![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
20th USENIX Security Symposium 2011: San Francisco, CA, USA
- 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. USENIX Association 2011
Web Security
- Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes:
Fast and Precise Sanitizer Analysis with BEK. - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein:
Toward Secure Embedded Web Interfaces. - Charlie Curtsinger, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:
ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.
Analysis of Deployed Systems
- Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze:
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System. - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar R. Weippl:
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Forensic Analysis
- Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine:
Forensic Triage for Mobile Phones with DEC0DE. - Ton van Deursen, Sjouke Mauw, Sasa Radomirovic:
mCarve: Carving Attributed Dump Sets. - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos:
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
Static and Dynamic Analysis
- Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song:
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery. - Fangqi Sun, Liang Xu, Zhendong Su:
Static Detection of Access Control Vulnerabilities in Web Applications. - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi:
ADsafety: Type-Based Verification of JavaScript Sandboxing.
Understanding the Underground Economy
- Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson:
Measuring Pay-per-Install: The Commoditization of Malware Distribution. - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker:
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker, Stefan Savage:
Show Me the Money: Characterizing Spam-advertised Revenue.
Defenses and New Directions
- Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi:
Secure In-Band Wireless Pairing. - Tilo Müller, Felix C. Freiling, Andreas Dewald:
TRESOR Runs Encryption Securely Outside RAM. - Joseph A. Calandrino, William Clarkson, Edward W. Felten:
Bubble Trouble: Off-Line De-Anonymization of Bubble Forms.
Securing Search
- Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
deSEO: Combating Search-Result Poisoning.
Securing Smart Phones
- William Enck, Damien Octeau, Patrick D. McDaniel, Swarat Chaudhuri:
A Study of Android Application Security. - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin:
Permission Re-Delegation: Attacks and Defenses. - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach:
QUIRE: Lightweight Provenance for Smart Phone Operating Systems.
Understanding Attacks
- Collin Mulliner, Nico Golde, Jean-Pierre Seifert:
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. - Edward J. Schwartz, Thanassis Avgerinos, David Brumley:
Q: Exploit Hardening Made Easy. - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel:
Cloaking Malware with the Trusted Platform Module.
Dealing with Malware and Bots
- Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, David Dagon:
Detecting Malware Domains at the Upper DNS Hierarchy. - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
BOTMAGNIFIER: Locating Spambots on the Internet. - Grégoire Jacob, Ralf Hund, Christopher Kruegel, Thorsten Holz:
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
Privacy- and Freedom-Enhancing Technologies
- Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman:
Telex: Anticensorship in the Network Infrastructure. - Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg:
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham:
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Applied Cryptography
- Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan:
Differential Privacy Under Fire. - Matthew Green, Susan Hohenberger, Brent Waters:
Outsourcing the Decryption of ABE Ciphertexts. - Yan Huang, David Evans, Jonathan Katz, Lior Malka:
Faster Secure Two-Party Computation Using Garbled Circuits.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.