default search action
35th SP 2014: Berkeley, California, USA
- 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4686-0
Session 1: Attacks 1
- Zhou Li, Sumayah A. Alrwais, XiaoFeng Wang, Eihal Alowaisheq:
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections. 3-18 - Sangho Lee, Youngsok Kim, Jangwoo Kim, Jong Kim:
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities. 19-33 - Yuan Tian, Ying Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson:
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API. 34-48 - Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: Cloning EMV Cards with the Pre-play Attack. 49-64
Session 2: SSL/TLS
- Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Tao Wan, Jianping Wu:
When HTTPS Meets CDN: A Case of Authentication in Delegated Service. 67-82 - Lin-Shung Huang, Alex Rice, Erling Ellingsen, Collin Jackson:
Analyzing Forged SSL Certificates in the Wild. 83-97 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Alfredo Pironti, Pierre-Yves Strub:
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS. 98-113 - Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov:
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. 114-129
Session 3: Automation
- Aaron Blankstein, Michael J. Freedman:
Automating Isolation and Least Privilege in Web Services. 133-148 - Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. 149-162 - Steve Kremer, Robert Künnemann:
Automated Analysis of Security Protocols with Global State. 163-178 - Benedikt Schmidt, Ralf Sasse, Cas Cremers, David A. Basin:
Automated Verification of Group Key Agreement Protocols. 179-194
Session 4: Attacks 2
- Nedim Srndic, Pavel Laskov:
Practical Evasion of a Learning-Based Classifier: A Case Study. 197-211 - Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. 212-226 - Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh:
Hacking Blind. 227-242 - Erik Bosman, Herbert Bos:
Framing Signals - A Return to Portable Shellcode. 243-258
Session 5: Systems Security
- James Mickens:
Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains. 261-275 - Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz:
SoK: Automated Software Diversity. 276-291 - John Criswell, Nathan Dautenhahn, Vikram S. Adve:
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. 292-307 - Zongwei Zhou, Miao Yu, Virgil D. Gligor:
Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O. 308-323
Session 6: Privacy and Anonymity
- Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Y. Tsai, Jeannette M. Wing:
Bootstrapping Privacy Compliance in Big Data Systems. 327-342 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. 343-358 - Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, Steven M. Bellovin:
Blind Seer: A Scalable Private DBMS. 359-374 - Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. 375-389
Session 7: Android
- Luyi Xing, Xiaorui Pan, Rui Wang, Kan Yuan, XiaoFeng Wang:
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating. 393-408 - Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, XiaoFeng Wang:
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. 409-423 - Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. 424-439
Session 8: E-Cash
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Secure Multiparty Computations on Bitcoin. 443-458 - Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza:
Zerocash: Decentralized Anonymous Payments from Bitcoin. 459-474 - Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz:
Permacoin: Repurposing Bitcoin Work for Data Preservation. 475-490
Session 8: Miscellaneous
- Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane:
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity. 493-508 - José Lopes, Nuno Neves:
Stopping a Rapid Tornado with a Puff. 509-523 - Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson:
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks. 524-539 - Piotr Mardziel, Mário S. Alvim, Michael W. Hicks, Michael R. Clarkson:
Quantifying Information Flow for Dynamic Secrets. 540-555
Session 9: Attacks 3
- Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, Michael M. Swift:
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG. 559-574 - Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Out of Control: Overcoming Control-Flow Integrity. 575-589 - Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck:
Modeling and Discovering Vulnerabilities with Code Property Graphs. 590-604 - Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion:
SoK: Introspections on Trust and the Semantic Gap. 605-620
Session 10: Secure Computation and Storage
- Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks:
Automating Efficient RAM-Model Secure Computation. 623-638 - Aseem Rastogi, Matthew A. Hammer, Michael Hicks:
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. 655-670
Session 11: Authentication
- Daniel Fett, Ralf Küsters, Guido Schmitz:
An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System. 673-688 - Jerry Ma, Weining Yang, Min Luo, Ninghui Li:
A Study of Probabilistic Password Models. 689-704 - Shrirang Mare, Andres Molina-Markham, Cory Cornelius, Ronald A. Peterson, David Kotz:
ZEBRA: Zero-Effort Bilateral Recurring Authentication. 705-720
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.