


default search action
30th SP 2009: Oakland, California, USA
- 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA. IEEE Computer Society 2009, ISBN 978-0-7695-3633-0

Attacks and Defenses
- Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur:

Wirelessly Pickpocketing a Mifare Classic Card. 3-15 - Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson:

Plaintext Recovery Attacks against SSH. 16-26 - Xiang Cai, Yuwei Gui, Rob Johnson:

Exploiting Unix File-System Races via Algorithmic Complexity Attacks. 27-41
Information Security
- Bart Coppens, Ingrid Verbauwhede

, Koen De Bosschere, Bjorn De Sutter:
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. 45-60 - Maxwell N. Krohn, Eran Tromer:

Noninterference for a Practical DIFC-Based Operating System. 61-76
Malicious Code
- Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar:

Native Client: A Sandbox for Portable, Untrusted x86 Native Code. 79-93 - Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:

Automatic Reverse Engineering of Malware Emulators. 94-109 - Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda:

Prospex: Protocol Specification Extraction. 110-125
Information Leaks
- Kevin Borders, Atul Prakash

:
Quantifying Information Leaks in Outbound Web Traffic. 129-140 - Michael Backes, Boris Köpf, Andrey Rybalchenko:

Automatic Discovery and Quantification of Information Leaks. 141-153 - Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig:

CLAMP: Practical Prevention of Large-Scale Data Leaks. 154-169
Privacy
- Arvind Narayanan, Vitaly Shmatikov:

De-anonymizing Social Networks. 173-187 - Koen Simoens

, Pim Tuyls, Bart Preneel
:
Privacy Weaknesses in Biometric Sketches. 188-203 - Michael T. Goodrich

:
The Mastermind Attack on Genomic Data. 204-218
Formal Foundations
- Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kirli Kaynar:

A Logic of Secure Systems and its Application to Trusted Computing. 221-236 - Santiago Zanella-Béguelin

, Gilles Barthe
, Benjamin Grégoire, Federico Olmedo
:
Formally Certifying the Security of Digital Signature Schemes. 237-250 - Ralf Küsters, Tomasz Truderung:

An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. 251-266
Network Security
- George Danezis, Ian Goldberg:

Sphinx: A Compact and Provably Secure Mix Format. 269-282 - Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip B. Gibbons, Feng Xiao:

DSybil: Optimal Sybil-Resistance for Recommendation Systems. 283-298
Network Security
- William Clarkson, Tim Weyrich

, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten:
Fingerprinting Blank Paper Using Commodity Scanners. 301-314 - Michael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk

:
Tempest in a Teapot: Compromising Reflections Revisited. 315-327
Network Security
- Mike Ter Louw, V. N. Venkatakrishnan:

Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. 331-346 - Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang:

Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. 347-359 - Adam Barth, Juan Caballero, Dawn Song:

Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. 360-371
Humans and Secrets
- Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman

:
It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. 375-390 - Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek:

Password Cracking Using Probabilistic Context-Free Grammars. 391-405

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














