feasibility of Internet-Scale Author Identification. 300-314
Network Security
- Xin Zhang, Chang Lan, Adrian Perrig:
Secure and Scalable Fault Localization under Dynamic Traffic Patterns. 317-331 - Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. 332-346 - Zhiyun Qian, Zhuoqing Morley Mao:
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. 347-361
Attacks 2
- Rui Wang, Shuo Chen, XiaoFeng Wang:
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. 365-379 - Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley:
Unleashing Mayhem on Binary Code. 380-394 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Clash Attacks on the Verifiability of E-Voting Systems. 395-409
Web Security
- Jonathan R. Mayer, John C. Mitchell:
Third-Party Web Tracking: Policy and Technology. 413-427 - Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna:
EvilSeed: A Guided Approach to Finding Malicious Web Pages. 428-442 - Clemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:
Rozzle: De-cloaking Internet Malware. 443-457
Privacy and Anonymity
- Sadia Afroz, Michael Brennan, Rachel Greenstadt:
Detecting Hoaxes, Frauds, and Deception in Writing Style Online. 461-475 - Masoud Akhoondi, Curtis Yu, Harsha V. Madhyastha:
LASTor: A Low-Latency AS-Aware Tor Client. 476-490 - Ero Balsa, Carmela Troncoso, Claudia Díaz:
OB-PWS: Obfuscation-Based Private Web Search. 491-505 - Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng:
LAP: Lightweight Anonymity and Privacy. 506-520
Passwords
- Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López:
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. 523-537 - Joseph Bonneau:
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. 538-552 - Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. 553-567
System Security
- Jason Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson:
ILR: Where'd My Gadgets Go? 571-585 - Yangchun Fu, Zhiqiang Lin:
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. 586-600 - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. 601-615 - Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune:
Building Verifiable Trusted Path on Commodity x86 Computers. 616-630
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.