20. USENIX Security Symposium 2011:San Francisco, CA, USA

20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. USENIX Association 【DBLP Link

Paper Num: 35 || Session Num: 12

Web Security 3

1. Fast and Precise Sanitizer Analysis with BEK.

Paper Link】 【Pages】:

【Authors】: Pieter Hooimeijer ; Benjamin Livshits ; David Molnar ; Prateek Saxena ; Margus Veanes

【Abstract】:

【Keywords】:

2. Toward Secure Embedded Web Interfaces.

Paper Link】 【Pages】:

【Authors】: Baptiste Gourdin ; Chinmay Soman ; Hristo Bojinov ; Elie Bursztein

【Abstract】:

【Keywords】:

3. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.

Paper Link】 【Pages】:

【Authors】: Charlie Curtsinger ; Benjamin Livshits ; Benjamin G. Zorn ; Christian Seifert

【Abstract】:

【Keywords】:

Analysis of Deployed Systems 3

4. Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.

Paper Link】 【Pages】:

【Authors】: Sandy Clark ; Travis Goodspeed ; Perry Metzger ; Zachary Wasserman ; Kevin Xu ; Matt Blaze

【Abstract】:

【Keywords】:

5. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.

Paper Link】 【Pages】:

【Authors】: Martin Mulazzani ; Sebastian Schrittwieser ; Manuel Leithner ; Markus Huber ; Edgar R. Weippl

【Abstract】:

【Keywords】:

6. Comprehensive Experimental Analyses of Automotive Attack Surfaces.

Paper Link】 【Pages】:

【Authors】: Stephen Checkoway ; Damon McCoy ; Brian Kantor ; Danny Anderson ; Hovav Shacham ; Stefan Savage ; Karl Koscher ; Alexei Czeskis ; Franziska Roesner ; Tadayoshi Kohno

【Abstract】:

【Keywords】:

Forensic Analysis 3

7. Forensic Triage for Mobile Phones with DEC0DE.

Paper Link】 【Pages】:

【Authors】: Robert J. Walls ; Erik G. Learned-Miller ; Brian Neil Levine

【Abstract】:

【Keywords】:

8. mCarve: Carving Attributed Dump Sets.

Paper Link】 【Pages】:

【Authors】: Ton van Deursen ; Sjouke Mauw ; Sasa Radomirovic

【Abstract】:

【Keywords】:

9. SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.

Paper Link】 【Pages】:

【Authors】: Kevin Z. Snow ; Srinivas Krishnan ; Fabian Monrose ; Niels Provos

【Abstract】:

【Keywords】:

Static and Dynamic Analysis 3

10. MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.

Paper Link】 【Pages】:

【Authors】: Chia Yuan Cho ; Domagoj Babic ; Pongsin Poosankam ; Kevin Zhijie Chen ; Edward XueJun Wu ; Dawn Song

【Abstract】:

【Keywords】:

11. Static Detection of Access Control Vulnerabilities in Web Applications.

Paper Link】 【Pages】:

【Authors】: Fangqi Sun ; Liang Xu ; Zhendong Su

【Abstract】:

【Keywords】:

12. ADsafety: Type-Based Verification of JavaScript Sandboxing.

Paper Link】 【Pages】:

【Authors】: Joe Gibbs Politz ; Spiridon Aristides Eliopoulos ; Arjun Guha ; Shriram Krishnamurthi

【Abstract】:

【Keywords】:

Understanding the Underground Economy 3

13. Measuring Pay-per-Install: The Commoditization of Malware Distribution.

Paper Link】 【Pages】:

【Authors】: Juan Caballero ; Chris Grier ; Christian Kreibich ; Vern Paxson

【Abstract】:

【Keywords】:

14. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse.

Paper Link】 【Pages】:

【Authors】: Marti Motoyama ; Damon McCoy ; Kirill Levchenko ; Stefan Savage ; Geoffrey M. Voelker

【Abstract】:

【Keywords】:

15. Show Me the Money: Characterizing Spam-advertised Revenue.

Paper Link】 【Pages】:

【Authors】: Chris Kanich ; Nicholas Weaver ; Damon McCoy ; Tristan Halvorson ; Christian Kreibich ; Kirill Levchenko ; Vern Paxson ; Geoffrey M. Voelker ; Stefan Savage

【Abstract】:

【Keywords】:

Defenses and New Directions 3

16. Secure In-Band Wireless Pairing.

Paper Link】 【Pages】:

【Authors】: Shyamnath Gollakota ; Nabeel Ahmed ; Nickolai Zeldovich ; Dina Katabi

【Abstract】:

【Keywords】:

17. TRESOR Runs Encryption Securely Outside RAM.

Paper Link】 【Pages】:

【Authors】: Tilo Müller ; Felix C. Freiling ; Andreas Dewald

【Abstract】:

【Keywords】:

18. Bubble Trouble: Off-Line De-Anonymization of Bubble Forms.

Paper Link】 【Pages】:

【Authors】: Joseph A. Calandrino ; William Clarkson ; Edward W. Felten

【Abstract】:

【Keywords】:

19. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.

Paper Link】 【Pages】:

【Authors】: Nektarios Leontiadis ; Tyler Moore ; Nicolas Christin

【Abstract】:

【Keywords】:

20. deSEO: Combating Search-Result Poisoning.

Paper Link】 【Pages】:

【Authors】: John P. John ; Fang Yu ; Yinglian Xie ; Arvind Krishnamurthy ; Martín Abadi

【Abstract】:

【Keywords】:

Securing Smart Phones 3

21. A Study of Android Application Security.

Paper Link】 【Pages】:

【Authors】: William Enck ; Damien Octeau ; Patrick D. McDaniel ; Swarat Chaudhuri

【Abstract】:

【Keywords】:

22. Permission Re-Delegation: Attacks and Defenses.

Paper Link】 【Pages】:

【Authors】: Adrienne Porter Felt ; Helen J. Wang ; Alexander Moshchuk ; Steve Hanna ; Erika Chin

【Abstract】:

【Keywords】:

23. QUIRE: Lightweight Provenance for Smart Phone Operating Systems.

Paper Link】 【Pages】:

【Authors】: Michael Dietz ; Shashi Shekhar ; Yuliy Pisetsky ; Anhei Shu ; Dan S. Wallach

【Abstract】:

【Keywords】:

Understanding Attacks 3

24. SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.

Paper Link】 【Pages】:

【Authors】: Collin Mulliner ; Nico Golde ; Jean-Pierre Seifert

【Abstract】:

【Keywords】:

25. Q: Exploit Hardening Made Easy.

Paper Link】 【Pages】:

【Authors】: Edward J. Schwartz ; Thanassis Avgerinos ; David Brumley

【Abstract】:

【Keywords】:

26. Cloaking Malware with the Trusted Platform Module.

Paper Link】 【Pages】:

【Authors】: Alan M. Dunn ; Owen S. Hofmann ; Brent Waters ; Emmett Witchel

【Abstract】:

【Keywords】:

Dealing with Malware and Bots 3

27. Detecting Malware Domains at the Upper DNS Hierarchy.

Paper Link】 【Pages】:

【Authors】: Manos Antonakakis ; Roberto Perdisci ; Wenke Lee ; Nikolaos Vasiloglou II ; David Dagon

【Abstract】:

【Keywords】:

28. BOTMAGNIFIER: Locating Spambots on the Internet.

Paper Link】 【Pages】:

【Authors】: Gianluca Stringhini ; Thorsten Holz ; Brett Stone-Gross ; Christopher Kruegel ; Giovanni Vigna

【Abstract】:

【Keywords】:

29. JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.

Paper Link】 【Pages】:

【Authors】: Grégoire Jacob ; Ralf Hund ; Christopher Kruegel ; Thorsten Holz

【Abstract】:

【Keywords】:

Privacy- and Freedom-Enhancing Technologies 3

30. Telex: Anticensorship in the Network Infrastructure.

Paper Link】 【Pages】:

【Authors】: Eric Wustrow ; Scott Wolchok ; Ian Goldberg ; J. Alex Halderman

【Abstract】:

【Keywords】:

31. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.

Paper Link】 【Pages】:

【Authors】: Prateek Mittal ; Femi G. Olumofin ; Carmela Troncoso ; Nikita Borisov ; Ian Goldberg

【Abstract】:

【Keywords】:

32. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.

Paper Link】 【Pages】:

【Authors】: Sarah Meiklejohn ; Keaton Mowery ; Stephen Checkoway ; Hovav Shacham

【Abstract】:

【Keywords】:

Applied Cryptography 3

33. Differential Privacy Under Fire.

Paper Link】 【Pages】:

【Authors】: Andreas Haeberlen ; Benjamin C. Pierce ; Arjun Narayan

【Abstract】:

【Keywords】:

34. Outsourcing the Decryption of ABE Ciphertexts.

Paper Link】 【Pages】:

【Authors】: Matthew Green ; Susan Hohenberger ; Brent Waters

【Abstract】:

【Keywords】:

35. Faster Secure Two-Party Computation Using Garbled Circuits.

Paper Link】 【Pages】:

【Authors】: Yan Huang ; David Evans ; Jonathan Katz ; Lior Malka

【Abstract】:

【Keywords】: