Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SP
SP 2011
Generate Citations
2011 IEEE Symposium on Security and Privacy
May 22 2011 to May 25 2011
Oakland, California USA
ISSN: 1081-6011
ISBN: 978-0-7695-4402-1
Table of Contents
Papers
[Roster page]
Freely available from IEEE.
pp. 556
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-viii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Additional Reviewers
Freely available from IEEE.
pp. xv
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Program Committee
Freely available from IEEE.
pp. xiii-xiv
Papers
Symposium Organizers
Freely available from IEEE.
pp. xii
Papers
Message from General Chair
Freely available from IEEE.
pp. ix-x
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. xi
Papers
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-18
by
Andrew M. White
,
Austin R. Matthews
,
Kevin Z. Snow
,
Fabian Monrose
Papers
The Failure of Noise-Based Non-continuous Audio Captchas
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-31
by
Elie Bursztein
,
Romain Beauxis
,
Hristo Paskov
,
Daniele Perito
,
Celine Fabry
,
John Mitchell
Papers
Using Fingerprint Authentication to Reduce System Security: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-46
by
Hugh Wimberly
,
Lorie M. Liebrock
Silencing Hardware Backdoors
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-63
by
Adam Waksman
,
Simha Sethumadhavan
Papers
Defeating UCI: Building Stealthy and Malicious Hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-77
by
Cynthia Sturton
,
Matthew Hicks
,
David Wagner
,
Samuel T. King
Papers
Formalizing Anonymous Blacklisting Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-95
by
Ryan Henry
,
Ian Goldberg
Papers
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-111
by
Michael Becher
,
Felix C. Freiling
,
Johannes Hoffmann
,
Thorsten Holz
,
Sebastian Uellenbeck
,
Christopher Wolf
Papers
Verified Security for Browser Extensions
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-130
by
Arjun Guha
,
Matthew Fredrikson
,
Benjamin Livshits
,
Nikhil Swamy
Papers
RePriv: Re-imagining Content Personalization and In-browser Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-146
by
Matthew Fredrikson
,
Benjamin Livshits
Papers
I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-161
by
Zachary Weinberg
,
Eric Y. Chen
,
Pavithra Ramesh Jayaraman
,
Collin Jackson
Papers
Verification of Information Flow and Access Control Policies with Dependent Types
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-179
by
Aleksandar Nanevski
,
Anindya Banerjee
,
Deepak Garg
Papers
Inference of Expressive Declassification Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-195
by
Jeffrey A. Vaughan
,
Stephen Chong
Papers
The Complexity of Intransitive Noninterference
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-211
by
Sebastian Eggert
,
Ron van der Meyden
,
Henning Schnoor
,
Thomas Wilke
Papers
SCION: Scalability, Control, and Isolation on Next-Generation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-227
by
Xin Zhang
,
Hsu-Chun Hsiao
,
Geoffrey Hasker
,
Haowen Chan
,
Adrian Perrig
,
David G. Andersen
Papers
"You Might Also Like:" Privacy Risks of Collaborative Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-246
by
Joseph A. Calandrino
,
Ann Kilzer
,
Arvind Narayanan
,
Edward W. Felten
,
Vitaly Shmatikov
Papers
Quantifying Location Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-262
by
Reza Shokri
,
George Theodorakopoulos
,
Jean-Yves Le Boudec
,
Jean-Pierre Hubaux
Papers
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-278
by
Philip W.L. Fong
Papers
PRISM: Program Replication and Integration for Seamless MILS
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-296
by
Chris Owen
,
Duncan Grove
,
Tristan Newby
,
Alex Murray
,
Chris North
,
Michael Pope
Papers
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-312
by
Brendan Dolan-Gavitt
,
Tim Leek
,
Michael Zhivich
,
Jonathon Giffin
,
Wenke Lee
Papers
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-328
by
Yinqian Zhang
,
Ari Juels
,
Alina Oprea
,
Michael K. Reiter
Papers
TxBox: Building Secure, Efficient Sandboxes with System Transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-344
by
Suman Jana
,
Donald E. Porter
,
Vitaly Shmatikov
Papers
Differential Slicing: Identifying Causal Execution Differences for Security Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-362
by
Noah M. Johnson
,
Juan Caballero
,
Kevin Zhijie Chen
,
Stephen McCamant
,
Pongsin Poosankam
,
Daniel Reynaud
,
Dawn Song
Papers
Automated Analysis of Security-Critical JavaScript APIs
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-378
by
Ankur Taly
,
Úlfar Erlingsson
,
John C. Mitchell
,
Mark S. Miller
,
Jasvir Nagra
Papers
Memoir: Practical State Continuity for Protected Modules
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-394
by
Bryan Parno
,
Jacob R. Lorch
,
John R. Douceur
,
James Mickens
,
Jonathan M. McCune
Papers
A Formalization of the Security Features of Physical Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-412
by
Frederik Armknecht
,
Roel Maes
,
Ahmad-Reza Sadeghi
,
François-Xavier Standaert
,
Christian Wachsmann
Papers
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-428
by
Vineeth Kashyap
,
Ben Wiedermann
,
Ben Hardekopf
Papers
Click Trajectories: End-to-End Analysis of the Spam Value Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-446
by
Kirill Levchenko
,
Andreas Pitsillidis
,
Neha Chachra
,
Brandon Enright
,
M´rk Félegyh´zi
,
Chris Grier
,
Tristan Halvorson
,
Chris Kanich
,
Christian Kreibich
,
He Liu
,
Damon McCoy
,
Nicholas Weaver
,
Vern Paxson
,
Geoffrey M. Voelker
,
Stefan Savage
Papers
Design and Evaluation of a Real-Time URL Spam Filtering Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-462
by
Kurt Thomas
,
Chris Grier
,
Justin Ma
,
Vern Paxson
,
Dawn Song
Papers
How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-480
by
Rui Wang
,
Shuo Chen
,
XiaoFeng Wang
,
Shaz Qadeer
Papers
Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-489
by
Thai Duong
,
Juliano Rizzo
Papers
Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-505
by
David Gullasch
,
Endre Bangerter
,
Stephan Krenn
Papers
OpenConflict: Preventing Real Time Map Hacks in Online Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-520
by
Elie Bursztein
,
Mike Hamburg
,
Jocelyn Lagarenne
,
Dan Boneh
Papers
Extending Nymble-like Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-537
by
Ryan Henry
,
Ian Goldberg
Papers
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 538-553
by
Ralf Küesters
,
Tomasz Truderung
,
Andreas Vogt
Papers
Author Index
Freely available from IEEE.
pp. 554-555
Showing 45 out of 45