Default Cover Image

2008 IEEE Symposium on Security and Privacy (sp 2008)

May 18 2008 to May 22 2008

Oakland, CA

Table of Contents

External reviewersFreely available from IEEE.pp. xi-xi
Papers
[Roster]Freely available from IEEE.pp. 434
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the General ChairFreely available from IEEE.pp. viii-ix
Papers
Message from the Program ChairsFreely available from IEEE.pp. x
Papers
SybilLimit: A Near-Optimal Social Network Defense against Sybil AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 3-17
Papers
Anonymous Networking with Minimum Latency in Multihop NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 18-32
Papers
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP ConversationsFull-text access may be available. Sign in or learn about subscription options.pp. 35-49
Papers
Preserving Caller Anonymity in Voice-over-IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 50-63
Papers
Jamming-resistant Key Establishment using Uncoordinated Frequency HoppingFull-text access may be available. Sign in or learn about subscription options.pp. 64-78
Papers
Casting out Demons: Sanitizing Training Data for Anomaly SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 81-95
Papers
Efficient and Robust TCP Stream NormalizationFull-text access may be available. Sign in or learn about subscription options.pp. 96-110
Papers
Robust De-anonymization of Large Sparse DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 111-125
Papers
Automatic Patch-Based Exploit Generation is Possible: Techniques and ImplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 143-157
Papers
Compromising Reflections-or-How to Read LCD Monitors around the CornerFull-text access may be available. Sign in or learn about subscription options.pp. 158-169
Papers
ClearShot: Eavesdropping on Keyboard Input from VideoFull-text access may be available. Sign in or learn about subscription options.pp. 170-183
Papers
XFA: Faster Signature Matching with Extended AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 187-201
Papers
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 202-215
Papers
Towards Practical Privacy for Genomic ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 216-230
Papers
Lares: An Architecture for Secure Active Monitoring Using VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 233-247
Papers
Practical Proactive Integrity Preservation: A Basis for Malware DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 248-262
Papers
Preventing Memory Error Exploits with WITFull-text access may be available. Sign in or learn about subscription options.pp. 263-277
Papers
Thinking Inside the Box: System-Level Failures of Tamper ProofingFull-text access may be available. Sign in or learn about subscription options.pp. 281-295
Papers
Cloaker: Hardware Supported Rootkit ConcealmentFull-text access may be available. Sign in or learn about subscription options.pp. 296-310
Papers
Predictable Design of Network-Based Covert Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 311-321
Papers
Verifying the Safety of User Pointer DereferencesFull-text access may be available. Sign in or learn about subscription options.pp. 325-338
Papers
Expressive Declassification Policies and Modular Static EnforcementFull-text access may be available. Sign in or learn about subscription options.pp. 339-353
Papers
Civitas: Toward a Secure Voting SystemFull-text access may be available. Sign in or learn about subscription options.pp. 354-368
Papers
Fable: A Language for Enforcing User-defined Security PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 369-383
Papers
Secure Web Browsing with the OP Web BrowserFull-text access may be available. Sign in or learn about subscription options.pp. 402-416
Papers
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted StorageFull-text access may be available. Sign in or learn about subscription options.pp. 417-431
Papers
Author IndexFreely available from IEEE.pp. 432
Showing 37 out of 37