USENIX 2013 Aug. 14, 2013 to Aug. 16, 2013, Washington, D.C.

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Dowsing for Over?ows. A Guided Fuzzer to Find Buffer Boundary Violations Istvan Haller , Asia Slowinska , Matthias Neugschwandtner , Herbert Bos
Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Kurt Thomas , Damon McCoy , Chris Grier , Alek Kolcz , Vern Paxson
Opening Remarks and Awards Sam King N/A
Dr. Felten Goes To Washington: Lessons from 18 Months in Government Edward W. Felten This talk will describe the speaker's experience in government, where he served as the first ...
Network Security Chris Grier N/A
Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space Nan Jiang , Yu Jin , Ann Skudlark , Zhi-li Zhang N/A
Practical Comprehensive Bounds on Surreptitious Communication over DNS Douglas Lee Schales , Wietse Venema , Vern Paxson , Reiner Sailer , Mihai Christodorescu , Nicholas Weaver , Kurt Thomas , Mobin Javed , Josyula Rao , Marc Ph. Stoecklin N/A
Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks Nico Golde , Kevin Redon , Jean-pierre Seifert N/A
Potpourri David A. Wagner N/A
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Peng Ning , Ruowen Wang , Tao Xie , Quan Chen N/A
Towards Automatic Software Lineage Inference David Brumley , Jiyong Jang , Maverick Woo N/A
Mobile Security I Patrick Traynor N/A
Securing Embedded User Interfaces: Android and Beyond Tadayoshi Kohno , Franziska Roesner N/A
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications Benjamin Livshits , Jaeyeon Jung N/A
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Sven Bugiel , Ahmad-reza Sadeghi , Stephan Heuser N/A
Windows 8 Security: Supporting User Confidence Crispin Cowan Computing appliances should let users just use the device without having to having to “be ...
Applied Crypto I Ian Goldberg N/A
Proactively Accountable Anonymous Messaging in Verdict Bryan Ford , Henry Corrigan-gibbs , David Isaac Wolinsky N/A
ZQL: A Compiler for Privacy-Preserving Data Processing Markulf Kohlweiss , Cedric Fournet , Zhengqin Luo , And George Danezis N/A
DupLESS: Server-Aided Encryption for Deduplicated Storage Thomas Ristenpart , Mihir Bellare , Sriram Keelveedhi N/A
Large-Scale Systems Security I Niels Provos , Google N/A
Impression Fraud in On-line Advertising via Pay-Per-View Networks Paul Barford , Kevin Springborn N/A
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Adam Pridgen , Jedidiah R. Crandall , Dan S. Wallach , Tao Zhu , David Phipps N/A
The White House's Priorities for Cybersecurity Andy Ozment Andy Ozment will describe the view on cybersecurity from the White House, including the Administration's ...
You Are How You Click: Clickstream Analysis for Sybil Detection Xiao sophia Wang , Gang Wang , Tristan Konolige , Christo Wilson , Haitao Zheng , Ben Y. Zhao N/A
Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Adrienne porter Felt , Devdatta Akhawe N/A
An Empirical Study of Vulnerability Rewards Programs David A. Wagner , Devdatta Akhawe , Matthew Finifter N/A
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Patrick Traynor , Henry Carter , Kevin Butler , Benjamin Mood N/A
On the Security of RC4 in TLS Daniel J. Bernstein , Bertram Poettering , Kenneth g. Paterson , Nadhem Alfardan , Jacob C.n. Schuldt N/A
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation Kevin Butler , Benjamin Mood , Ben Kreuter , Abhi Shelat N/A
Protecting and Understanding Binaries Ben Livshits N/A
Control Flow Integrity for COTS Binaries R. Sekar , Mingwei Zhang N/A
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring David Brumley , Edward J. Schwartz , Maverick Woo , Jonghyup Lee N/A
Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors Gang Tan , Bin Zeng , Ulfar Erlingsson N/A
Confessions of a "Recovering" Data Broker: Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Jim Adler It's been said that the human brain is comprised of 300 million pattern matchers fed ...
Current and Future Systems Security Adrienne porter Felt N/A
On the Security of Picture Gesture Authentication Gail-joon Ahn , Ziming Zhao , Jeong-jin Seo , Hongxin Hu N/A
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization David Evans , Rui Wang , Shuo Chen , Yuri Gurevich , Yuchen Zhou , Shaz Qadeer N/A
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers David Molnar , Benjamin Livshits , Helen J. Wang , Alexander Moshchuk , Suman Jana , Alan Dunn , Eyal Ofek N/A
CacheAudit: A Tool for the Static Analysis of Cache Side Channels Goran Doychev , Dominik Feld , Boris Köpf , Laurent Mauborgne , Jan Reineke N/A
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing Angelos D. Keromytis , Michalis Polychronakis , Vasilis Pappas N/A
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Drew Davidson , Somesh Jha , Thomas Ristenpart , Benjamin Moench N/A
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Bart Preneel , Ingrid Verbauwhede , Christophe Huygens , Pieter Agten , Raoul Strackx , Frank Piessens , Anthony van Herrewege , Job Noorman , Wilfried Daniels , Ku Leuven N/A
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Mahesh v. Tripunitara , Frank Imeson , Ariq Emtenan , Siddharth Garg N/A
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object Brent ByungHoon Kang , Hojoon Lee , Hyungon Moon , Daehee Jang , Kihwan Kim , Jihoon Lee , Yunheung Paek N/A
Security Team 2.0 Chris Evans The Chrome Security Team was founded in 2009 and has adopted a different approach and ...
WHYPER: Towards Automating Risk Assessment of Mobile Applications William Enck , Rahul Pandita , Tao Xie , Xusheng Xiao , Wei Yang N/A
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis Patrick Mcdaniel , Somesh Jha , Damien Octeau , Alexandre Bartel , Eric Bodden , Jacques Klein , Yves Le Traon N/A
Jekyll on iOS: When Benign Apps Become Evil Wenke Lee , Long Lu , Tielei Wang , Kangjie Lu , Simon Chung N/A
Measuring the Practical Impact of DNSSEC Deployment Hovav Shacham , Stefan Savage , Eric Rescorla , Wilson Lian N/A
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Roberto Perdisci , Terry Nelms , Mustaque Ahamad N/A
ZMap: Fast Internet-wide Scanning and Its Security Applications J. Alex Halderman , Eric Wustrow , Zakir Durumeric N/A
Eradicating DNS Rebinding with the Extended Same-origin Policy Martin Johns , Ben Stock , Sebastian Lekies N/A
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware Christopher Kruegel , Giovanni Vigna , Marco Cova , Alexandros Kapravelos , Yan Shoshitaishvili N/A
Language-based Defenses Against Untrusted Browser Origins Karthikeyan Bhargavan , Sergio Maffeis , Antoine Delignat-lavaud N/A
Building Securable Infrastructure: Open-Source Private Clouds Pravir Chandra Using an open-sourced stack from bottom to top, this presentation will discuss the practical challenges ...
Tracking the Casino Computer Wars: Who’s Winning—the Casino or the Cheat? Richard Marcus The talk will open with an entertaining demonstration of what is widely considered the best ...
Take This Personally: Pollution Attacks on Personalized Services Wenke Lee , Nick Feamster , Wei Meng , Alex c. Snoeren , Xinyu Xing , Dan Doozan N/A
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services Christopher Kruegel , Giovanni Vigna , Ruoyu Wang , Yan Shoshitaishvili N/A