"You Might Also Like:" Privacy Risks of Collaborative Filtering
Calandrino, J. A., Kilzer, A., Narayanan, A., Felten, E. W., Shmatikov, V.
Published in 2011 IEEE Symposium on Security and Privacy (01.01.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.01.2011)
Get full text
Conference Proceeding
Quantifying Location Privacy
Shokri, R., Theodorakopoulos, G., Le Boudec, J., Hubaux, J.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Design and Evaluation of a Real-Time URL Spam Filtering Service
Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice
Gullasch, D., Bangerter, E., Krenn, S.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
Yinqian Zhang, Juels, A., Oprea, A., Reiter, M. K.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., Wenke Lee
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Click Trajectories: End-to-End Analysis of the Spam Value Chain
Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Felegyhazi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., He Liu, McCoy, D., Weaver, N., Paxson, V., Voelker, G. M., Savage, S.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Verified Security for Browser Extensions
Guha, A., Fredrikson, M., Livshits, B., Swamy, N.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Becher, M., Freiling, F. C., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Silencing Hardware Backdoors
Waksman, Adam, Sethumadhavan, Simha
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
SCION: Scalability, Control, and Isolation on Next-Generation Networks
Xin Zhang, Hsu-Chun Hsiao, Hasker, G., Haowen Chan, Perrig, A., Andersen, D. G.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks
Weinberg, Z., Chen, E. Y., Jayaraman, P. R., Jackson, C.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks
White, A. M., Matthews, A. R., Snow, K. Z., Monrose, F.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores
Rui Wang, Shuo Chen, XiaoFeng Wang, Qadeer, S.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Defeating UCI: Building Stealthy and Malicious Hardware
Sturton, C., Hicks, M., Wagner, D., King, S. T.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Automated Analysis of Security-Critical JavaScript APIs
Taly, A., Erlingsson, Mitchell, J. C., Miller, M. S., Nagra, J.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
RePriv: Re-imagining Content Personalization and In-browser Privacy
Get full text
Conference Proceeding
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Kashyap, V., Wiedermann, B., Hardekopf, B.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
Verification of Information Flow and Access Control Policies with Dependent Types
Nanevski, A., Banerjee, A., Garg, D.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
The Failure of Noise-Based Non-continuous Audio Captchas
Bursztein, E., Beauxis, R., Paskov, H., Perito, D., Fabry, C., Mitchell, J.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding