Default Cover Image

2011 IEEE Symposium on Security and Privacy

May 22 2011 to May 25 2011

Oakland, California USA

ISSN: 1081-6011

ISBN: 978-0-7695-4402-1

Table of Contents

Papers
[Roster page]Freely available from IEEE.pp. 556
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-viii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Additional ReviewersFreely available from IEEE.pp. xv
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Program CommitteeFreely available from IEEE.pp. xiii-xiv
Papers
Symposium OrganizersFreely available from IEEE.pp. xii
Papers
Message from General ChairFreely available from IEEE.pp. ix-x
Papers
Message from the Program ChairsFreely available from IEEE.pp. xi
Papers
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iksFull-text access may be available. Sign in or learn about subscription options.pp. 3-18
Papers
The Failure of Noise-Based Non-continuous Audio CaptchasFull-text access may be available. Sign in or learn about subscription options.pp. 19-31
Papers
Using Fingerprint Authentication to Reduce System Security: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 32-46
Silencing Hardware BackdoorsFull-text access may be available. Sign in or learn about subscription options.pp. 49-63
Papers
Defeating UCI: Building Stealthy and Malicious HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 64-77
Papers
Formalizing Anonymous Blacklisting SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 81-95
Papers
Verified Security for Browser ExtensionsFull-text access may be available. Sign in or learn about subscription options.pp. 115-130
Papers
RePriv: Re-imagining Content Personalization and In-browser PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 131-146
Papers
Verification of Information Flow and Access Control Policies with Dependent TypesFull-text access may be available. Sign in or learn about subscription options.pp. 165-179
Papers
Inference of Expressive Declassification PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 180-195
Papers
The Complexity of Intransitive NoninterferenceFull-text access may be available. Sign in or learn about subscription options.pp. 196-211
Papers
SCION: Scalability, Control, and Isolation on Next-Generation NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 212-227
Papers
"You Might Also Like:" Privacy Risks of Collaborative FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 231-246
Papers
Quantifying Location PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 247-262
Papers
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 263-278
Papers
PRISM: Program Replication and Integration for Seamless MILSFull-text access may be available. Sign in or learn about subscription options.pp. 281-296
Papers
Virtuoso: Narrowing the Semantic Gap in Virtual Machine IntrospectionFull-text access may be available. Sign in or learn about subscription options.pp. 297-312
Papers
HomeAlone: Co-residency Detection in the Cloud via Side-Channel AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 313-328
Papers
TxBox: Building Secure, Efficient Sandboxes with System TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 329-344
Papers
Automated Analysis of Security-Critical JavaScript APIsFull-text access may be available. Sign in or learn about subscription options.pp. 363-378
Papers
Memoir: Practical State Continuity for Protected ModulesFull-text access may be available. Sign in or learn about subscription options.pp. 379-394
Papers
A Formalization of the Security Features of Physical FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 397-412
Papers
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 413-428
Papers
Design and Evaluation of a Real-Time URL Spam Filtering ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 447-462
Papers
How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web StoresFull-text access may be available. Sign in or learn about subscription options.pp. 465-480
Papers
Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NETFull-text access may be available. Sign in or learn about subscription options.pp. 481-489
Papers
Cache Games -- Bringing Access-Based Cache Attacks on AES to PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 490-505
Papers
OpenConflict: Preventing Real Time Map Hacks in Online GamesFull-text access may be available. Sign in or learn about subscription options.pp. 506-520
Papers
Extending Nymble-like SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 523-537
Papers
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 538-553
Papers
Author IndexFreely available from IEEE.pp. 554-555
Showing 45 out of 45