


default search action
18th USENIX Security Symposium 2009: Montreal, Canada
- Fabian Monrose:

18th USENIX Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings. USENIX Association 2009, ISBN 978-1-931971-69-0
Attacks on Privacy
- Martin Vuagnoux, Sylvain Pasini:

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. 1-16 - Kehuan Zhang, XiaoFeng Wang:

Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. 17-32 - Nathan S. Evans, Roger Dingledine, Christian Grothoff:

A Practical Congestion Attack on Tor Using Long Paths. 33-50
Memory Safety
- Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand:

Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. 51-66 - David Molnar, Xue Cong Li, David A. Wagner:

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs. 67-82 - John Criswell, Nicolas Geoffray, Vikram S. Adve:

Memory Safety for Low-Level Software/Hardware Interactions. 83-100
Network Security
- Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser:

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. 101-118 - Joel Reardon, Ian Goldberg:

Improving Tor using a TCP-over-DTLS Tunnel. 119-134 - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani:

Locating Prefix Hijackers using LOCK. 135-150
JavaScript Security
- Salvatore Guarnieri, V. Benjamin Livshits:

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. 151-168 - Paruj Ratanaworabhan, V. Benjamin Livshits, Benjamin G. Zorn:

NOZZLE: A Defense Against Heap-spraying Code Injection Attacks. 169-186 - Adam Barth, Joel Weinberger, Dawn Song:

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense. 187-198
Radio
- Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun:

Physical-layer Identification of RFID Devices. 199-214 - Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels:

CCCP: Secure Remote Storage for Computational RFIDs. 215-230 - Christina Pöpper, Mario Strasser, Srdjan Capkun:

Jamming-resistant Broadcast Communication without Shared Keys. 231-248
Securing Web Apps
- Kapil Singh, Sumeer Bhola, Wenke Lee:

xBook: Redesigning Privacy Control in Social Networking Platforms. 249-266 - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich:

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. 267-282 - William K. Robertson, Giovanni Vigna:

Static Enforcement of Web Application Integrity Through Strong Typing. 283-298
Applied Crypto
- Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy:

Vanish: Increasing Data Privacy with Self-Destructing Data. 299-316 - Scott A. Crosby, Dan S. Wallach:

Efficient Data Structures For Tamper-Evident Logging. 317-334 - Raluca A. Popa, Hari Balakrishnan, Andrew J. Blumberg:

VPriv: Protecting Privacy in Location-Based Vehicular Services. 335-350
Malware Detection and Protection
- Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, XiaoFeng Wang:

Effective and Efficient Malware Detection at the End Host. 351-366 - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash:

Protecting Confidential Data on Personal Computers with Storage Capsules. 367-382 - Ralf Hund, Thorsten Holz, Felix C. Freiling:

Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. 383-398
Browser Security
- Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor:

Crying Wolf: An Empirical Study of SSL Warning Effectiveness. 399-416 - Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter:

The Multi-Principal OS Construction of the Gazelle Web Browser. 417-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














