default search action
23rd USENIX Security Symposium 2014: San Diego, CA, USA
- Kevin Fu, Jaeyeon Jung:
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. USENIX Association 2014
Privacy
- Sebastian Zimmeck, Steven M. Bellovin:
Privee: An Architecture for Automatically Analyzing Web Privacy Policies. 1-16 - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon M. Lin, David Page, Thomas Ristenpart:
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. 17-32 - Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. 33-48 - Mathias Lécuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu:
XRay: Enhancing the Web's Transparency with Differential Correlation. 49-64
Mass Pwnage
- Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
An Internet-Wide View of Internet-Wide Scanning. 65-78 - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon P. Chung, Billy Lau, Wenke Lee:
On the Feasibility of Large-Scale Infections of iOS Devices. 79-93 - Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti:
A Large-Scale Analysis of the Security of Embedded Firmwares. 95-110 - Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. 111-125
Privacy Enhancing Technology
- Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul F. Syverson:
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. 127-142 - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg:
Effective Attacks and Provable Defenses for Website Fingerprinting. 143-157 - Eric Wustrow, Colleen Swanson, J. Alex Halderman:
TapDance: End-to-Middle Anticensorship without Flow Blocking. 159-174 - Omer Tripp, Julia Rubin:
A Bayesian Approach to Privacy Enforcement in Smartphones. 175-190
Crime and Pun.../Measure-ment
- Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan M. Spring, Márk Félegyházi, Chris Kanich:
The Long "Taile" of Typosquatting Domain Names. 191-206 - Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang:
Understanding the Dark Side of Domain Parking. 207-222 - Bimal Viswanath, Muhammad Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, Alan Mislove:
Towards Detecting Anomalous User Behavior in Online Social Networks. 223-238 - Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao:
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 239-254
Forensics
- Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. 255-269 - Hao Shi, Abdulla Alwabel, Jelena Mirkovic:
Cardinal Pill Testing of System Virtual Machines. 271-285 - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel:
BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 287-301 - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley:
Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. 303-317
Attacks and Transparency
- Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson:
On the Practical Exploitability of Dual EC in TLS Implementations. 319-335 - Matthew Brocker, Stephen Checkoway:
iSeeYou: Disabling the MacBook Webcam Indicator LED. 337-352 - Yossef Oren, Angelos D. Keromytis:
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television. 353-368 - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. 369-384
ROP: Return of the %edi
- Nicholas Carlini, David A. Wagner:
ROP is Still Dangerous: Breaking Modern Defenses. 385-399 - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose:
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. 401-416 - Enes Göktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis:
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. 417-432 - Michael Backes, Stefan Nürnberger:
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. 433-447
Safer Sign-Ons
- David Silver, Suman Jana, Dan Boneh, Eric Yawei Chen, Collin Jackson:
Password Managers: Attacks and Defenses. 449-464 - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song:
The Emperor's New Password Manager: Security Analysis of Web-based Password Managers. 465-479 - Landon P. Cox, Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati:
SpanDex: Secure Password Tracking for Android. 481-494 - Yuchen Zhou, David Evans:
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. 495-510
Tracking Targeted Attacks against Civilians and NGOs
- William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson:
When Governments Hack Opponents: A Look at Actors and Technology. 511-525 - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg Wiseman, Phillipa Gill, Ronald J. Deibert:
Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware. 527-541 - Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda:
A Look at Targeted Attacks Through the Lense of an NGO. 543-558
Passwords
- Zhigong Li, Weili Han, Wenyuan Xu:
A Large-Scale Empirical Analysis of Chinese Web Passwords. 559-574 - Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:
Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. 575-590 - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart E. Schechter:
Telepathwords: Preventing Weak Passwords by Reading Users' Minds. 591-606 - Joseph Bonneau, Stuart E. Schechter:
Towards Reliable Storage of 56-bit Secrets in Human Memory. 607-623
Web Security: The Browser Strikes Back
- Kyle Soska, Nicolas Christin:
Automatically Detecting Vulnerable Websites Before They Turn Malicious. 625-640 - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson:
Hulk: Eliciting Malicious Behavior in Browser Extensions. 641-654 - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, Martin Johns:
Precise Client-side Protection against DOM-based Cross-Site Scripting. 655-670 - Nikolaos Karapanos, Srdjan Capkun:
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications. 671-686
Side Channels
- Venkatanathan Varadarajan, Thomas Ristenpart, Michael M. Swift:
Scheduler-based Defenses against Cross-VM Side-channels. 687-702 - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy:
Preventing Cryptographic Key Leakage in Cloud Virtual Machines. 703-718 - Yuval Yarom, Katrina Falkner:
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. 719-732 - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews:
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. 733-748
After Coffee Break Crypto
- Jonathan L. Dautrich Jr., Emil Stefanov, Elaine Shi:
Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns. 749-764 - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos:
TRUESET: Faster Verifiable Set Computations. 765-780 - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza:
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. 781-796 - Benny Pinkas, Thomas Schneider, Michael Zohner:
Faster Private Set Intersection Based on OT Extension. 797-812
Program Analysis: Attack of the Codes
- Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz:
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. 813-828 - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:
X-Force: Force-Executing Binary Programs for Security Applications. 829-844 - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley:
BYTEWEIGHT: Learning to Recognize Functions in Binary Code. 845-860 - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley:
Optimizing Seed Selection for Fuzzing. 861-875
After Lunch Break Crypto
- Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton:
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes. 877-891 - Daniel Demmler, Thomas Schneider, Michael Zohner:
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. 893-908 - Matthew Fredrikson, Benjamin Livshits:
ZØ: An Optimizing Distributing Zero-Knowledge Compiler. 909-924 - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee:
SDDR: Light-Weight, Secure Mobile Encounters. 925-940
Program Analysis: A New Hope
- Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike:
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. 941-955 - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis:
ret2dir: Rethinking Kernel Isolation. 957-972 - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger:
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 973-988 - Johannes Dahse, Thorsten Holz:
Static Detection of Second-Order Vulnerabilities in Web Applications. 989-1003
Mobile Apps and Smart Phones
- Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi:
ASM: A Programmable Interface for Extending Android Security. 1005-1019 - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:
Brahmastra: Driving Apps to Test the Security of Third-Party Components. 1021-1036 - Qi Alfred Chen, Zhiyun Qian, Zhuoqing Morley Mao:
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. 1037-1052 - Yan Michalevsky, Dan Boneh, Gabi Nakibly:
Gyrophone: Recognizing Speech from Gyroscope Signals. 1053-1067
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.