17. CCS 2010: Chicago, Illinois, USA

Security analysis

System security

Wireless and phone security

Applied cryptography I

Passwords and CAPTCHAs


Attacks on secure hardware

Information flow

Anonymity networks

Formal methods


Applied cryptography II

Cryptographic protocols

Memory safety and binary code

Web security

Demo presentations

Poster presentations

maintained by Schloss Dagstuhl LZI at University of Trier