default search action
31st SP 2010: Berleley/Oakland, California, USA
- 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA. IEEE Computer Society 2010, ISBN 978-0-7695-4035-1
Invited Papers
- Peter G. Neumann, Matt Bishop, Sean Peisert
, Marv Schaefer:
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. 3-13 - Carl E. Landwehr:
History of US Government Investments in Cybersecurity Research: A Personal Perspective. 14-20 - W. Douglas Maughan:
Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective. 21-26
Malware Analysis
- Clemens Kolbitsch, Thorsten Holz
, Christopher Kruegel, Engin Kirda:
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. 29-44 - Matt Fredrikson
, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan:
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. 45-60 - Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero
:
Identifying Dormant Functionality in Malware Programs. 61-76
Information Flow
- Sardaouna Hamadou, Vladimiro Sassone, Catuscia Palamidessi
:
Reconciling Belief and Vulnerability in Information Flow. 79-92 - Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle:
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. 93-108 - Dominique Devriese
, Frank Piessens:
Noninterference through Secure Multi-execution. 109-124 - Sergio Maffeis
, John C. Mitchell
, Ankur Taly:
Object Capabilities and Isolation of Untrusted Web Applications. 125-140
Root of Trust
- Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. 143-158 - Matthew Hicks
, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith:
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. 159-172 - Adam Waksman, Simha Sethumadhavan:
Tamper Evident Microprocessors. 173-188
Information Abuse
- Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang:
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. 191-206 - Zhiyun Qian
, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. 207-222 - Gilbert Wondracek, Thorsten Holz
, Engin Kirda, Christopher Kruegel:
A Practical Attack to De-anonymize Social Network Users. 223-238 - Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich:
SCiFI - A System for Secure Face Identification. 239-254
Network Security
- Haowen Chan, Adrian Perrig:
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. 257-272 - Allison B. Lewko, Amit Sahai, Brent Waters:
Revocation Systems with Very Small Private Keys. 273-285 - Yao Liu, Peng Ning, Huaiyu Dai:
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. 286-301
Systematization of Knowledge I
- Robin Sommer, Vern Paxson:
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. 305-316 - Edward J. Schwartz, Thanassis Avgerinos, David Brumley:
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). 317-331 - Jason Bau, Elie Bursztein, Divij Gupta, John C. Mitchell
:
State of the Art: Automated Black-Box Web Application Vulnerability Testing. 332-345
Secure Systems
- Deepak Garg, Frank Pfenning:
A Proof-Carrying File System. 349-364 - Jason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri:
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. 365-379 - Zhi Wang, Xuxian Jiang:
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. 380-395
Systematization of Knowledge II
- Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell
, Daniel Jurafsky:
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. 399-413 - Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Commodity Computers. 414-429
Analyzing Deployed Systems
- Steven J. Murdoch
, Saar Drimer, Ross J. Anderson, Mike Bond:
Chip and PIN is Broken. 433-446 - Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. 447-462 - Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee:
On the Incoherencies in Web Browser Access Control Policies. 463-478
Language-Based Security
- Leo A. Meyerovich, V. Benjamin Livshits:
ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser. 481-496 - Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. 497-512 - Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song:
A Symbolic Execution Framework for JavaScript. 513-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.