default search action
17th USENIX Security Symposium 2008: San Jose, California, USA
- Paul C. van Oorschot:
Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA. USENIX Association 2008, ISBN 978-1-931971-60-7
Web Security
- Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose:
All Your iFRAMEs Point to Us. 1-16 - Adam Barth, Collin Jackson, John C. Mitchell:
Securing Frame Communication in Browsers. 17-30 - Michael C. Martin, Monica S. Lam:
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking. 31-44
Cryptographic Keys
- J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest We Remember: Cold Boot Attacks on Encryption Keys. 45-60 - Lucas Ballard, Seny Kamara, Michael K. Reiter:
The Practical Subtleties of Biometric Key Generation. 61-74 - Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. 75-90
Network Defenses
- Jon Oberheide, Evan Cooke, Farnam Jahanian:
CloudAV: N-Version Antivirus in the Network Cloud. 91-106 - Jian Zhang, Phillip A. Porras, Johannes Ullrich:
Highly Predictive Blacklisting. 107-122 - Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck:
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks. 123-138
Botnet Detection
- Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. 139-154 - Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang:
Measurement and Classification of Humans and Bots in Internet Chat. 155-170 - Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield:
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. 171-184
Hardware and Security
- Karsten Nohl, David Evans, Starbug, Henryk Plötz:
Reverse-Engineering a Cryptographic RFID Tag. 185-194 - Owen Harrison, John Waldron:
Practical Symmetric Key Cryptography on Modern Graphics Hardware. 195-210 - Sebastian Zander, Steven J. Murdoch:
An Improved Clock-skew Measurement Technique for Revealing Hidden Services. 211-226
Systems Security
- Manigandan Radhakrishnan, Jon A. Solworth:
NetAuth: Supporting User-Based Network Services. 227-242 - Lionel Litty, H. Andrés Lagar-Cavilla, David Lie:
Hypervisor Support for Identifying Covertly Executing Binaries. 243-258 - Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok:
Selective Versioning in a Secure Disk System. 259-274
Privacy
- Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno:
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. 275-290 - Rui Wang, XiaoFeng Wang, Zhuowei Li:
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . 291-306 - Negar Kiyavash, Amir Houmansadr, Nikita Borisov:
Multi-flow Attacks Against Network Flow Watermarking Schemes. 307-320
Voting and Trusted Systems
- Sandra Julieta Rueda, Dave King, Trent Jaeger:
Verifying Compliance of Trusted Programs. 321-334 - Ben Adida:
Helios: Web-based Open-Audit Voting. 335-348 - Daniel Sandler, Kyle Derr, Dan S. Wallach:
VoteBox: A Tamper-evident, Verifiable Electronic Voting System. 349-364
Software Security
- Gang Tan, Jason Croft:
An Empirical Security Study of the Native Code in the JDK. 365-378 - Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou:
AutoISES: Automatically Inferring Security Specification and Detecting Violations. 379-394 - Michael Dalton, Hari Kannan, Christos Kozyrakis:
Real-World Buffer Overflow Protection for Userspace and Kernelspace. 395-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.