


default search action
19th USENIX Security Symposium 2010: Washington, DC, USA
- 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings. USENIX Association 2010

Protection Mechanisms
- David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen:

Adapting Software Fault Isolation to Contemporary CPU Architectures. 1-12 - Taesoo Kim, Nickolai Zeldovich:

Making Linux Protection Mechanisms Egalitarian with UserFS. 13-28 - Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:

Capsicum: Practical Capabilities for UNIX. 29-46
Privacy
- Petr Marchenko, Brad Karp:

Structuring Protocol Implementations to Protect Sensitive Data. 47-62 - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens:

PrETP: Privacy-Preserving Electronic Toll Pricing. 63-78 - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh:

An Analysis of Private Browsing Modes in Modern Browsers. 79-94
Detection of Network Attacks
- Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov:

BotGrep: Finding P2P Bots with Structured Graph Analysis. 95-110 - Chad R. Meiners, Jignesh M. Patel, Eric Norige, Eric Torng, Alex X. Liu:

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems. 111-126 - John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy:

Searching the Searchers with SearchAudit. 127-142
Dissecting Bugs
- Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna:

Toward Automated Detection of Logic Vulnerabilities in Web Applications. 143-160 - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg:

Baaz: A System for Detecting Access Control Misconfigurations. 161-176 - Periklis Akritidis:

Cling: A Memory Allocator to Mitigate Dangling Pointers. 177-192
Cryptography
- Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. 193-206 - Yitao Duan, NetEase Youdao, John F. Canny, Justin Z. Zhan:

P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. 207-222 - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas A. Dimitropoulos:

SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. 223-240
Internet Security
- Phillipa Gill, Yashar Ganjali, Bernard Wong, David Lie:

Dude, Where's That IP? Circumventing Measurement-based IP Geolocation. 241-256 - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall:

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. 257-272 - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster:

Building a Dynamic Reputation System for DNS. 273-290
Real-World Security
- Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora:

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. 291-306 - Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder:

Acoustic Side-Channel Attacks on Printers. 307-322 - Ishtiaq Rouf, Robert D. Miller, Hossen Asiful Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar:

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. 323-338
Web Security
- Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett:

VEX: Vetting Browser Extensions for Security Vulnerabilities. 339-354 - Vladan Djeric, Ashvin Goel:

Securing Script-Based Extensibility in Web Browsers. 355-370 - Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkatakrishnan:

AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements. 371-388
Securing Systems
- Kasper Bonne Rasmussen, Srdjan Capkun:

Realization of RF Distance Bounding. 389-402 - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh:

The Case for Ubiquitous Transport-Level Encryption. 403-418 - Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha:

Automatic Generation of Remediation Procedures for Malware Infections. 419-434
Using Humans
- Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:

Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. 435-462 - Sam Burnett, Nick Feamster, Santosh S. Vempala:

Chipping Away at Censorship Firewalls with User-Generated Content. 463-468 - Payas Gupta, Debin Gao:

Fighting Coercion Attacks in Key Generation using Skin Conductance. 469-484

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














