USENIX 2012 Aug. 8, 2012 to Aug. 10, 2012, Washington, D.C.

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Welcome and Awards Tadayoshi Kohno N/A
The Evolution of Information Assurance Dickie George This talk will discuss the change in assurance from the cold war of the '60s ...
Spam and Drugs Kevin Fu N/A
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs Grant Jordan , Damon Mccoy , Kirill Levchenko , Geoffrey M. Voelker , Stefan Savage , Christian Kreibich , Nicholas Weaver , Brian Krebs , Andreas Pitsillidis N/A
B@bel: Leveraging Email Delivery for Spam Mitigation Thorsten Holz , Christopher Kruegel , Giovanni Vigna , Manuel Egele , Apostolis Zarras , Gianluca Stringhini N/A
Impact of Spam Exposure on User Engagement Anirban Dasgupta , Kunal Punera , Justin M. Rao , Xuanhui Wang N/A
Robots and Privacy Ryan Calo It is not hard to imagine why drones, telepresence, and other robotic technologies raise privacy ...
CAPTCHAs and Password Strength Dan S. Wallach N/A
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion P. van Oorschot , Y. Xu , G. Reynaga , S. Chiasson , J.-m. Frahm , F. Monrose N/A
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation Lorrie Faith Cranor , Lujo Bauer , Nicolas Christin , Blase Ur , Richard Shay , Patrick gage Kelley , Saranga Komanduri , Michelle l. Mazurek , Timothy Vidas , Timothy Passaro , Joel Lee , Michael Maass N/A
I Forgot Your Password: Randomness Attacks Against PHP Applications George Argyros , Aggelos Kiayias N/A
Invited Talk Rajesh Patel N/A
Browser Security Sam King N/A
An Evaluation of the Google Chrome Extension Security Architecture David A. Wagner , Adrienne porter Felt , Nicholas Carlini N/A
Establishing Browser Security Guarantees through Formal Shim Verification Dongseok Jang , Zachary Tatlock , Sorin Lerner N/A
The Brain David Molnar N/A
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks Dan Boneh , Hristo Bojinov , Patrick Lincoln , Daniel Sanchez , Paul Reber N/A
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces Dawn Song , Mario Frank , Ivan Martinovic , Doug Davies , Daniele Perito , Tomas Ros N/A
A Chance of Clouds Kirill Levchenko N/A
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Haining Wang , Zhenyu Wu , Zhang Xu N/A
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Stefan Saroiu , Rodrigo Rodrigues , Nuno Santos , Krishna P. Gummadi N/A
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Taesoo Kim , Marcus Peinado , Gloria Mainar-ruiz N/A
Embedded Security Srdjan Capkun N/A
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices J. Alex Halderman , Nadia Heninger , Eric Wustrow , Zakir Durumeric N/A
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Kevin Fu , Mastooreh Salajegheh , Wayne p. Burleson , Amir Rahmati , Dan Holcomb , Jacob Sorber N/A
Gone in 360 Seconds: Hijacking with Hitag2 Josep Balasch , Ku Leuven , Roel Verdult , Flavio D. Garcia N/A
Secure Computation and PIR Nikita Borisov N/A
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality Andrew j. Blumberg , Michael Walfish , Srinath Setty , Victor Vu , Nikhil Panpalia , Benjamin Braun N/A
Optimally Robust Private Information Retrieval Ian Goldberg , Nadia Heninger , Casey Devet N/A
Billion-Gate Secure Computation with Malicious Adversaries Abhi Shelat , Benjamin Kreuter , Chih-hao Shen N/A
Cyber Security Education in a Time of Change Cynthia E. Irvine The call is out and it is vast. Across the board, personnel are being sought ...
Authentication and Secure Deletion Roxana Geambasu N/A
Progressive Authentication: Deciding When to Authenticate on Mobile Phones Oriana Riva , Karin Strauss , Chuan Qin , Dimitrios Lymberopoulos N/A
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Alexei Czeskis , Dirk Balfanz , Dan S. Wallach , Michael Dietz N/A
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory Srdjan Capkun , Joel Reardon , David Basin N/A
Life as a Target—Welcome to the Club Dickie George As a cryptographer for 40 years, Mr. George recognized that he was a target of ...
Privacy Enhancing Technologies and Network Traffic Analysis Ian Goldberg N/A
Throttling Tor Bandwidth Parasites Paul Syverson , Nicholas Hopper , Rob Jansen N/A
Chimera: A Declarative Language for Streaming Network Traffic Analysis Kevin Borders , Jonathan Springer , Matthew Burnside N/A
New Attacks on Timing-based Network Flow Watermarks Zi Lin , Nicholas Hopper N/A
Nature is a Language; Can't You Read? Meredith L. Patterson Thirty years ago, almost no one could have imagined that computers would one day be ...
Web Security Christian Kreibich N/A
On Breaking SAML: Be Whoever You Want to Be Juraj Somorovsky , Meiko Jensen , Andreas Mayer , Jörg Schwenk , Marco Kampmann N/A
Clickjacking: Attacks and Defenses Collin Jackson , Helen J. Wang , Stuart E. Schechter , Lin-shung Huang , Alex Moshchuk N/A
Privilege Separation in HTML5 Applications Dawn Song , Prateek Saxena , Devdatta Akhawe N/A
Software Security I Mihai Christodorescu N/A
Fuzzing with Code Fragments Andreas Zeller , Christian Holler , Kim Herzig N/A
kGuard: Lightweight Kernel Protection against Return-to-User Attacks Angelos D. Keromytis , Georgios Portokalidis , Vasileios p. Kemerlis N/A
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization Cristiano Giuffrida , Anton Kuijsten , Andrew S. Tanenbaum N/A
Botnets and Web Security Niels Provos N/A
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware David Dagon , Manos Antonakakis , Roberto Perdisci , Wenke Lee , Yacin Nadji , Nikolaos Vasiloglou , Saeed Abu-nimeh N/A
PUBCRAWL: Protecting Users and Businesses from CRAWLers Christopher Kruegel , Giovanni Vigna , Engin Kirda , Gregoire Jacob N/A
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner Ludovico Cavedon , Christopher Kruegel , Giovanni Vigna , Adam Doupe N/A
Emerging Trends and Their Security Implications Doug Burger We are living in an era of accelerating change. We expect rapid, imminent changes in ...
Aurasium: Practical Policy Enforcement for Android Applications Ross Anderson , Rubin Xu , Hassen Saidi N/A
AdSplit: Separating Smartphone Advertising from Applications Dan S. Wallach , Michael Dietz , Shashi Shekhar N/A
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis Heng Yin , Lok Kwong Yan N/A
STING: Finding Name Resolution Vulnerabilities in Programs Trent Jaeger , Joshua Schiffman , Hayawardh Vijayakumar N/A
Tracking Rootkit Footprints with a Practical Memory Analysis System Weidong Cui , Marcus Peinado , Zhilei Xu , Ellick Chan N/A
Tachyon: Tandem Execution for Efficient Live Patch Testing David Brumley , Matthew Maurer N/A
Being Social Jaeyeon Jung N/A
Privacy-Preserving Social Plugins Evangelos P. Markatos , Angelos D. Keromytis , Michalis Polychronakis , Georgios Kontaxis N/A
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Ariel J. Feldman , Michael J. Freedman , Edward W. Felten , Aaron Blankstein N/A
Efficient and Scalable Socware Detection in Online Social Networks Md Sazzadur Rahman , Ting-kai Huang , Harsha V. Madhyastha , Michalis Faloutsos N/A