


default search action
33rd SP 2012: San Francisco, California, USA
- IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA. IEEE Computer Society 2012, ISBN 978-0-7695-4681-0

System Security
- Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang

, Wei Zou:
A Framework to Eliminate Backdoors from Response-Computable Authentication. 3-17 - Mathias Payer, Tobias Hartmann, Thomas R. Gross:

Safe Loading - A Foundation for Secure Execution of Untrusted Programs. 18-32 - Yinglei Wang, Wing-Kei S. Yu, Shuo Wu, Greg Malysa, G. Edward Suh

, Edwin Kan:
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints. 33-47 - Jiyong Jang, Abeer Agrawal, David Brumley

:
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. 48-62
Malware
- Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos

, Maarten van Steen
:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79 - Suman Jana, Vitaly Shmatikov:

Abusing File Processing in Malware Detectors for Fun and Profit. 80-94 - Yajin Zhou, Xuxian Jiang:

Dissecting Android Malware: Characterization and Evolution. 95-109
Attacks 1
- Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:

Distance Hijacking Attacks on Distance Bounding Protocols. 113-127 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz

:
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards. 128-142 - Suman Jana, Vitaly Shmatikov:

Memento: Learning Secrets from Process Footprints. 143-157
Foundations
- Moritz Y. Becker, Alessandra Russo

, Nik Sultana:
Foundations of Logic-Based Trust Management. 161-175 - Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:

Formalizing and Enforcing Purpose Restrictions in Privacy Policies. 176-190 - Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers:

Sharing Mobile Code Securely with Information Flow Control. 191-205
Access Control and Attestation
- Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta S. Byrne:

The Psychology of Security for the Home Computer User. 209-223 - Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. 224-238 - Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth:

New Results for Timing-Based Attestation. 239-253
Privacy
- Michael Backes, Aniket Kate

, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. 257-271 - Yan Huang, Jonathan Katz, David Evans

:
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. 272-284 - Emiliano De Cristofaro, Claudio Soriente

, Gene Tsudik, Andrew Williams:
Hummingbird: Privacy at the Time of Twitter. 285-299 - Arvind Narayanan, Hristo S. Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song:

On the Feasibility of Internet-Scale Author Identification. 300-314
Network Security
- Xin Zhang, Chang Lan, Adrian Perrig:

Secure and Scalable Fault Localization under Dynamic Traffic Patterns. 317-331 - Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton:

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. 332-346 - Zhiyun Qian

, Zhuoqing Morley Mao:
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. 347-361
Attacks 2
- Rui Wang, Shuo Chen, XiaoFeng Wang:

Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. 365-379 - Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert, David Brumley

:
Unleashing Mayhem on Binary Code. 380-394 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:

Clash Attacks on the Verifiability of E-Voting Systems. 395-409
Web Security
- Jonathan R. Mayer, John C. Mitchell

:
Third-Party Web Tracking: Policy and Technology. 413-427 - Luca Invernizzi, Paolo Milani Comparetti, Stefano Benvenuti, Christopher Kruegel, Marco Cova, Giovanni Vigna:

EvilSeed: A Guided Approach to Finding Malicious Web Pages. 428-442 - Clemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:

Rozzle: De-cloaking Internet Malware. 443-457
Privacy and Anonymity
- Sadia Afroz, Michael Brennan, Rachel Greenstadt:

Detecting Hoaxes, Frauds, and Deception in Writing Style Online. 461-475 - Masoud Akhoondi, Curtis Yu, Harsha V. Madhyastha:

LASTor: A Low-Latency AS-Aware Tor Client. 476-490 - Ero Balsa, Carmela Troncoso

, Claudia Díaz:
OB-PWS: Obfuscation-Based Private Web Search. 491-505 - Hsu-Chun Hsiao

, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada
, Samuel C. Nelson, Marco Gruteser, Wei Meng:
LAP: Lightweight Anonymity and Privacy. 506-520
Passwords
- Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer

, Nicolas Christin
, Lorrie Faith Cranor
, Julio C. López:
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. 523-537 - Joseph Bonneau:

The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. 538-552 - Joseph Bonneau, Cormac Herley, Paul C. van Oorschot

, Frank Stajano:
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. 553-567
System Security
- Jason Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, Jack W. Davidson:

ILR: Where'd My Gadgets Go? 571-585 - Yangchun Fu, Zhiqiang Lin:

Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. 586-600 - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:

Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. 601-615 - Zongwei Zhou, Virgil D. Gligor, James Newsome, Jonathan M. McCune:

Building Verifiable Trusted Path on Commodity x86 Computers. 616-630

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














