Full papers

(1) The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code
Clemens Kolbitsch, Christopher Kruegel, Engin Kirda
(2) Proofs of Ownerhip in Remote Storage Systems
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
(3) VMCrypt - Modular Software Architecture for Scalable Secure Computation
Lior Malka
(4) Automatically Optimizing Secure Computation
Florian Kerschbaum
(5) Practical PIR for Electronic Commerce
Ryan Henry, Femi Olumofin, Ian Goldberg
(6) Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers
Mike Samuel, Prateek Saxena, Dawn Song
(7) BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis
Jiyong Jang, David Brumley, Shobha Venkataraman
(8) Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes
Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
(9) Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities
Adam Doupe, Bryce Boe, Christopher Kruegel, Giovanni Vigna
(10) On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks ?Extracting Keys from Xilinx Virtex-II FPGAs
Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
(11) On the Requirements for Successful GPS Spoofing Attacks
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
(12) How to Break XML Encryption
Tibor Jager, Juraj Somorovsky
(13) Composability of Bellare-Rogaway Key Exchange Protocols
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams
(14) Eliminating the Hypervisor Attack Surface for a More Secure Cloud
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford
(15) Unicorn: Protecting Unsuspecting Users via Trusted Computing
Mohammad Mannan, Beom Kim, Afshar Ganjali, David Lie
(16) (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers
Philip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor
(17) A decision procedure for trace equivalence
Vincent Cheval, Hubert Comon-Lundh, Stephanie Delaune
(18) Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing
Bin Zeng, Gang Tan, Greg Morrisett
(19) These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, David Wetherall
(20) Auctions in Do-Not-Track Compliant Internet Advertising
Alexey Reznichenko, Saikat Guha, Paul Francis
(21) Forensic Investigation of the OneSwarm Anonymous Filesharing System
Swagatika Prusty, Marc Liberatore, Brian N. Levine
(22) Practical Delegation of Computation using Multiple Servers
Ben Riva, Ran Canetti, Guy N. Rothblum
(23) Process Out-Grafting: An Efficient “Out-of-VM” Approach for Fine-Grained Process Execution Monitoring
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu
(24) Trust-based Anonymous Communication: Adversary Models and Routing Algorithms
Paul Syverson, Aaron Johnson, Roger Dingledine, Nick Mathewson
(25) SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms
Ahmed Azab, Peng Ning, Xiaolan Zhang
(26) Crouching Tiger - Hidden Payload: Security Risks of Scalable Vectors Graphics
Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz
(27) MIDeA: A Multi-Parallel Intrusion Detection Architecture
Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis
(28) Composition Theorems Without Pre-Established Session Identifiers
Ralf Kuesters, Max Tuengerthal
(29) An Efficient User Verification System via Mouse Movements
Nan Zheng, Aaron Paloski, Haining Wang
(30) AmazonIA: When Elasticity Snaps Back
Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider
(31) Privacy and Accountability for Location-based Aggregate Statistics
Raluca Ada Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li
(32) Cloak and Dagger: Dynamics of Web Search Cloaking
David Wang, Stefan Savage, Geoff Voelker
(33) How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
Kevin D. Bowers, Marten Van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
(34) Deobfuscating Virtualization-Obfuscated Software: A Semantics-Based Approach
Kevin Coogan, Gen Lu, Saumya Debray
(35) A composable computational soundness notion
Veronique Cortier, Bogdan Warinschi
(36) Protecting Consumer Privacy from Electric Load Monitoring
Stephen Mclaughlin, William Aiello, Patrick Mcdaniel
(37) iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections
Rahul Raguram, Andrew White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm
(38) App Isolation: Get the Security of Multiple Browsers with Just One
Eric Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson
(39) Policy Auditing over Incomplete Logs: Theory, Implementation and Applications
Deepak Garg, Limin Jia, Anupam Datta
(40) Televisions, Video Privacy, and Powerline Electromagnetic Interference
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak Patel
(41) Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Mihhail Aizatulin, Andrew Gordon, Jan Jürjens
(42) SURF: Detecting and Measuring Search Poisoning
Long Lu, Roberto Perdisci, Wenke Lee
(43) Password Protected Secret Sharing
Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu
(44) VIPER: Verifying the Integrity of PERipherals' Firmware
Yanlin Li, Jonathan McCune, Adrian Perrig
(45) Modular Code-Based Cryptographic Verification
Cedric Fournet, Markulf Kohlweiss, Pierre-Yves Strub
(46) SCRIPTGARD: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications
Prateek Saxena, David Molnar, Benjamin Livshits
(47) Automatic Error Finding in Access-Control Policies
Karthick Jayaraman, Vijay Ganesh, Mahesh Tripunitara, Martin Rinard, Steve Chapin
(48) Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov
(49) Visual CAPTCHA Strengths and Weaknesses
Elie Bursztein, Matthieu Martin, John Mitchell
(50) Automated Black-box Detection of Side-Channel Vulnerabilities in Web Applications
Peter Chapman, David Evans
(51) Ciphers that Encipher their own Keys
Mihir Bellare, David Cash, Sriram Keelveedhi
(52) Android Permissions Demystified
Adrienne Felt, Erika Chin, Steve Hanna, David Wagner, Dawn Song
(53) Fortifying Web-Based Applications Automatically
Shuo Tang, Nathan Dautenhahn, Samuel T. King
(54) Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds
Kehuan Zhang, Xiaoyong Zhou, Yangyi Chen, Xiaofeng Wang, Yaoping Ruan
(55) Predictive Mitigation of Timing Channels in Interactive Systems
Danfeng Zhang, Aslan Askarov, Andrew Myers
(56) PaperSpeckle: Microscopic fingerprinting of paper
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric Brewer
(57) Fashion Crimes: Trending-Term Exploitation on the Web
Tyler Moore, Nektarios Leontiadis, Nicolas Christin
(58) Information-Flow Types for Homomorphic Encryption
Cedric Fournet, Jérémy Planul, Tamara Rezk
(59) Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
(60) Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, Venkat Venkatakrishnan

Last modified: 2011-08-30 10:08:20 EDT