


default search action
24th USENIX Security Symposium 2015: Washington, D.C., USA
- Jaeyeon Jung, Thorsten Holz:

24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. USENIX Association 2015
Measurement: We Didn't Start the Fire
- Hadi Asghari, Michael Ciere, Michel J. G. van Eeten:

Post-Mortem of a Zombie: Conficker Cleanup After Six Years. 1-16 - Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. 17-32 - Kyle Soska, Nicolas Christin:

Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. 33-48
Tic-Attack-Toe
- Mathy Vanhoef, Frank Piessens:

All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. 97-112 - Christina Garman, Kenneth G. Paterson, Thyla van der Merwe:

Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. 113-128 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:

Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 129-144
Sock It To Me: TLS No Less
- Joeri de Ruiter, Erik Poll:

Protocol State Fuzzing of TLS Implementations. 193-206 - Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel:

Verified Correctness and Security of OpenSSL HMAC. 207-221 - David Kaloper-Mersinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell:

Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation. 223-238 - Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl:

To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. 239-254
Word Crimes
- Frederico Araujo, Kevin W. Hamlen:

Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. 145-159 - Nicholas Carlini, Antonio Barresi, Mathias Payer, David A. Wagner, Thomas R. Gross:

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. 161-176 - Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:

Automatic Generation of Data-Oriented Exploits. 177-192
Forget Me Not
- Aylin Caliskan Islam, Richard E. Harang, Andrew Liu, Arvind Narayanan, Clare R. Voss, Fabian Yamaguchi, Rachel Greenstadt:

De-anonymizing Programmers via Code Stylometry. 255-270 - Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal:

RAPTOR: Routing Attacks on Privacy in Tor. 271-286 - Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, Srinivas Devadas:

Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. 287-302 - Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem A. Beyah:

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. 303-318
Now You're Just Something That I Used to Code
- David A. Ramos, Dawson R. Engler:

Under-Constrained Symbolic Execution: Correctness Checking for Real Code. 49-64 - Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu:

TaintPipe: Pipelined Symbolic Taint Analysis. 65-80 - Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:

Type Casting Verification: Stopping an Emerging Attack Vector. 81-96
Operating System Security: It's All About the Base
- Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:

Trustworthy Whole-System Provenance for the Linux Kernel. 319-334 - Igor Smolyar, Muli Ben-Yehuda, Dan Tsafrir:

Securing Self-Virtualizing Ethernet Devices. 335-350 - Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:

EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. 351-366
Ace Ventura: PETS Detective
- Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton:

Marionette: A Programmable Network Traffic Obfuscation System. 367-382 - Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman:

CONIKS: Bringing Key Transparency to End Users. 383-398 - Susan E. McGregor, Polina Charters, Tobin Holliday, Franziska Roesner:

Investigating the Computer Security Practices and Needs of Journalists. 399-414
ORAMorama!
- Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:

Constants Count: Practical Improvements to Oblivious RAM. 415-430 - Ashay Rane, Calvin Lin, Mohit Tiwari:

Raccoon: Closing Digital Side-Channels through Obfuscated Execution. 431-446 - Tien Tuan Anh Dinh, Prateek Saxena, Ee-Chien Chang, Beng Chin Ooi, Chunwang Zhang:

M2R: Enabling Stronger Privacy in MapReduce Computation. 447-462
But Maybe All You Need Is Something to Trust
- Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:

Measuring Real-World Accuracies and Biases in Modeling Password Guessability. 463-481 - Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun:

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. 483-498 - Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David A. Wagner, Konstantin Beznosov:

Android Permissions Remystified: A Field Study on Contextual Integrity. 499-514
PELCGB
- Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner:

Phasing: Private Set Intersection Using Permutation-based Hashing. 515-530 - Niklas Büscher, Stefan Katzenbeisser:

Faster Secure Computation through Automatic Parallelization. 531-546 - Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:

The Pythia PRF Service. 547-562
And the Hackers Gonna Hack, Hack, Hack, Hack, Hack
- Gianluca Stringhini, Pierre Mourlanne, Grégoire Jacob, Manuel Egele, Christopher Kruegel, Giovanni Vigna:

EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. 563-578 - Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, Kurt Thomas:

Trends and Lessons from Three Years Fighting Malicious Extensions. 579-593 - Kevin Borgolte, Christopher Kruegel, Giovanni Vigna:

Meerkat: Detecting Website Defacements through Image-based Object Recognition. 595-610
It's a Binary Joke: Either You Get It, or You Don't
- Eui Chul Richard Shin, Dawn Song, Reza Moazzezi:

Recognizing Functions in Binaries with Neural Networks. 611-626 - Shuai Wang, Pei Wang, Dinghao Wu:

Reassembleable Disassembling. 627-642 - Alessandro Di Federico, Amat Cama, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:

How the ELF Ruined Christmas. 643-658
Pain in the App
- Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu:

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 659-674 - Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, Haibing Guan:

You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps. 657-690 - Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky:

Boxify: Full-fledged App Sandboxing for Stock Android. 691-706
Oh, What a Tangled Web We Weave
- Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Hai-Xin Duan, Shuo Chen, Tao Wan, Nicholas Weaver:

Cookies Lack Integrity: Real-World Implications. 707-721 - Sebastian Lekies, Ben Stock, Martin Wentzel, Martin Johns:

The Unexpected Dangers of Dynamic JavaScript. 723-735 - Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:

ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. 737-752
The World's Address: An App That's Worn
- Kassem Fawaz, Huan Feng, Kang G. Shin:

Anatomization and Protection of Mobile Apps' Location Privacy Threats. 753-768 - Huan Feng, Kassem Fawaz, Kang G. Shin:

LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors. 769-783 - Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, Gabi Nakibly:

PowerSpy: Location Tracking Using Mobile Device Power Analysis. 785-800
ADDioS!
- Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri:

In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services. 801-816 - Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael D. Bailey:

Bohatei: Flexible and Elastic DDoS Defense. 817-832 - Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:

Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. 833-848
Attacks: I Won't Let You Down
- Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, Yuval Elovici:

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. 849-864 - Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:

Thermal Covert Channels on Multi-core Platforms. 865-880 - Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim:

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. 881-896
How Do You Secure a Cloud and Pin It Down?
- Daniel Gruss, Raphael Spreitzer, Stefan Mangard:

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. 897-912 - Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:

A Placement Vulnerability Study in Multi-Tenant Public Clouds. 913-928 - Zhang Xu, Haining Wang, Zhenyu Wu:

A Measurement Study on Co-residence Threat inside the Cloud. 929-944
Knock Knock. Who's There? Icy. Icy Who? I See You Too
- Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, Peng Liu:

Towards Discovering and Understanding Task Hijacking in Android. 945-959 - Michael Mitchell, An-I Andy Wang, Peter L. Reiher:

Cashtags: Protecting the Input and Display of Sensitive Data. 961-976 - Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang:

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. 977-992 - Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:

UIPicker: User-Input Privacy Identification in Mobile Applications. 993-1008
How Do You Solve a Problem Like M-al-ware?
- Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael D. Bailey, Mingyan Liu:

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. 1009-1024 - Terry Nelms, Roberto Perdisci

, Manos Antonakakis, Mustaque Ahamad:
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths. 1025-1040 - Carl Sabottke, Octavian Suciu, Tudor Dumitras:

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. 1041-1056 - Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, Davide Balzarotti:

Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. 1057-1072

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














