29. S&P 2008:
Oakland,
California,
USA
2008 IEEE Symposium on Security and Privacy (S&P 2008), 18-21 May 2008, Oakland, California, USA.
IEEE Computer Society 2008
- Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao:
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
3-17
- Parvathinathan Venkitasubramaniam, Lang Tong:
Anonymous Networking with Minimum Latency in Multihop Networks.
18-32
- Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson:
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
35-49
- Mudhakar Srivatsa, Ling Liu, Arun Iyengar:
Preserving Caller Anonymity in Voice-over-IP Networks.
50-63
- Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj:
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
64-78
- Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
81-95
- Mythili Vutukuru, Hari Balakrishnan, Vern Paxson:
Efficient and Robust TCP Stream Normalization.
96-110
- Arvind Narayanan, Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets.
111-125
- Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel:
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
129-142
- David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng:
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
143-157
- Michael Backes, Markus Dürmuth, Dominique Unruh:
Compromising Reflections-or-How to Read LCD Monitors around the Corner.
158-169
- Davide Balzarotti, Marco Cova, Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video.
170-183
- Randy Smith, Cristian Estan, Somesh Jha:
XFA: Faster Signature Matching with Extended Automata.
187-201
- Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
202-215
- Somesh Jha, Louis Kruger, Vitaly Shmatikov:
Towards Practical Privacy for Genomic Computation.
216-230
- Bryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee:
Lares: An Architecture for Secure Active Monitoring Using Virtualization.
233-247
- Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar:
Practical Proactive Integrity Preservation: A Basis for Malware Defense.
248-262
- Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, Miguel Castro:
Preventing Memory Error Exploits with WIT.
263-277
- Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing.
281-295
- Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell:
Cloaker: Hardware Supported Rootkit Concealment.
296-310
- Ronald William Smith, George Scott Knight:
Predictable Design of Network-Based Covert Communication Systems.
311-321
- Suhabe Bugrara, Alex Aiken:
Verifying the Safety of User Pointer Dereferences.
325-338
- Anindya Banerjee, David A. Naumann, Stan Rosenberg:
Expressive Declassification Policies and Modular Static Enforcement.
339-353
- Michael R. Clarkson, Stephen Chong, Andrew C. Myers:
Civitas: Toward a Secure Voting System.
354-368
- Nikhil Swamy, Brian J. Corcoran, Michael Hicks:
Fable: A Language for Enforcing User-defined Security Policies.
369-383
- Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
387-401
- Chris Grier, Shuo Tang, Samuel T. King:
Secure Web Browsing with the OP Web Browser.
402-416
- Bruno Blanchet, Avik Chaudhuri:
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage.
417-431
Copyright © Fri Mar 12 17:21:58 2010
by Michael Ley (ley@uni-trier.de)