Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SP
SP 2008
Generate Citations
2008 IEEE Symposium on Security and Privacy (sp 2008)
May 18 2008 to May 22 2008
Oakland, CA
Table of Contents
External reviewers
Freely available from IEEE.
pp. xi-xi
Papers
[Roster]
Freely available from IEEE.
pp. 434
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the General Chair
Freely available from IEEE.
pp. viii-ix
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. x
Papers
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-17
by
Haifeng Yu
,
Phillip B. Gibbons
,
Michael Kaminsky
,
Feng Xiao
Papers
Anonymous Networking with Minimum Latency in Multihop Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-32
by
Parvathinathan Venkitasubramaniam
,
Lang Tong
Papers
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-49
by
Charles V. Wright
,
Lucas Ballard
,
Scott E. Coull
,
Fabian Monrose
,
Gerald M. Masson
Papers
Preserving Caller Anonymity in Voice-over-IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-63
by
Mudhakar Srivatsa
,
Ling Liu
,
Arun Iyengar
Papers
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-78
by
M. Strasser
,
C. Popper
,
S. Capkun
,
M. Cagalj
Papers
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-95
by
Gabriela F. Cretu
,
Angelos Stavrou
,
Michael E. Locasto
,
Salvatore J. Stolfo
,
Angelos D. Keromytis
Papers
Efficient and Robust TCP Stream Normalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-110
by
Mythili Vutukuru
,
Hari Balakrishnan
,
Vern Paxson
Papers
Robust De-anonymization of Large Sparse Datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-125
by
Arvind Narayanan
,
Vitaly Shmatikov
Papers
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-142
by
Daniel Halperin
,
Thomas S. Heydt-Benjamin
,
Benjamin Ransford
,
Shane S. Clark
,
Benessa Defend
,
Will Morgan
,
Kevin Fu
,
Tadayoshi Kohno
,
William H. Maisel
Papers
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-157
by
David Brumley
,
Pongsin Poosankam
,
Dawn Song
,
Jiang Zheng
Papers
Compromising Reflections-or-How to Read LCD Monitors around the Corner
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-169
by
Michael Backes
,
Markus D?rmuth
,
Dominique Unruh
Papers
ClearShot: Eavesdropping on Keyboard Input from Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-183
by
Davide Balzarotti
,
Marco Cova
,
Giovanni Vigna
Papers
XFA: Faster Signature Matching with Extended Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-201
by
Randy Smith
,
Cristian Estan
,
Somesh Jha
Papers
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-215
by
Michael Backes
,
Matteo Maffei
,
Dominique Unruh
Papers
Towards Practical Privacy for Genomic Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-230
by
Somesh Jha
,
Louis Kruger
,
Vitaly Shmatikov
Papers
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-247
by
Bryan D. Payne
,
Martim Carbone
,
Monirul Sharif
,
Wenke Lee
Papers
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-262
by
Weiqing Sun
,
R. Sekar
,
Gaurav Poothia
,
Tejas Karandikar
Papers
Preventing Memory Error Exploits with WIT
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-277
by
Periklis Akritidis
,
Cristian Cadar
,
Costin Raiciu
,
Manuel Costa
,
Miguel Castro
Papers
Thinking Inside the Box: System-Level Failures of Tamper Proofing
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-295
by
Saar Drimer
,
Steven J. Murdoch
,
Ross Anderson
Papers
Cloaker: Hardware Supported Rootkit Concealment
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-310
by
Francis M. David
,
Ellick M. Chan
,
Jeffrey C. Carlyle
,
Roy H. Campbell
Papers
Predictable Design of Network-Based Covert Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-321
by
Ronald William Smith
,
George Scott Knight
Papers
Verifying the Safety of User Pointer Dereferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-338
by
Suhabe Bugrara
,
Alex Aiken
Papers
Expressive Declassification Policies and Modular Static Enforcement
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-353
by
Anindya Banerjee
,
David A. Naumann
,
Stan Rosenberg
Papers
Civitas: Toward a Secure Voting System
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-368
by
Michael R. Clarkson
,
Stephen Chong
,
Andrew C. Myers
Papers
Fable: A Language for Enforcing User-defined Security Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-383
by
Nikhil Swamy
,
Brian J. Corcoran
,
Michael Hicks
Papers
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-401
by
Davide Balzarotti
,
Marco Cova
,
Vika Felmetsger
,
Nenad Jovanovic
,
Engin Kirda
,
Christopher Kruegel
,
Giovanni Vigna
Papers
Secure Web Browsing with the OP Web Browser
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-416
by
Chris Grier
,
Shuo Tang
,
Samuel T. King
Papers
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-431
by
Bruno Blanchet
,
Avik Chaudhuri
Papers
Author Index
Freely available from IEEE.
pp. 432
Showing 37 out of 37