Accepted Papers
- An Independent Audit Framework for Software Dependent Voting Systems
Sujata Doshi and Aviel D. Rubin.
- An Information-Theoretic Model for Adaptive Side-Channel Attacks
Boris Koepf and David Basin.
- PORs: Proofs of Retrievability for Large Files
Ari Juels and Burt Kaliski.
- Predicting Vulnerable Software Components
Stephan Neuhaus, Thomas Zimmermann and Andreas Zeller.
- Privacy-Preserving Evaluation of Branching Programs
Justin Brickell, Don Porter, Vitaly Shmatikov and Emmett Witchel.
- The Geometry of Innocent Flesh on the Bone: Return-into-libc without
Function Calls (on the x86)
Hovav Shacham.
- Ordered Multisignatures and Identity-Based Sequential Aggregate
Signatures, with Applications to Secure Routing
Alexandra Boldyreva, Craig Gentry, Adam O'Neill and Dae Hyun Yum.
- Blacklistable Anonymous Credentials: Blocking Misbehaving Users without
TTPs
Patrick Tsang, Man Ho Au, Apu Kapadia and Sean Smith.
- On the Accuracy of Decentralized Virtual Coordinate Systems in
Adversarial Networks
David Zage and Cristina Nita-Rotaru.
- An Analysis of Browser Domain-Isolation Bugs and A Light-Weight
Transparent Defense Mechanism
Shuo Chen, Yi-Min Wang and David Ross.
- Chosen-Ciphertext Secure Proxy Re-Encryption
Ran Canetti and Susan Hohenberger.
- Hardware-rooted Trust for Secure Key Management and Transient Trust
Jeffrey Dwoskin and Ruby B. Lee.
- Security under Key-Dependent Inputs
Shai Halevi and Hugo Krawczyk.
- Capturing System-wide Information Flow for Malware Detection and
Analysis
Heng Yin, Dawn Song, Manuel Egele, Engin Kirda and Christopher Kruegel.
- Protecting Browsers from DNS Rebinding Attacks
Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao and Dan Boneh.
- Information Disclosure under Realistic Assumptions: Privacy versus
Optimality
Lei Zhang, Sushil Jajodia and Alexander Brodsky.
- Privacy Preserving Error Resilient DNA Searching through Oblivious
Automata
Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser and Mehmet Celik.
- Forward-Secure Signatures in Untrusted Update Environments: Efficient
and Generic Constructions
Benoit Libert, Jean-Jacques Quisquater and Moti Yung.
- Highly Efficient Techniques for Network Forensics
Miroslav Ponec, Paul Giura, Herve Bronnimann and Joel Wein.
- Provably Secure Ciphertext Policy ABE
Ling Cheung and Calvin Newport.
- Provable Data Possession at Untrusted Stores
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner,
Zachary Peterson and Dawn Song.
- Shunting: A Hardware/Software Architecture for Flexible,
High-Performance Network Intrusion Prevention
Jose Maria Gonzalez, Vern Paxson and Nicholas Weaver.
- Secure 2-party k-Means Clustering
Paul Bunn and Rafail Ostrovsky.
- Automated Detection of Persistent Kernel Control-Flow Attacks
Nick Petroni and Michael Hicks.
- Cryptanalysis of the Windows Random Number Generator
Leo Dorrendorf, Zvi Gutterman and Benny Pinkas.
- Optimal Security Hardening Using Multi-objective Optimization on Attack
Tree Models of Networks
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and Darrell Whitley.
- Dynamic pharming attacks and the locked same-origin policies for web
browsers
Chris Karlof, Umesh Shankar, J.D. Tygar and David Wagner.
- BeamAuth: Two-Factor Web Authentication with a Bookmark
Ben Adida.
- Split-Ballot Voting: Everlasting Privacy With Distributed Trust
Tal Moran and Moni Naor.
- Robust Computational Secret Sharing, Revisited
Mihir Bellare and Phillip Rogaway.
- MemSherlock: An Automated Debugger for Unknown Memory Corruption
Vulnerabilities
Emre Can Sezer, Peng Ning, Chongkyung Kil and Jun Xu.
- Stealthy Malware Detection Through VMM-Based "Out-of-the-Box" Semantic
View Reconstruction
Xuxian Jiang, Dongyan Xu and Xinyuan Wang.
- Attribute-Based Encryption with Non-Monotonic Access Structures
Rafail Ostrovsky, Amit Sahai and Brent Waters.
- Multi-Module Vulnerability Analysis of Web-based Applications
Davide Balzarotti, Marco Cova, Viktoria Felmetsger and Giovanni Vigna.
- Automaton Segmentation: A New Approach to Preserve Privacy in XML
Information Brokering
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee and Chao-Hsien Chu.
- How much anonymity does network latency leak?
Nicholas Hopper, Eugene Vasserman and David Chan-Tin.
- Covert Channels in Privacy-Preserving Identification Systems
Dan Bailey, Dan Boneh, Eu-Jin Goh and Ari Juels.
- Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image
Categorization
Jeremy Elson, John Douceur and Jon Howell.
- Detecting Covert Timing Channels: An Entropy-Based Approach
Steven Gianvecchio and Haining Wang.
- Robust Key Generation from Signal Envelopes in Wireless Networks
Babak Azimi-Sadjadi, Alejandra Mercado, Aggelos Kiayias and Bulent Yener.
- Efficient Policy Analysis for Administrative Role Based Access
Scott Stoller, ping yang, C.R. Ramakrishnan and Mikhail Gofman.
- ConceptDoppler: A Weather Tracker for Internet Censorship
Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr and Rich East.
- On the Infeasibility of Modeling Polymorphic Shellcode
Yingbo Song, Michael Locasto, Angelos Stavrou, Angelos Keromytis and
Salvatore Stolfo.
- Denial of Service or Denial of Security? How Attacks on Reliability can
Compromise Anonymity
Nikita Borisov, George Danezis, Prateek Mittal and Parisa Tabriz.
- Polyglot: Automatic Extraction of Protocol Format using Dynamic Binary
Analysis
Juan Caballero and Dawn Song.
- Harvesting Verifiable Challenges from Oblivious Online Sources
Alex Halderman and Brent Waters.
- Stability of superpeer networks against attack: some analytical results
Bivas Mitra, Sujoy Ghose and Niloy Ganguly.
- Towards Automated Provisioning of Secure Virtualized Networks
Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy and Matthias Schunter.
- Alpaca: extensible authorization for distributed services
Christopher Lesniewski-Laas, Bryan Ford, Jacob Strauss, M. Frans Kaashoek
and Robert Morris.
- An Inquiry into the Nature and Causes of the Wealth of Internet
Miscreants
Jason Franklin, Vern Paxson, Adrian Perrig and Stefan Savage.
- CANDID: Retrofitting Code to prevent SQL Injection Attacks using
Symbolic Queries
Sruthi Bandhakavi, Prithvi Bisht, Madhusudan Parthasarathy and V.N.
Venkatakrishnan.
- Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking
Baik Hoh, Marco Gruteser, Hui Xiong and Ansaf Alrabady.
- Do Background Images Improve "Draw a Secret" Graphical Passwords?
Paul Dunphy and Jeff Yan.
- FilteringvSpam with Behavioral Blacklisting
Anirudh Ramachandran, Nick Feamster and Santosh Vempala.
- Robust Group Key Agreement using Short Broadcasts
Jihye Kim, Stanislaw Jarecki and Gene Tsudik.
