default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp2008.bht:"
@inproceedings{DBLP:conf/sp/AkritidisCRCC08, author = {Periklis Akritidis and Cristian Cadar and Costin Raiciu and Manuel Costa and Miguel Castro}, title = {Preventing Memory Error Exploits with {WIT}}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {263--277}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.30}, doi = {10.1109/SP.2008.30}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/AkritidisCRCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesDU08, author = {Michael Backes and Markus D{\"{u}}rmuth and Dominique Unruh}, title = {Compromising Reflections-or-How to Read {LCD} Monitors around the Corner}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {158--169}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.25}, doi = {10.1109/SP.2008.25}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesDU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesMU08, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {202--215}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.23}, doi = {10.1109/SP.2008.23}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesMU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalzarottiCFJKKV08, author = {Davide Balzarotti and Marco Cova and Viktoria Felmetsger and Nenad Jovanovic and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {387--401}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.22}, doi = {10.1109/SP.2008.22}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BalzarottiCFJKKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalzarottiCV08, author = {Davide Balzarotti and Marco Cova and Giovanni Vigna}, title = {ClearShot: Eavesdropping on Keyboard Input from Video}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {170--183}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.28}, doi = {10.1109/SP.2008.28}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BalzarottiCV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BanerjeeNR08, author = {Anindya Banerjee and David A. Naumann and Stan Rosenberg}, title = {Expressive Declassification Policies and Modular Static Enforcement}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {339--353}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.20}, doi = {10.1109/SP.2008.20}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BanerjeeNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlanchetC08, author = {Bruno Blanchet and Avik Chaudhuri}, title = {Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {417--431}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.12}, doi = {10.1109/SP.2008.12}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlanchetC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyPSZ08, author = {David Brumley and Pongsin Poosankam and Dawn Xiaodong Song and Jiang Zheng}, title = {Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {143--157}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.17}, doi = {10.1109/SP.2008.17}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyPSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BugraraA08, author = {Suhabe Bugrara and Alex Aiken}, title = {Verifying the Safety of User Pointer Dereferences}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {325--338}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.15}, doi = {10.1109/SP.2008.15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BugraraA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ClarksonCM08, author = {Michael R. Clarkson and Stephen Chong and Andrew C. Myers}, title = {Civitas: Toward a Secure Voting System}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {354--368}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.32}, doi = {10.1109/SP.2008.32}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ClarksonCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CretuSLSK08, author = {Gabriela F. Cretu and Angelos Stavrou and Michael E. Locasto and Salvatore J. Stolfo and Angelos D. Keromytis}, title = {Casting out Demons: Sanitizing Training Data for Anomaly Sensors}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {81--95}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.11}, doi = {10.1109/SP.2008.11}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CretuSLSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DavidCCC08, author = {Francis M. David and Ellick Chan and Jeffrey C. Carlyle and Roy H. Campbell}, title = {Cloaker: Hardware Supported Rootkit Concealment}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {296--310}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.8}, doi = {10.1109/SP.2008.8}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DavidCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DrimerMA08, author = {Saar Drimer and Steven J. Murdoch and Ross J. Anderson}, title = {Thinking Inside the Box: System-Level Failures of Tamper Proofing}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {281--295}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.16}, doi = {10.1109/SP.2008.16}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DrimerMA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrierTK08, author = {Chris Grier and Shuo Tang and Samuel T. King}, title = {Secure Web Browsing with the {OP} Web Browser}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {402--416}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.19}, doi = {10.1109/SP.2008.19}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GrierTK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HalperinHRCDMFKM08, author = {Daniel Halperin and Thomas S. Heydt{-}Benjamin and Benjamin Ransford and Shane S. Clark and Benessa Defend and Will Morgan and Kevin Fu and Tadayoshi Kohno and William H. Maisel}, title = {Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {129--142}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.31}, doi = {10.1109/SP.2008.31}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HalperinHRCDMFKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JhaKS08, author = {Somesh Jha and Louis Kruger and Vitaly Shmatikov}, title = {Towards Practical Privacy for Genomic Computation}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {216--230}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.34}, doi = {10.1109/SP.2008.34}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JhaKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NarayananS08, author = {Arvind Narayanan and Vitaly Shmatikov}, title = {Robust De-anonymization of Large Sparse Datasets}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {111--125}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.33}, doi = {10.1109/SP.2008.33}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/NarayananS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PayneCSL08, author = {Bryan D. Payne and Martim Carbone and Monirul Islam Sharif and Wenke Lee}, title = {Lares: An Architecture for Secure Active Monitoring Using Virtualization}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {233--247}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.24}, doi = {10.1109/SP.2008.24}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/PayneCSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SmithEJ08, author = {Randy Smith and Cristian Estan and Somesh Jha}, title = {{XFA:} Faster Signature Matching with Extended Automata}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {187--201}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.14}, doi = {10.1109/SP.2008.14}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SmithEJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SmithK08, author = {Ronald William Smith and George Scott Knight}, title = {Predictable Design of Network-Based Covert Communication Systems}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {311--321}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.26}, doi = {10.1109/SP.2008.26}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SmithK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SrivatsaLI08, author = {Mudhakar Srivatsa and Ling Liu and Arun Iyengar}, title = {Preserving Caller Anonymity in Voice-over-IP Networks}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {50--63}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.10}, doi = {10.1109/SP.2008.10}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SrivatsaLI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StrasserPCC08, author = {Mario Strasser and Christina P{\"{o}}pper and Srdjan Capkun and Mario Cagalj}, title = {Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {64--78}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.9}, doi = {10.1109/SP.2008.9}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/StrasserPCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SunSPK08, author = {Weiqing Sun and R. Sekar and Gaurav Poothia and Tejas Karandikar}, title = {Practical Proactive Integrity Preservation: {A} Basis for Malware Defense}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {248--262}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.35}, doi = {10.1109/SP.2008.35}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SunSPK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SwamyCH08, author = {Nikhil Swamy and Brian J. Corcoran and Michael Hicks}, title = {Fable: {A} Language for Enforcing User-defined Security Policies}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {369--383}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.29}, doi = {10.1109/SP.2008.29}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SwamyCH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VenkitasubramaniamT08, author = {Parvathinathan Venkitasubramaniam and Lang Tong}, title = {Anonymous Networking with Minimum Latency in Multihop Networks}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.18}, doi = {10.1109/SP.2008.18}, timestamp = {Tue, 09 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/VenkitasubramaniamT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VutukuruBP08, author = {Mythili Vutukuru and Hari Balakrishnan and Vern Paxson}, title = {Efficient and Robust {TCP} Stream Normalization}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {96--110}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.27}, doi = {10.1109/SP.2008.27}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/VutukuruBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WrightBCMM08, author = {Charles V. Wright and Lucas Ballard and Scott E. Coull and Fabian Monrose and Gerald M. Masson}, title = {Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {35--49}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.21}, doi = {10.1109/SP.2008.21}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WrightBCMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YuGKX08, author = {Haifeng Yu and Phillip B. Gibbons and Michael Kaminsky and Feng Xiao}, title = {SybilLimit: {A} Near-Optimal Social Network Defense against Sybil Attacks}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.13}, doi = {10.1109/SP.2008.13}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YuGKX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2008, title = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4531131/proceeding}, isbn = {978-0-7695-3168-7}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.