Full papers

(1) Martin Albrecht, Craig Gentry, Shai Halevi and Jonathan Katz.
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
(2) Mudhakar Srivatsa.
A Calculus Approach to Secure Information Sharing
(3) K Vikram, Abhishek Prateek and Benjamin Livshits.
Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution
(4) Claude Castelluccia, Aurélien Francillon, Daniele Perito and Claudio Soriente.
On the Difficulty of Software-Based Attestation of Embedded Devices
(5) Steffen Reidt, Mudhakar Srivatsa and Shane Balfe.
The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks
(6) Masana Murase, Wilfred Plouffe, Masaharu Sakamoto and Kanna Shimizu.
Effective Implementation of the Cell Broadband Engine(TM) Isolation Loader
(7) Changshe Ma, Yingjiu Li, Robert Deng and Tieyan Li.
RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction
(8) Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund and Thomas Walter.
Filter-resistant code injection on RISC
(9) Andriy Panchenko, Arne Rache and Stefan Richter.
NISAN: Network Information Service for Anonymization Networks
(10) Cedric Fournet, Gurvan Le Guernic and Tamara Rezk.
A Security-Preserving Compiler for Distributed Programs
(11) xinran wang, Yoon-Chan Jhi, Sencun Zhu and Peng Liu.
Behavior Based Software Theft Detection
(12) Dario Catalano, Dario Fiore and Rosario Gennaro.
Certificateless Onion Routing
(13) Yao Liu, Peng Ning and Michael Reiter.
False Data Injection Attacks against State Estimation in Electric Power Grids
(14) Allison B. Lewko and Brent Waters.
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
(15) Olivier Billet, Jonathan Etrog and Henri Gilbert.
An Efficient Forward-Private RFID Protocol
(16) Muhammad Qasim Ali, Hassan Khan, Ali Sajjad and Syed Ali Khayam.
On Achieving Good Operating Points on an ROC Plane using Stochastic Anomaly Score Prediction
(17) Prateek Mittal and Nikita Borisov.
ShadowWalker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies
(18) Carmela Troncoso and George Danezis.
The Bayesian Traffic Analysis of Mix Networks
(19) Michael Backes, Dennis Hofheinz and Dominique Unruh.
CoSP : A general framework for computational soundness proofs -- or -- The computational soundness of the applied pi-calculus
(20) Patrik Bichsel, Jan Camenisch, Thomas Gross and Victor Shoup.
Anonymous Credentials on a Standard JavaCard
(21) Matthew Edman and Paul Syverson.
Astor: AS-awareness in Tor Path Selection
(22) Zhi Wang, Xuxian Jiang, Weidong Cui and Peng Ning.
Countering Kernel Rootkits with Lightweight Hook Protection
(23) Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr and Matt Blaze.
Can they hear me now?: A Security Analysis of Law Enforcement Wiretaps
(24) Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt- Benjamin and Srdjan Capkun.
Proximity-based Access Control for Implantable Medical Devices
(25) Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado and Xuxian Jiang.
Mapping Kernel Objects to Enable Systematic Integrity Checking
(26) Kevin Bowers, Ari Juels and Alina Oprea.
HAIL: A High-Availability and Integrity Layer for Cloud Storage
(27) Mario Frank, Andreas P. Streich, David Basin and Joachim M. Buhmann.
A Probabilistic Approach to Hybrid Role Mining
(28) Julien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux and David Parkes.
On Non-Cooperative Location Privacy
(29) Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Michael Reiter and Zheng Dong.
Privacy-Preserving Genomic Computation Through Program Specialization
(30) Toby Xu and Ying Cai.
Feeling-based Location Privacy Protection for Location-based Services
(31) Justin Manweiler, Ryan Scudellari and Landon P. Cox.
SMILE: Encounter-Based Trust for Mobile Social Services
(32) Aaron Bohannon, Benjamin Pierce, Vilhelm Sjöberg, Stephanie Weirich and Steve Zdancewic.
Reactive Noninterference
(33) Siliang Li and Gang Tan.
Finding bugs in exceptional situations of JNI programs
(34) Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Thomas La Porta and Patrick McDaniel.
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core
(35) Jan Camenisch, Maria Dubovitskaya and Gregory Neven.
Oblivious Transfer with Access Control
(36) Eugene Vasserman, Rob Jansen, James Tyra, Nicholas Hopper and Yongdae Kim.
Membership-concealing overlay networks
(37) Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor and Jonathon Giffin.
Robust Signatures for Kernel Data Structures
(38) Andrew Meneely and Laurie Williams.
Secure Open Source Collaboration: An Empirical Study of Linus' Law
(39) Sonia Chiasson, Alain Forget, Elizabeth Stobert, Paul van Oorschot and Robert Biddle.
Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords
(40) Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan and Weijia Jia.
A New Cell Counter Based Attack Against Tor
(41) William Enck, Machigar Ongtang and Patrick McDaniel.
On Lightweight Mobile Phone App Certification
(42) Hristo Bojinov, Dan Boneh and Elie Burzstein.
The (in)Security of Embedded Web Servers in Consumer Electronic Devices
(43) Joshua Mason, Sam Small, Fabian Monrose and Greg MacManus.
English Shellcode
(44) Rui Wang, Yong Li, XiaoFeng Wang, Haixu Tang and Xiaoyong Zhou.
Learning Your Identity and Disease from Research Papers: Information Leaks in Genome Wide Association Study
(45) Edward Kaiser, Wu-chang Feng and Travis Schluessler.
Fides: Remote Anomaly-Based Cheat Detection Using Client Emulation
(46) Xin Hu, Tzi-cker Chiueh and Kang G. Shin.
Large-Scale Malware Indexing Using Function-Call Graphs
(47) Monirul Sharif, Wenke Lee, Weidong Cui and Andrea Lanzi.
Secure In-VM Monitoring Using Hardware Virtualization
(48) Chris Erway, Charalampos Papamanthou, Alptekin Kupcu and Roberto Tamassia.
Dynamic Provable Data Possession
(49) Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy and Hao Chen.
Multi-party Off-the-Record Messaging
(50) Steven Gianvecchio, Zhenyu Wu, Mengjun Xie and Haining Wang.
Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs
(51) Juan Caballero, Pongsin Poosankam, Christian Kreibich and Dawn Song.
Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-engineering
(52) Karl Koscher, Ari Juels, Tadayoshi Kohno and Vjekoslav Brajkovic.
EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond
(53) Ralf Kuesters and Max Tuengerthal.
Computational Soundness for Key Exchange Protocols with Symmetric Encryption
(54) Cynthia Sturton, Susmit Jha, David Wagner and Sanjit Seshia.
On Voting Machine Design for Verification and Testability
(55) Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Christopher Kruegel, Giovanni Vigna and Richard Kemmerer.
My Botnet is Your Botnet: Analysis of a Botnet Takeover
(56) Thomas Ristenpart, Eran Tromer, Hovav Shacham and Stefan Savage.
Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds
(57) Jon McLachlan, Andrew Tran, Nicholas Hopper and Yongdae Kim.
Scalable Onion Routing with Torsk
(58) Melissa Chase and Sherman S.M. Chow.
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption

Last modified: 2009-09-08 15:40:11 EDT