The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
2010 (conf/sp/2010)


  1. Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. [Citation Graph (, )][DBLP]


  2. History of US Government Investments in Cybersecurity Research: A Personal Perspective. [Citation Graph (, )][DBLP]


  3. Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective. [Citation Graph (, )][DBLP]


  4. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. [Citation Graph (, )][DBLP]


  5. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. [Citation Graph (, )][DBLP]


  6. Identifying Dormant Functionality in Malware Programs. [Citation Graph (, )][DBLP]


  7. Reconciling Belief and Vulnerability in Information Flow. [Citation Graph (, )][DBLP]


  8. Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. [Citation Graph (, )][DBLP]


  9. Noninterference through Secure Multi-execution. [Citation Graph (, )][DBLP]


  10. Object Capabilities and Isolation of Untrusted Web Applications. [Citation Graph (, )][DBLP]


  11. TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP]


  12. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. [Citation Graph (, )][DBLP]


  13. Tamper Evident Microprocessors. [Citation Graph (, )][DBLP]


  14. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. [Citation Graph (, )][DBLP]


  15. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. [Citation Graph (, )][DBLP]


  16. A Practical Attack to De-anonymize Social Network Users. [Citation Graph (, )][DBLP]


  17. SCiFI - A System for Secure Face Identification. [Citation Graph (, )][DBLP]


  18. Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. [Citation Graph (, )][DBLP]


  19. Revocation Systems with Very Small Private Keys. [Citation Graph (, )][DBLP]


  20. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. [Citation Graph (, )][DBLP]


  21. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. [Citation Graph (, )][DBLP]


  22. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). [Citation Graph (, )][DBLP]


  23. State of the Art: Automated Black-Box Web Application Vulnerability Testing. [Citation Graph (, )][DBLP]


  24. A Proof-Carrying File System. [Citation Graph (, )][DBLP]


  25. Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. [Citation Graph (, )][DBLP]


  26. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. [Citation Graph (, )][DBLP]


  27. How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. [Citation Graph (, )][DBLP]


  28. Bootstrapping Trust in Commodity Computers. [Citation Graph (, )][DBLP]


  29. Chip and PIN is Broken. [Citation Graph (, )][DBLP]


  30. Experimental Security Analysis of a Modern Automobile. [Citation Graph (, )][DBLP]


  31. On the Incoherencies in Web Browser Access Control Policies. [Citation Graph (, )][DBLP]


  32. ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser. [Citation Graph (, )][DBLP]


  33. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. [Citation Graph (, )][DBLP]


  34. A Symbolic Execution Framework for JavaScript. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002