18. USENIX Security Symposium 2010:Washington, DC, USA

19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings. USENIX Association 【DBLP Link

Paper Num: 30 || Session Num: 10

Protection Mechanisms 3

1. Adapting Software Fault Isolation to Contemporary CPU Architectures.

Paper Link】 【Pages】:1-12

【Authors】: David Sehr ; Robert Muth ; Cliff Biffle ; Victor Khimenko ; Egor Pasko ; Karl Schimpf ; Bennet Yee ; Brad Chen

【Abstract】:

【Keywords】:

2. Making Linux Protection Mechanisms Egalitarian with UserFS.

Paper Link】 【Pages】:13-28

【Authors】: Taesoo Kim ; Nickolai Zeldovich

【Abstract】:

【Keywords】:

3. Capsicum: Practical Capabilities for UNIX.

Paper Link】 【Pages】:29-46

【Authors】: Robert N. M. Watson ; Jonathan Anderson ; Ben Laurie ; Kris Kennaway

【Abstract】:

【Keywords】:

Privacy 3

4. Structuring Protocol Implementations to Protect Sensitive Data.

Paper Link】 【Pages】:47-62

【Authors】: Petr Marchenko ; Brad Karp

【Abstract】:

【Keywords】:

5. PrETP: Privacy-Preserving Electronic Toll Pricing.

Paper Link】 【Pages】:63-78

【Authors】: Josep Balasch ; Alfredo Rial ; Carmela Troncoso ; Bart Preneel ; Ingrid Verbauwhede ; Christophe Geuens

【Abstract】:

【Keywords】:

6. An Analysis of Private Browsing Modes in Modern Browsers.

Paper Link】 【Pages】:79-94

【Authors】: Gaurav Aggarwal ; Elie Bursztein ; Collin Jackson ; Dan Boneh

【Abstract】:

【Keywords】:

Detection of Network Attacks 3

7. BotGrep: Finding P2P Bots with Structured Graph Analysis.

Paper Link】 【Pages】:95-110

【Authors】: Shishir Nagaraja ; Prateek Mittal ; Chi-Yao Hong ; Matthew Caesar ; Nikita Borisov

【Abstract】:

【Keywords】:

8. Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems.

Paper Link】 【Pages】:111-126

【Authors】: Chad R. Meiners ; Jignesh Patel ; Eric Norige ; Eric Torng ; Alex X. Liu

【Abstract】:

【Keywords】:

9. Searching the Searchers with SearchAudit.

Paper Link】 【Pages】:127-142

【Authors】: John P. John ; Fang Yu ; Yinglian Xie ; Martín Abadi ; Arvind Krishnamurthy

【Abstract】:

【Keywords】:

Dissecting Bugs 3

10. Toward Automated Detection of Logic Vulnerabilities in Web Applications.

Paper Link】 【Pages】:143-160

【Authors】: Viktoria Felmetsger ; Ludovico Cavedon ; Christopher Kruegel ; Giovanni Vigna

【Abstract】:

【Keywords】:

11. Baaz: A System for Detecting Access Control Misconfigurations.

Paper Link】 【Pages】:161-176

【Authors】: Tathagata Das ; Ranjita Bhagwan ; Prasad Naldurg

【Abstract】:

【Keywords】:

12. Cling: A Memory Allocator to Mitigate Dangling Pointers.

Paper Link】 【Pages】:177-192

【Authors】: Periklis Akritidis

【Abstract】:

【Keywords】:

Cryptography 3

13. ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.

Paper Link】 【Pages】:193-206

【Authors】: Sarah Meiklejohn ; C. Christopher Erway ; Alptekin Küpçü ; Theodora Hinkle ; Anna Lysyanskaya

【Abstract】:

【Keywords】:

14. P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.

Paper Link】 【Pages】:207-222

【Authors】: Yitao Duan ; NetEase Youdao ; John Canny ; Justin Z. Zhan

【Abstract】:

【Keywords】:

15. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics.

Paper Link】 【Pages】:223-240

【Authors】: Martin Burkhart ; Mario Strasser ; Dilip Many ; Xenofontas A. Dimitropoulos

【Abstract】:

【Keywords】:

Internet Security 3

16. Dude, Where's That IP? Circumventing Measurement-based IP Geolocation.

Paper Link】 【Pages】:241-256

【Authors】: Phillipa Gill ; Yashar Ganjali ; Bernard Wong ; David Lie

【Abstract】:

【Keywords】:

17. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.

Paper Link】 【Pages】:257-272

【Authors】: Roya Ensafi ; Jong Chun Park ; Deepak Kapur ; Jedidiah R. Crandall

【Abstract】:

【Keywords】:

18. Building a Dynamic Reputation System for DNS.

Paper Link】 【Pages】:273-290

【Authors】: Manos Antonakakis ; Roberto Perdisci ; David Dagon ; Wenke Lee ; Nick Feamster

【Abstract】:

【Keywords】:

Real-World Security 3

19. Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.

Paper Link】 【Pages】:291-306

【Authors】: Richard Carback ; David Chaum ; Jeremy Clark ; John Conway ; Aleksander Essex ; Paul S. Herrnson ; Travis Mayberry ; Stefan Popoveniuc ; Ronald L. Rivest ; Emily Shen ; Alan T. Sherman ; Poorvi L. Vora

【Abstract】:

【Keywords】:

20. Acoustic Side-Channel Attacks on Printers.

Paper Link】 【Pages】:307-322

【Authors】: Michael Backes ; Markus Dürmuth ; Sebastian Gerling ; Manfred Pinkal ; Caroline Sporleder

【Abstract】:

【Keywords】:

21. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.

Paper Link】 【Pages】:323-338

【Authors】: Ishtiaq Rouf ; Robert D. Miller ; Hossen A. Mustafa ; Travis Taylor ; Sangho Oh ; Wenyuan Xu ; Marco Gruteser ; Wade Trappe ; Ivan Seskar

【Abstract】:

【Keywords】:

Web Security 3

22. VEX: Vetting Browser Extensions for Security Vulnerabilities.

Paper Link】 【Pages】:339-354

【Authors】: Sruthi Bandhakavi ; Samuel T. King ; P. Madhusudan ; Marianne Winslett

【Abstract】:

【Keywords】:

23. Securing Script-Based Extensibility in Web Browsers.

Paper Link】 【Pages】:355-370

【Authors】: Vladan Djeric ; Ashvin Goel

【Abstract】:

【Keywords】:

24. AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.

Paper Link】 【Pages】:371-388

【Authors】: Mike Ter Louw ; Karthik Thotta Ganesh ; V. N. Venkatakrishnan

【Abstract】:

【Keywords】:

Securing Systems 3

25. Realization of RF Distance Bounding.

Paper Link】 【Pages】:389-402

【Authors】: Kasper Bonne Rasmussen ; Srdjan Capkun

【Abstract】:

【Keywords】:

26. The Case for Ubiquitous Transport-Level Encryption.

Paper Link】 【Pages】:403-418

【Authors】: Andrea Bittau ; Michael Hamburg ; Mark Handley ; David Mazières ; Dan Boneh

【Abstract】:

【Keywords】:

27. Automatic Generation of Remediation Procedures for Malware Infections.

Paper Link】 【Pages】:419-434

【Authors】: Roberto Paleari ; Lorenzo Martignoni ; Emanuele Passerini ; Drew Davidson ; Matt Fredrikson ; Jonathon T. Giffin ; Somesh Jha

【Abstract】:

【Keywords】:

Using Humans 3

28. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.

Paper Link】 【Pages】:435-462

【Authors】: Marti Motoyama ; Kirill Levchenko ; Chris Kanich ; Damon McCoy ; Geoffrey M. Voelker ; Stefan Savage

【Abstract】:

【Keywords】:

29. Chipping Away at Censorship Firewalls with User-Generated Content.

Paper Link】 【Pages】:463-468

【Authors】: Sam Burnett ; Nick Feamster ; Santosh Vempala

【Abstract】:

【Keywords】:

30. Fighting Coercion Attacks in Key Generation using Skin Conductance.

Paper Link】 【Pages】:469-484

【Authors】: Payas Gupta ; Debin Gao

【Abstract】:

【Keywords】: