Accepted Papers
-
Dictionary Attacks Using Keyboard Acoustic Emanations.
Yigael Berger, Avishai Wool, and Arie Yeredor
-
Providing Witness Anonymity in Peer-to-Peer Systems.
Bo Zhu, Sanjeev Setia, and Sushil Jajodia
-
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation.
Mihir Bellare, Tadayoshi Kohno, and Victor Shoup
-
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies.
Ninghui Li and Qihua Wang
-
Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma.
Mihir Bellare and Gregory Neven
-
Deniable Authentication and Key Exchange.
Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk
-
Safety and Consistency in Policy-Based Authorization Systems.
Adam J. Lee and Marianne Winslett
-
Fourth-Factor Authentication: Somebody You Know.
John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung
-
A Fully Collusion Resistant Broadcast, Trace, and Revoke System.
Dan Boneh and Brent Waters
-
Resiliency Policies in Access Control.
Ninghui Li, Mahesh V. Tripunitara, and Qihua Wang
-
Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques.
Prahlad Fogla and Wenke Lee
-
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data.
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
-
Doppelganger: Better Browser Privacy Without the Bother.
Umesh Shankar and Chris Karlof
-
Packet Vaccine: Black-box Exploit Detection and Signature Generation.
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, and Jong Youl Choi
-
Protomatching Network Traffic for High Throughput Network Intrusion Detection.
Shai Rubin, Somesh Jha, and Barton P. Miller
-
Secure Attribute-Based Systems.
Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
-
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci
-
Inferring the Source of Encrypted HTTP Connections.
Marc Liberatore and Brian Neil Levine
-
Secure Function Evaluation with Ordered Binary Decision Diagrams.
Eu-Jin Goh, Louis Kruger, Somesh Jha, and Dan Boneh
-
Secure Hierarchical In-Network Aggregation in Sensor Networks.
Haowen Chan, Adrian Perrig, and Dawn Song
-
Optimizing BGP Security by Exploiting Path Stability.
William Aiello, Kevin Butler, and Patrick McDaniel
-
Searchable Symmetric Encryption: Improved Definitions and Efficient
Constructions.
Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky
-
Forward Secure Signatures with Untrusted Update.
Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
-
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous
Authentication.
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
-
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
Michael Backes and Peeter Laud
-
A Scalable Approach to Attack Graph Generation.
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen
-
An Effective Defense Against Email Spam Laundering.
Mengjun Xie, Heng Yin, and Haining Wang
-
Formal Specification and Verification of Data Separation in an Application-Specific Separation Kernel.
Constance Heitmeyer, Myla Archer, Elizabeth Leonard, and John McLean
-
Data Collection With Self-Enforcing Privacy.
Philippe Golle, Frank McSherry, and Ilya Mironov
-
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis
-
TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor
Networks.
Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou
-
On the Modeling and Analysis of Obligations.
Keith Irwin, Ting Yu, and William H. Winsborough
-
EXE: A System for Automatically Generating Inputs of Death Using Symbolic
Execution.
Cristian Cadar, Vijay Ganesh, Peter Pawlowski, David Dill, and Dawson Engler
-
A Natural Language Approach to Automated Cryptanalysis of Two-time Pads.
Joshua Mason, Kathryn Watkins, Jason Eisner, and Adam Stubblefield
-
Hot or Not: Revealing Hidden Services by their Clock Skew
Steven J. Murdoch
-
Replayer: Automatic Protocol Replay by Binary Analysis.
James Newsome, David Brumley, Jason Franklin, and Dawn Song
-
RoleMiner: Mining Roles using Subset Enumeration.
Jaideep Vaidya, Vijayalakshmi Atluri, and Janice Warner
-
Salsa: A Structured Approach to Large-Scale Anonymity.
Arjun Nambiar and Matthew Wright

