default search action
34th SP 2013: Berkeley, California, USA
- 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6166-8
- Catalin Hritcu, Michael Greenberg, Ben Karel, Benjamin C. Pierce, Greg Morrisett:
All Your IFCException Are Belong to Us. 3-17 - William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson, Robert N. M. Watson:
Declarative, Temporal, and Practical Programming with Capabilities. 18-32 - Julien Vanegue, Shuvendu K. Lahiri:
Towards Practical Reactive Security Audit Using Extended Static Checkers. 33-47 - Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song:
SoK: Eternal War in Memory. 48-62 - Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov:
The Parrot Is Dead: Observing Unobservable Network Communications. 65-79 - Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. 80-94 - Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos:
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. 97-111 - Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. 112-126 - Min Suk Kang, Soo Bum Lee, Virgil D. Gligor:
The Crossfire Attack. 127-141 - Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. 145-159 - Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun:
On Limitations of Friendly Jamming for Confidentiality. 160-173 - Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai:
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. 174-188 - Ralf Hund, Carsten Willems, Thorsten Holz:
Practical Timing Side Channel Attacks against Kernel Space ASLR. 191-205 - Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. 206-220 - Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish:
A Hybrid Architecture for Interactive Verifiable Computation. 223-237 - Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. 238-252 - Emil Stefanov, Elaine Shi:
ObliviStore: High Performance Oblivious Cloud Storage. 253-267 - Yinglei Wang, Wing-Kei S. Yu, Sarah Q. Xu, Edwin Kan, G. Edward Suh:
Hiding Information in Flash Memory. 271-285 - Ulrich Rührmair, Marten van Dijk:
PUFs in Security Protocols: Attack Models and Security Evaluations. 286-300 - Joel Reardon, David A. Basin, Srdjan Capkun:
SoK: Secure Data Deletion. 301-315 - Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, Jonathan Katz:
Anon-Pass: Practical Anonymous Subscriptions. 319-333 - Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. 334-348 - Suman Jana, Arvind Narayanan, Vitaly Shmatikov:
A Scanner Darkly: Protecting User Privacy from Perceptual Applications. 349-363 - Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. 367-381 - Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi:
SoK: The Evolution of Sybil Defense via Social Networks. 382-396 - Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin:
Zerocoin: Anonymous Distributed E-Cash from Bitcoin. 397-411 - Toby C. Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein:
seL4: From General Purpose to a Proof of Information Flow Enforcement. 415-429 - Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. 430-444 - Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub:
Implementing TLS with Verified Cryptographic Security. 445-459 - Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. 463-477 - Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway:
Efficient Garbling from a Fixed-Key Blockcipher. 478-492 - Samee Zahur, David Evans:
Circuit Structures for Improving Efficiency of Security and Privacy Tools. 493-507 - Jeremy Clark, Paul C. van Oorschot:
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. 511-525 - Nadhem J. AlFardan, Kenneth G. Paterson:
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. 526-540 - Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. 541-555 - Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou:
Practical Control Flow Integrity and Randomization for Binary Executables. 559-573 - Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Ahmad-Reza Sadeghi:
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. 574-588 - Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson:
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices. 589-603
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.